Highly Adaptive Cyber Services (HACS)

SST holds the General Services Administration (GSA) IT 70 schedule special item number (SIN) Highly Adaptive Cybersecurity Services (HACS) in all five areas (Risk Vulnerability Assessment, Penetration Testing, Incident Response, Cyber Hunt, & High Value Asset Assessment).
schedule consultation

Overview

SST holds the General Services Administration IT 70 schedule special item number (SIN) Highly Adaptive Cybersecurity Services (HACS). The HACS is combination of the following 5 key services:

Risk Vulnerability Assessment - a systematic review of security weaknesses in an information system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever needed.

Penetration testing - an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system

Incident Response (IR) - is a set of operational instructions designed to help companies prepare for, detect, respond to, and recover from network security incidents. Most IR plans are technology-centric and address issues like malware detection, data theft and service outages.

Cyber Hunt - "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.

High Value Asset Assessment (HVA) - the assessment of information or an information system that is so critical to an organization that the loss or corruption of this information or loss of access to the system would have serious impact to the organization's ability to perform its mission or conduct business

Highly Adaptive Cyber Services (HACS)

Capabilities / Process

Our cyber teams are made up of subject matter experts. SST utilizes highly qualified, experienced, and skilled personnel to execute and implement all HACS services. In addition to the multiple years of experience, our HACs service personnel team holds industry highly sought-after certifications such as Cisco Certified Internetwork Expert (CCIE), Certified Network Defense Architect (CNDA), Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), and Certified Secure Software Lifecycle Professional (CSSLP).
Download Capabilities Statement
7 Pro Tips to Boost Network Security & Enhance Cybersecurity
Download Free Guide

Past Performance

DISA - Cybersecurity Support to Multiple DISA Systems (2011 – 2019)

NBIS Program (2017 – 2019)

  • High-Value Asset Assessments: Performed vulnerability management services and assessments.
  • Risk and Vulnerability Assessments: Performed DoD Security Technical Implementation Guides (STIGs) assessments.
  • Cyber Threat Hunt: Performed cyber security activities that resulted in multiple layers of implemented security controls.
  • Incident Response: Created and implemented an Incident Response Plan or Policy.
Read more
colleagues discussing vulnerability management policy

DCS (2013 – 2016)

  • High-Value Asset Assessments: Performed vulnerability management services.
  • Risk and Vulnerability Assessments: Performed DoD Security Technical Implementation Guides (STIGs) assessments.
  • Incident Response: Created and implemented an Incident Response Plan or Policy for the set of systems/applications under the contract.
  • Penetration Testing: Supported all external testing.
Read more

DEOS (2016 – 2017)

Risk and Vulnerability Assessments

  • Performed DoD Security Technical Implementation Guides (STIGs) assessments for all assets to identify threats and risks for each component of the security architecture.
  • Supported all external testing.
Read more
building interior abstract risk and vulnerability assessment

Commendation

Quotes
SecureSoft Technologies LLC has been an exceptional VRC team member in working with us to advance our strategic goals. Their services have always been timely and of superior quality. Their work has often caught the attention of senior-level officials who have commended the company for its work and professionalism.

Meet Your Cybersecurity Requirements

Connect with an SST systems engineer to discuss your challenge.
CMMC, RPO certified. 3PAO certification pending GSA IT 70 Schedule HACS Provider
HubZone Certified

© 2022 SecureSoft Technologies. All rights reserved. Privacy Policy

Website by 
Ocean 5 Strategies
crosschevron-downarrow-right