Cyber Security Bullets
CYBER SECURITY OPERATIONS
- Security Operations Center (SOC) Management
- Incident Response
- Forensic Investigation and Data Recovery
- Threat Hunting
- Continuous Monitoring
- Penetration Testing
- Cyber Intelligence and Analysis
- Insider Threat Monitoring
- System and Network Security Engineering
- Identity, Credentialing, and Access Management (ICAM)
- Security Analytics
CYBER PROGRAM SUPPORT
- Cyber Strategy and Planning
- Risk Management Frameworks
- Cyber Policy and Compliance
- Assessment and Authorization
- Cyber Security Training
- Enterprise Governance Risk and Compliance (eGRC)