Management of assets is key to ensuring your organization avoids data breaches or compromises. SST’s managed Cybersecurity services begin with an assessment to determine your organization’s risk tolerance and identify gaps in your cybersecurity posture. Follow-up services, based on the determined risk tolerance, allow your organization to know its security posture at any time. Additionally, we also offer expertise in security hardening, scanning, and remediation, as well as tailored knowledge transfer and training to internal teams for long-term system sustainability.
Capabilities / Process
SST conducts a thorough risk assessment of your organization’s information system. The assessment determines how well your assets are managed in accordance with the organization’s approved risk tolerance. SST’s Cybersecurity services are customized for your organization’s cybersecurity needs and protections at affordable rates.
For organizations with recommended/mandated security guidelines and requirements, our assessments are based on the specific guidelines. For all other organizations, the assessments are based on combination of industry recommended risk management frameworks for an efficient, effective, and affordable and tailored approach.
Our tailored approach is typically made up of the following services:
Comprehensive data protection (includes zero trust access architecture, vulnerability management and incident response controls)
NBIS (DISA) Program (2018 - 2019) and EPOS (2019 - Present), and U.S Air Force Cyber Defense (2021-Present)
Provided cyber, operational, maintenance, and system administration support for all applications within the National Background Investigation Services (NBIS) under contract.
Managed all day-to-day cybersecurity operations including administrative, technical, and operational functions, assessing risks and identifying unstated assumptions, and resolving all related issues, as well as interpersonal conflicts for the Electronic Point of Sale (EPOS) program solution
Verified and validated the proper implementation of hardening, patching, Security Technical Implementation Guides (STIGs), and the application of Control Correlation Identifier (CCIs) to the Virtual Data Infrastructure (VDI) components for multiple US Air Force Cyber Defense projects. Supported efforts related to security hardening, scanning, and the remediation of vulnerabilities across the associated systems. Additionally, ensured the design and configurations for VMware Horizon 7 and Thin Clients are documented and kept up-to-date.
Meet Your Cybersecurity Requirements
Connect with an SST systems engineer to discuss your challenge.