IA/Security Management
Cyber Security Documentation
Disaster Recovery Planning
Anti-Virus (AV), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewall, Proxy Server Planning and Implementation
Identity and Access Management/ Public Key Infrastructure (PKI)
Implementation of Authentication Technologies (Biometric, Two-
Factor, Radius, Active Directory)
Encryption/Decryption
Penetration Testing
IT Governance
Vulnerability Management (VM)
Information Assurance Vulnerability Assessment (IAVA) Reporting
Information Assurance Vulnerability Management (IAVM)
USCYBERCOM Directives
Vunerability Assessment
Threat Modeling/Assessment
Plan of Actions and Milestones (POA&M)
Baseline Security Testing
Security Hardening
Assessment and Authorization
National Institute of Standards and Technology (NIST)
Risk Management Framework (RMF)
Defense Information Assurance Risk Management Framework (DIARMF)
Federal Information Security Management Act (FISMA) compliance
National Institute of Standards and Technology (NIST) compliance
FedRAMP compliance
Independent Auditing
National Security Systems (NSS) Compliance
Payment Card Industry (PCI) Compliance
Health Insurance Portability and Accountability Act (HIPAA) Compliance
Privacy Compliance
Defense Information System Agency (DISA) Compliance