Risk Assessment and Management, Identity and Access Management, Configuration and Vulnerability Management.
Software security, Software assurance and Software testing.
Assistance in migration to cloud technology and implement security policies in a virtual environment.
Determine product strategy, operations research, systems analysis, requirements, testing, integration, management, systems of systems and process improvement.
Design secure defensive networks and bringing legacy systems up-to-date.