SERVICES

• Develop and document performance, availability, manageability, and security requirements for small up to large scale systems.
• Manage highly complex software development efforts using a variety of development methods.
• Conduct technical briefings, provide oral presentations, and write complex technical documentation for developers and senior executives.
• Prioritize technology investments based on independent research of market trends.
• Write systems engineering documentation such as CONOPs, System Engineering Plans, Initial Capabilities Documents, Requirements specifications, and Interface Control Documents.
• Develop system requirements and functional requirements for small and large scale systems.

• Design, implement, and monitor security measures in the protection of the critical on-line assets of our clients.
• Define system security requirements.
• Analyze security infrastructure device failures and perform root cause analysis.
• Develop secure technical solutions and design new cyber security tools to mitigate identified security vulnerabilities.
• Perform gap analysis on current cyber security tools’ ability to protect critical on-assets, write comprehensive reports detailing the findings, and make recommendations for additional cyber security functionality.
• Perform system security certification/accreditation.
• Conduct system penetration testing.
• Monitor client intrusion detection tools and write incident reports.
• Perform malware analysis and write reports.
• Perform risk analysis and mitigation.
• Design, test, and integration of Cross-Domain Solutions (CDS).
• Design security architecture for 1000+ node cyber defense war game simulation with authentication, authorization, and multi factor authentication.
• Develop multi-key encryption capability for wireless handset provider to comply with and support CALEA (Communications Assistance for Law Enforcement Act) requirements.

• Analyze the function, operational usage, and requirements interaction to design the most effective enterprise architecture.
• Analyze the solution for completeness and ensure the solution meets the client’s needs.
• Ensure there are no conflicting requirements, and if conflicts are found, we quickly resolve them before implementation.
• Trace requirements to establish the relationship to the model and ensure the end product meets or exceeds our clients’ needs.

• Perform SIGINT Survey Collection Operations.
• Perform aural/visual (e.g., signal display unit, spectrum analyzer) signal recognition and classification, and identification of speech encipherment and encryption systems.
• SIGINT Analysis and Target Development.
• Monitor, analyze, and report on relevant events.
• Identify Tactics, Techniques, and Procedures (TTPs).
• Recognize computer vulnerabilities and threats.
• Identify compromises, trends, patterns, and reported TTPs of incidents.
• Document relationships between identities.
• Social Media Analysis.

• Analyze and perform technical review of new Concept Plans (CONPLANs) and Operations Plans (OPLANs).
• Document planning conference actions, participate in exercises as an observer, and provide feedback/lessons learned in after action reports for inclusion in upcoming operations planning.
• Research and develop technical requirements for potential courses of action (COA) in cyberspace operations.
• Analyze cyberspace policy directives/documents and issue papers and provide and recommendations for improvement, deconfliction, and adherence to policy directives.
• Develop cyberspace Tactics, Techniques and Procedures (TTPs), Concept of Operations (CONOPs), standard operating procedures (SOPs), and technical assessments.
• Identify cyberspace capability operational gaps and make recommendation for new requirements to close the gaps.
• Chair Cyberspace Requirements Boards and deconflict requirements with other government Cyberspace Requirements Boards.

• Research, design, document, and implement secure wireless networks.
• Deep understanding of all current wireless network engineering specifications and protocols, network hardware/software, and client products.
• Recommend wireless network optimization and upgrades for existing wireless networks to meet mission requirements.
• Perform RF coverage and site surveys.
• Design multi-state RAN and E-UTRAN for rollout of wireless overlay.
• Design EPC for LTE provider.
• Provide RF engineering technical subject matter expertise to several multinational engineering companies.
• Provide wireless communications design and antenna selection services.
• Evaluate and acquire tower locations and optimize wireless designs for Capacity and Interference (C/A, C/I) QoS.
• Provide RF and LTE technical training.
• Provide telecommunications engineering support.
• Provide integration and test management and oversight for wireless handsets.
• Recommend wireless vendor selection, site placement, and capacity analysis for WISP equipment for a wireless Internet Service Provider.
• Subject matter expertise pertaining to interfaces, data flows, and integration between all OEM handsets and RAN (Radio Access Network) equipment.
• Subject matter expertise pertaining to various multiple RAN technologies (HSDPA, HSUPA, LTE-TDD, LTE-FDD, etc.), Software Defined Radios (SDR) and core technologies (LTE, LTE-A, UMTS, etc.) and analysis of operators’ deployments of these systems with an emphasis on LTE wireless networks.

• Identification, translation, and transcription of Greek, Turkish, Polish, Bosnian, Serbian, Croatian, and Russian.