Our Services
Secure Technologies Group strives to provide superior expertise and talent driving toward mission success. We have proven intelligence community expertise and excel at adapting best practices to ever-evolving operations.
Core Competencies
- System Security Engineering and Development
- Security Regulations
- Security Architecture
- System Design
- Installation
- Operations and Maintenance
- Certification and Accreditation/Compliance
- Risk Management Framework (RMF)
- IC Sector – ICD 503, DCID 6/3, DIACAP, NISCAP, Agency-Specific Compliance
- NIST – SP-800 Series, FIPS 140/199/200
- Processes, policies, procedures
- Risk Management Framework (RMF)
- Computer Network Operations (CNO) – Due diligence, audits, analysis
- Computer Network defense (CND)
- Security Assessment / Vulnerability and Penetration Testing
- Analysis
- Mitigation
- Ongoing Assessment (Continuous Monitoring)
- Testing
- Validation of Security Posture
- Security Assessment / Vulnerability and Penetration Testing
- Computer Network Attack / Exploitation (CNA / CNE) – process and procedure
- Offensive Operations (and that’s all we can say about that!)
- Trusted advisors to Intelligence Community customers
- SETA (Systems Engineering and Technical Assistance) partners in these areas:
- SIGINT Collection and Processing/Reporting Systems
- Enterprise Information Security Operations and Management
- Contract / Acquisition Management
- Cloud/GIG Architecture
- Cross-Domain Solutions
- Human Language Translation
- SETA (Systems Engineering and Technical Assistance) partners in these areas:
- Computer Network defense (CND)
Systems Engineering
- Architecture
- Requirements
- Systems Analysis
- Life Cycle Support
- System Deployment
- Technology Strategy
- Information Technology
- Infrastructure
- Design
- Transformation of operational needs into performance specifications
- Development of systems architecture
- Independent Verification and Validation
- Operational Views (OV)
- System Views (SV)
- Interface Control Documents (ICD)
- Test Plans, Deployment Plans
- Data Services Development
- Information Integration
- Metadata Management
- MetaMatrix Implementation
- Data Modeling
- UML, ERD, XML Schema
- Relational Solutions
- Oracle 9i, 10g
- Sybase
- Microsoft SQL Server
- MYSQL – POSTGRES
Program Acquisition Management
- Planning Programming and Budget Execution (PPBE)
- Contract Development
- Acquisition Support (Milestone A-C)
- Acquisition Documentation (DoD 5000)
- Training and Education
- Program Planning and Tracking
- Risk Management
- IPBS/CBJB Support
- Deployment Management
- Primavera and MS Project Expertise
Cyber Security
- Open Source Research/All Source Research
- Threat Mitigation/Mitigation Strategies Development
- IDS/IPS/SIEM Operations
- Threat Analysis
- Solutions Development and Integration
- Malware Analysis and Reverse Engineering
- Computer Forensics
- Systems Auditing
- Information Security Training and Custom Course Development