805.266.3214   daren.childers@ps-cyber.com

Capabilities


PS Cyber offers a TS/SCI cleared workforce capable of performing tasks across the entire cybersecurity landscape with experience leading, performing and reporting to government and civilian authorities regarding:

  • Systems and System Security Engineering
  • Cybersecurity Vulnerability Assessment
  • Governance, Risk and Compliance (GRC) Support
  • Security Operations Services

Areas of Expertise:

    • Virtualization 
    • VMware ESXi, vCenter, vSAN, Horizon, Nutanix
    • Red Hat Enterprise Virtualization
    • Operating Systems and Services Security
    • Microsoft Operating Systems from Windows NT/2000 to present
      • Domain Services (DNS, AD and AD/DRA, Kerberos, Group Policy, Auth, NTP)
      • Microsoft Exchange
      • Windows Update (WSUS) both online and disconnected instances
    • Red Hat Enterprise Linux from RHEL 4 to present
      • Identity Managment
      • NFS, Ceph, GlusterFS, iSCSI storage providers
      • Satellite for compliance, subscription and update management
    • Networking Technologies
    • Cisco switching, routing, VPN and firewalls
    • Juniper switching, routing, VPN and firewalls
    • Cloud Technologies
    • Infrastructure as Code via Ansible, terraform
    • AWS, Microsoft cloud services, Google Cloud Platform
    • Security Operations as a Service
    • COMSEC Responsiblities as acting COMSEC Responsible Office (CRO)
    • SIEM Deployment, Operations and Event Management using Splunk, LogRhythm, SolarWinds, QRADAR
    • Network Monitoring with Wireshark, TCPDump, Nessus Passive Vulnerability Scanner
    • Scanning and Remediation through Tenable.sc (ACAS), Nessus Scanning, Pentesting and Enumeration (KALI and tools), SCAP Compliance Scanner (SCC), manual STIG/SRG compliance
    • Identification and Authentication IAW DoD PKI implementation, standalone PKI implementation, Yubikey and other alternative MFA, DoD certificate management (NIPR, SIPR, JWICS)
    • Incident Response including cradle to grave event monitoring, alarm reporting and investigation, incident generation, log aggregation, reporting, mitigation planning, costing, analysis and recommendation, remediation and/or restoration activities