Network defense, perimeter protection, monitoring, policy development and implementation, and intrusion detection
Phishing testing, education, training, forensic analysis, threat detection, and implementation of countermeasures
External and internal scans, perimeter assessment, application testing, network enumeration, threat analysis and reporting
Policy development and implementation, mitigation support, and design of security layout and architecture
Cyber Threat Intelligence
Analyze threats, correlate analytical findings to ascertain attributable information regarding cyber groups and monitor indications and warnings.
Forensics and Malware
Computer Forensics, mobile Forensics, network forensics, intrusion investigations, incident response, reverse engineering, and malware analysis.
Certification and Accreditation
NIST and DoD policy and security best practices guidance, DIACAP, eMASS and MCCAST experience.
Security Test and Evaluation, Independent Verification and Validation, Risk Analysis, Manual test case development, and Automated tool development
IA Support and Sustainment
IAVA Management, POA&M maintenance, annual security reviews, FISMA compliance, and incident response