Our Services

HIGHLY ADAPTIVE CYBERSECURITY SERVICES (HACS)

DESIGN OF EXPERIMENTS

CYBER OPERATIONAL TEST & EVALUATION



NETWORK ENGINEERING

IT PROFESSIONAL SERVICES





Highly Adaptive Cybersecurity Services (HACS)

Available on our GSA IT-70 Schedule

GS-35F-180AA

Access to pre-vetted cyber support services to test high-priority IT systems, mitigate vulnerabilities, and stop adversaries before they impact critical networks.

Special Item Numbers (SINs)

Available to all federal, state and local government organizations:
  • 132-45A Penetration Testing
  • 132-45B Incident Reponse
  • 132-45C Cyber Hunt
  • 132-45D Risk and Vulnerability Assessment

Design of Experiments

  • Hypothesis based design
  • Multi-variate, multi-factorial design
  • Measures of effectiveness
  • Data collection & plans
  • Statistical analyses
  • Experimental reports




CYBER OPERATIONAL TEST & EVALUATION

Technology Assessments

  • Functional testing
  • Security testing
  • Performance & effectiveness criteria development
  • Test planning
  • Test data collection, analysis, reporting








Network Engineering Services

Strategic Planning & Coordination

  • Experimentation strategy
  • Stakeholder coordination
  • Project sourcing / Program management
  • Private & Public partnerships

Defense-in-depth Network Implementation

  • Operational requirements
  • Concept of operations
  • Network architecture & design
  • Network installation
  • Functional testing
  • Network preparation
  • Security testing
  • Network operational testing & accredidation

Training & Support

  • Requirement assessment
  • Train the trainer curriculum development
  • Technical support






GS Information Technology Professional Services

Cyber Security Engineering & Consulting Services

  • Threat analysis, Strategic planning
  • Cyber concept of operations
  • Fault and intrusion tolerant network architecture
  • Design of Experiments (hypothesis based experimentation)
  • Operational test & evaluation
  • Cyber defense-in-depth implementation
  • Operations & maintenance support
  • Training of Cyber Defenders
  • Highly Adaptive Cyber Security Services (HACS)
    • Penetration Testing
    • Incident Response
    • Cyber Hunt
    • Risk and Vulnerability Assessments