We are innovative thinkers with over fifteen years of integrated experience.

We are leaders in the field of development, design, deployment, implementation, management, and training in areas of enterprise security, network architecture for domestic and international clients.

We also configure, administer, maintain, test and upgrade network components. Our expertise includes building firewalls, intrusion detection Systems and security management tools.

Our most notable accomplishments are as follows:
• Investigated the source of treats to the networks of Department of State (DOS), Foreign Service Institute (FSI); and implemented a technical and physical solution.


• Increased DOS/ FSI Information Security Vulnerability Management compliance from 40% to 95%.


• Designed a plan for DHS/Transportation Security Administration to arrive at an acceptable risk level, without impacting the client mission, while incorporating confidentiality, integrity and availability and maintaining the level of performance in accordance to the Service Level Agreement (SLA) guidelines;


• Maintained client Authority to Operate (ATO) certificate


• Developed vulnerability management processes for the Department of Home Land Security Office’s of the Chief Information (DHS CIO);


• Increased DHS HQ Information Security Vulnerability Management compliance from 67% to 95%.


• Instituted the re-use of legacy infrastructure on the Navy/Marine Corps Intranet (NMCI) project and cut company costs by 25%.


• Managed a team of security and operation engineers to conduct vulnerability assessments/penetration tests of information systems, web servers, and database


• Researched and implemented computer network vulnerability tools


• Provided professional assistance with identification, monitoring, investigation and analysis of computer network intrusions


• Monitored, tested, configured, and troubleshoot Cisco router network (consisting of over 5000 Cisco routers and 20,000 nodes). Managed Cisco router/switch based Data communication Utility.

Analyzed packets on network routers to determine virus activities.