Cybersecurity

Security threats have no borders. With continuing escalation in network attacks, well-designed and robust cyber capabilities are a must. This includes everything from preventing and blocking cyber threats, monitoring emerging threats, integrating and embedding cybersecurity into the full engineering lifecycle to ensuring compliance all while bridging the gap between technology and mission operations. The Amentum Missile Defense and NORAD groups facilitate decision-driven analytics that enable traditional and agile methodologies to produce high-quality, high-level solutions, enhancing cybersecurity postures and protecting our customer’s most critical assets.

Solutions

  • Network Defense – 24/7/365 monitoring of networks and attached systems to Identify, Detect, Protect, Respond, Recover and Restore from attacks
  • Cybersecurity incorporated into Agile Program Increment planning as well as a patching cadence into all project baselines
  • Regulatory Compliance – Risk Management Framework processes and procedures streamlined to attain accreditation for cyber systems
  • Security Operations and Maintenance – Vulnerability identification and remediation
  • along with best configuration practices to reduce the overall surface area for attack and exploitation
  • Cross-Domain Solutions – Provide engineering and accreditation support for establishing communications across security boundaries
  • Implement security policy, track compliance, detect deviations and intrusions, analyze threat vectors and produce required documents to maintain Cybersecurity Service Provider (CSSP) certification. Execute Cyber Threat Analysis in accordance with DoD policy and Government direction, provide analysis and correlation of threats to the CSSP area of responsibility and collaborate with external cyber defense organizations to predict trends, distribute cyber threat awareness products, and host weekly, monthly, annual, and ad hoc briefings and cyber threat sharing sessions for CSSP members, subscribers, and partner organizations.
  • Ensure Security Operations and Risk Management functions are effective and efficient. Responsible for cybersecurity operations including protection, detection, continuous monitoring and reporting. Oversee compliance with IA policy and supports RMF package processing.

Latest Resources & Insights