Cybersecurity Engineering
- Vulnerability assessments
- Endpoint Detection and Response (EDR)
- Perimeter Defense
- Intrusion Detection and Prevention System (IDS / IPS)
- Network Monitoring
- Data Loss Prevention (DLP)
- Security Analytics
Recommends information technology solutions to resolve customer problems.
Configure and tune IT security systems to optimize performance and alerting.
Integrate solutions with other technology solutions such as active directory, backups, networking devices, and security solutions.
Design data flow and engineer data life cycle to determine how data is originated, enriched, stored, and disposed to meets compliance and business requirements.
Produce documentation such as data flows, data dictionaries, user guides, or operating procedures, user guides, operating procedures, systems design documents, disaster recovery documentation.
- We advise strategies to support data privacy, security tool integration, web application protection, data loss prevention for the user, and system protection.
- Developing cyber-resilient systems which include the protection of physical as well as computer and network systems.
- Keeping the security architect as the "Security Core" enables our team to deploy various technologies, mitigate risks, and secure systems through different design specifications.
Host-Based Security System (HBSS)
HBSS is a McAfee ePolicy Orchestrator (ePO) product and security application that uses Our team can administer, manage, and deploy the product for the Non-Classified Internet Protocol Routed Network (NIPRNet) and Secret Internet Protocol Routed Network (SIPRNet) networks; and administer, operate, maintain and secure its network interfaces.
Assured Compliance Assessment Solution (ACAS)
The Assured Compliance Assessment Solution (ACAS) is Tenable Nessus as an integrated software solution that is scalable to an unlimited number of locations. We can deploy, administer, and manage an agency’s vulnerability management program and deploy security analytics that model actual risk indicators.
Software Assurance (SwA)
SEMAIS process for SwA ensures that the processes, procedures, and products conform to all requirements and standards. We perform dynamic and static code analysis using tools such as HP Fortify and Web Inspect to discover coding errors based on OWASP, DISA STIG, or other standards.
End Point Security
Protecting sensitive data is critical. Our engineering approach removes data spillage, protects privacy information, and integrate security technologies to laptops, computers, smartphones, and wireless devices. We hold experience at using MacAfee DLP products and Anti-Virus products to secure endpoints. We identify measures to protect against data loss - especially once data moves outside the network perimeter.