We pride ourselves in ensuring confidentiality, integrity, and availability of solutions through planning, analysis, development, implementation, and enhancement of information systems security
TBM_slick-sheet-02-02
We support Designated Approving Authorities (DAA) and Information System Security Managers (ISSMs) to ensure proper evaluation of the program's security posture and in accordance with the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) or an organization’s cyber security program.

Cyber Security Capabilities

  • Conduct security test and evaluations (ST&E) and Information Assurance (IA) audits of system,components, and functionality of existing system and during development changes
  • Conduct Privacy Impact Assessments for select systems that contain PII.
  • Provide expertise on cyber security and implementation of security tools and incident response best practices
  • Perform IA Technical research, analysis, and provide recommendations for cyber security incidents
  • Training of Defensive Cyber Operations analysts
  • Establish methodologies for analyzing cyber events and threats
  • Developing the procedures to address cyber security, forensics, and incident response
  • Provide recommendations for development of cyber mission concepts
  • Perform research, technical analysis, vulnerability assessments