Security Engineering and Management

What We Do

G2SF leverages market leading cybersecurity tools, technologies, and techniques to proactively monitor, track, report and ultimately prevent unauthorized access to agency infrastructures including networks, systems, applications, databases, and information. We research, design, develop, implement and manage processes, procedures, architectures, and best practices to detect, defend against, immediately respond to, and quickly resolve in/outsider security threats and incidents. We accept responsibility for keeping the agency safe.

Key Services Include:

  • Security Operations Center (SOC) Management
  • Computer and Mobile Device Forensics
  • Security Assessment, Design, Development, Implementation and Management
  • Data Loss Prevention (DLP)
  • Cloud Access Service Brokers (CASB)
  • Security Configuration and Management Services
  • VPN and Cryptography Services
  • Application and Database Server Security Services
  • Next Generation Anti-Virus and Malware Operations
  • Perimeter and External Network Vendor Management
  • Security Incident and Event Management Services
  • Enterprise Logging, Audit Reduction and Accountability Services
  • Security Weakness, Threat Detection, Vulnerability and Compliance Scanning
  • Demilitarized Zone (DMZ) and Micro-Segmentation Design and Implementation
  • Data Destruction Services
  • Locating and Securing PII and Sensitive Data (CUI, PII, HIPPA, etc.)
  • Risk Management Framework and Certification and Accreditation (C&A) Services
  • Information Assurance and Policy Development
  • Business Continuity Planning, Continuity of Operations, Disaster Recover Design and Operations

Where We Do It

US Nuclear Regulatory Commission: In support of the OCIO, G2SF currently provides
comprehensive security services including security operations center management;
information assurance; identity, credential, and access management; network operations
management, and account management

Why Us

  • Evidence of providing superior service and improving an agency’s overall security posture (See 12/2018 GAO Security Report to Congressional Committees – pg. 22)
  • Highly qualified security professionals with numerous certifications and decades of experience using a wide variety of technologies
  • Ability to close gaps between current security operations and operations based on standards, requirements, best practices and compliance/risk management frameworks
How can we help you?
Service Summary
Past Performance
White Papers

Trusted IT solutions designed for mission success