87859601
Apr 2, 2018
Business consulting and information services; business consulting services for others in the field of design, planning, and implementation project management in the field of cyber-security services; on-line consultation via computer in the field of business and account audits
Advertising and BusinessComputer consultation in the field of Cyber Security; Computer consultation in the field of IT Security; Computer consultation in the field of testing and auditing the goods of others to assure compliance with industry standards; Computer consultation in the field of computer security risk assessments; Computer consultation in the field of IT Audits; Computer consultation in the field of computer network security; Computer consultation in the field of Information Technology; Computer consultation in the field of computer network information systems; Computer consultation in the field of Computer Science; Computer consultation in the field of Computer Engineering; Computer consultation in the field of Security Engineering; Computer consultation in the field of Cyber Systems; Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; Information technology consulting; cyber security services, namely, restricting unauthorized access by users without credentials; maintenance of computer software relating to computer security and prevention of computer risks; research and analysis in the field of computer systems security, namely, establishing requirements for testing, training, workflow management, quality assurance, damage assessments for cyber intrusions, evidence collection and documentation, and law enforcement reporting; Consulting in the field of information technology; consulting services for others in the field of design, planning, and implementation and project management in the field of research regarding cyber-security and computer software testing; Cyber-security services, namely, extracting and analyzing communication and application data transmitted over computer and communication systems and networks for the purpose of identifying and protecting against computer security threats including terrorism, crime, fraud, and theft of intellectual property; homeland security mission support services, namely, consulting in the field of information technology, specifically, offering technical support services, namely, troubleshooting of computer hardware and software problems; homeland security mission support services, namely, consulting in the field of information technology, specifically providing planning and engineering services in the field of providing security for information and communications networks to protect data and information from unauthorized access; homeland security mission support services, namely, design and development of computer software for cyber security; homeland security mission support services, namely, services for maintenance of computer software for use in cyber security; computer services, namely, remote management of the information technology (IT) systems of others to ensure compliance with federal regulations, standards, and laws
Computer and ScientificSecurity threat analysis for protecting public safety, namely, monitoring and providing notification of security incidents or threats; Tracking and monitoring regulatory requirements in the field of information technology systems to ensure compliance with federal regulations, standards, and laws for regulatory compliance purposes; security operation center services, namely, monitoring and providing notification of security incidents or threats for protecting public safety; computer consultation in the field of auditing standards and practices to assure compliance with national security laws
Personal