98386877
Feb 1, 2024
Information technology (IT) consultancy relating to installation, maintenance and repair of computer hardware for purposes of computer security, cyber threat analysis, cyber threat intelligence, information security risk assessment, security operations, incident response strategies, systems hardening, and information security risk management; Maintenance of secure hardware technology infrastructure
Building Construction and RepairNew product research and development; Design and testing for new product development, namely, military, aerospace and geospatial systems and devices, signal communications systems and devices, network security, IT systems and devices, and optical communications systems and technology; Consulting services in the field of technical engineering for national security, signals intelligence, electronic warfare systems, electronic warfare software solutions, optical communications, human intelligence, open source intelligence, counterterrorism, cyber threats, counterintelligence, data analytics, artificial intelligence, human terrain, all-source intelligence, full motion video, geospatial intelligence, imagery intelligence, intelligence collection, counter-unmanned aircraft technologies, and document/material exploitation; Data security consulting services in the field of dark web monitoring; Computer software development for others; Design and development of on-line computer systems; Technical consulting in the field of design and development of on-line computer systems; Information technology (IT) consultancy relating to computer network design for purposes of computer security, cyber threat analysis, cyber threat intelligence, information security risk assessment, security operations incident response strategies, systems hardening, and information security risk management; Information Technology (IT) computer security consultancy in the fields of cyber threat analysis, cyber threat intelligence, information security risk assessment, security operations incident response strategies, systems hardening, and information security risk management; Information Technology (IT) computer security testing, namely, scanning and penetration testing of computers and networks to assess information and systems vulnerability; Design, implementation, and maintenance of secure software technology infrastructure for others
Computer and Scientific