Cyber Security Engineering

We are proud to lead the industry in critical infrastructure protection and industrial control systems security. We actively manage risk using proven security engineering strategies, innovative cyber technologies, and comprehensive vulnerability assessment and penetration testing services to expose and remediate vulnerabilities, harden network defenses and optimize defensive measures against future attacks.

Our team develops cyber architectures by applying proven and integrated cyber methodologies that are further refined using cyber modeling and simulation techniques. We perform Cyber architecture definition and concept development using an iterative Cyber Systems Engineering (CSE) process. Using the CSE process, cyber architectures are generated based on predicted threats and traceability analysis to better describe and understand the system and dependencies on cyber technologies. The resulting cyber architecture provides a general description of how the subsystems join together to form the system and how cyber requirements will flow through major subsystem components.

We rely on systems analysis to identify dependencies for mission-critical systems and to assess cyber security. Cyber modeling and simulation capabilities are used to assess how mission-critical systems respond to variations in functionality and/or performance. Cyber threats in the form of attack scenarios along with system faults and failures are applied against the system to determine the survivability and resilience of the systems’ mission essential functions. We leverage extensive testing and forensics capabilities to identify and determine mitigation for mission chokepoints. The results from our testing and forensics provide the basis to develop defensive mechanisms that manage operational risk of the system. Based on the vulnerability and risk assessment, we define defensive mechanisms to validate and verify the efficacy of the improved cyber posture.  

Services include:

  • Security architecture and engineering
  • Security certification and accreditation
  • Information assurance
  • Vulnerability and risk assessment
  • Security policy and standards
  • Security operations benchmarking
  • Supply chain integrity