805.266.3214 daren.childers@ps-cyber.com
Capabilities
PS Cyber offers a TS/SCI cleared workforce capable of performing tasks across the entire cybersecurity landscape with experience leading, performing and reporting to government and civilian authorities regarding:
- Systems and System Security Engineering
- Cybersecurity Vulnerability Assessment
- Governance, Risk and Compliance (GRC) Support
- Security Operations Services
Areas of Expertise:
-
- Virtualization
- VMware ESXi, vCenter, vSAN, Horizon, Nutanix
- Red Hat Enterprise Virtualization
-
- Operating Systems and Services Security
- Microsoft Operating Systems from Windows NT/2000 to present
- Domain Services (DNS, AD and AD/DRA, Kerberos, Group Policy, Auth, NTP)
- Microsoft Exchange
- Windows Update (WSUS) both online and disconnected instances
- Red Hat Enterprise Linux from RHEL 4 to present
- Identity Managment
- NFS, Ceph, GlusterFS, iSCSI storage providers
- Satellite for compliance, subscription and update management
- Microsoft Operating Systems from Windows NT/2000 to present
-
- Networking Technologies
- Cisco switching, routing, VPN and firewalls
- Juniper switching, routing, VPN and firewalls
-
- Cloud Technologies
- Infrastructure as Code via Ansible, terraform
- AWS, Microsoft cloud services, Google Cloud Platform
-
- Security Operations as a Service
- COMSEC Responsiblities as acting COMSEC Responsible Office (CRO)
- SIEM Deployment, Operations and Event Management using Splunk, LogRhythm, SolarWinds, QRADAR
- Network Monitoring with Wireshark, TCPDump, Nessus Passive Vulnerability Scanner
- Scanning and Remediation through Tenable.sc (ACAS), Nessus Scanning, Pentesting and Enumeration (KALI and tools), SCAP Compliance Scanner (SCC), manual STIG/SRG compliance
- Identification and Authentication IAW DoD PKI implementation, standalone PKI implementation, Yubikey and other alternative MFA, DoD certificate management (NIPR, SIPR, JWICS)
- Incident Response including cradle to grave event monitoring, alarm reporting and investigation, incident generation, log aggregation, reporting, mitigation planning, costing, analysis and recommendation, remediation and/or restoration activities