Our Services

Secure Technologies Group strives to provide superior expertise and talent driving toward mission success. We have proven intelligence community expertise and excel at adapting best practices to ever-evolving operations.

Core Competencies
  • System Security Engineering and Development
    • Security Regulations
    • Security Architecture
    • System Design
    • Installation
    • Operations and Maintenance
  • Certification and Accreditation/Compliance
    • Risk Management Framework (RMF)
      • IC Sector – ICD 503, DCID 6/3, DIACAP, NISCAP, Agency-Specific Compliance
      • NIST – SP-800 Series, FIPS 140/199/200
      • Processes, policies, procedures
  • Computer Network Operations (CNO) – Due diligence, audits, analysis
    • Computer Network defense (CND)
      • Security Assessment / Vulnerability and Penetration Testing
        • Analysis
        • Mitigation
        • Ongoing Assessment (Continuous Monitoring)
        • Testing
          • Validation of Security Posture
    • Computer Network Attack / Exploitation (CNA / CNE) – process and procedure
      • Offensive Operations (and that’s all we can say about that!)
    • Trusted advisors to Intelligence Community customers
      • SETA (Systems Engineering and Technical Assistance) partners in these areas:
        • SIGINT Collection and Processing/Reporting Systems
        • Enterprise Information Security Operations and Management
        • Contract / Acquisition Management
        • Cloud/GIG Architecture
        • Cross-Domain Solutions
        • Human Language Translation
Systems Engineering
  • Architecture
  • Requirements
  • Systems Analysis
  • Life Cycle Support
  • System Deployment
  • Technology Strategy
  • Information Technology
  • Infrastructure
  • Design
    • Transformation of operational needs into performance specifications
    • Development of systems architecture
    • Independent Verification and Validation
    • Operational Views (OV)
    • System Views (SV)
    • Interface Control Documents (ICD)
    • Test Plans, Deployment Plans
    • Data Services Development
    • Information Integration
    • Metadata Management
    • MetaMatrix Implementation
    • Data Modeling
    • UML, ERD, XML Schema
    • Relational Solutions
    • Oracle 9i, 10g
    • Sybase
    • Microsoft SQL Server
    • MYSQL – POSTGRES
Program Acquisition Management
  • Planning Programming and Budget Execution (PPBE)
  • Contract Development
  • Acquisition Support (Milestone A-C)
  • Acquisition Documentation (DoD 5000)
  • Training and Education
  • Program Planning and Tracking
  • Risk Management
  • IPBS/CBJB Support
  • Deployment Management
  • Primavera and MS Project Expertise
Cyber Security
  • Open Source Research/All Source Research
  • Threat Mitigation/Mitigation Strategies Development
  • IDS/IPS/SIEM Operations
  • Threat Analysis
  • Solutions Development and Integration
  • Malware Analysis and Reverse Engineering
  • Computer Forensics
  • Systems Auditing
  • Information Security Training and Custom Course Development