Reverse Engineering

  • Hardware, Software, and Firmware
  • Mobile Platforms (Android, iOS)
  • Windows, Linux, and Real Time Operating systems
  • TCP/IP, Bluetooth, 802.11 and other Proprietary Protocols

System Vulnerability Analysis

  • Recognition, inspection and assessment techniques
  • Software & Protocol Fuzzing
  • Embedded & Proprietary Systems Security Analysis
  • Fingerprinting
  • Source Code Review

Network Engineering and Defense

  • Enterprise class network design
  • Secure Network Designs
  • Security Operations Centers
  • Cyber Test Range Development
  • Cross Domain Solutions
  • Certification and Accreditation
  • CISSP, ISSEP, CCNA, CCNP

CNO Software Development

  • Embedded Systems Development
  • Mobile platforms
  • Linux/Unix Application & Kernel Development
  • Windows API, Network, and Kernel Driver Development
  • Code packing, Obfuscation, and Rootkit techniques
  • C, C++, Assembly (multiple processor families), Java, Python

Defensive Vulnerability Analysis

  • Adversary characterization through Red and Blue teaming
  • Conduct research and analysis
  • Continual activity monitoring
  • Develop computer network defense tools

Malware Analysis

  • Analysis of Zero-Day Vulnerabilities
  • Expertise with debuggers, disassemblers, and sniffers for malware triage
  • Post-mortem memory forensics
  • Analysis of protection mechanisms used by malware
  • Analysis of malicious software and documents

Mission System Support

  • Systems Engineering
  • System Integration and Administration
  • End-to-End dataflow
  • CNO testing

Enterprise Software through Agile Processes

  • Service Oriented Architecture (SOA) and Agile Development 
  • Continuous Test and Integration
  • Complex Data Analytics and Presentation
  • Infrastructure as a Service