Cyber

Our Solution integrates the people, processes, and technologies to create a dynamic IT, Intelligence, and Cyber-solutions provider to our clients across the globe. Through breadth and depth of resources and geographically dispersed operating locations, we are strategically positioned to deliver intelligent solutions to our clients’ missions across the globe.

Security Operations Center (SOC) Development / Integration

We provide expertise in designing, developing, and integration toolsets required to protect and defend network and computer operations

  • Security Incident & Event Management (SIEM)
  • Endpoint Detect & Respond (EDR)
  • Forward Web Proxy
  • Security Analytics
  • Malware Analysis
  • Incident Response & Orchestration
  • Data Traffic Fabric Capture
  • Vulnerability Management
  • Network Modeling & Risk Management

Cyber Training

Provide key Operational and Network Training for Cybersecurity Operations Center and Critical IT Operations/Management Positions”

  • SOC Operations
  • Curriculum Development
  • Standard Operating Procedures (SOPs)
  • Job Proficiency Guides
  • Workforce Training
    • Compliance and Behavior Training
  • Incident Response and Threat Hunting
  • SIEM Operations
    • Monitoring / Alerting / Parsing
  • Endpoint Management
    • Management of Policies
  • Network Security
  • SOC Analyst

Cyber Operations Consulting

Incident Response and Threat Hunting

  • Organizational Cyber Risks, Threats, and Probability Analysis
  • Cyber Incident Containment, Cleanup, and Recovery
  • Open Source Cyber Threat Intelligence Analysis

Network Security

  • Cyber Visibility and Mapping
  • Multi-Layer Security / Next Generation Cyber Capabilities
  • Data in Transit Security
  • Predictive Analysis
  • Data Loss Protection

SOC Operations and Analysis Support

  • Monitor Cyber Activities & Detect
  • Cyber Awareness (Alerts / Events Management)
  • Risk-Based Focus / Quick Spec

Endpoint Management

  • Remote Device Management / Response; Corrective Action
  • Data at Rest Security
  • Device Security Malware Protection

Cyber Solutions and Engineering

  • Solutions Architecture and Engineering
  • Modernization of Legacy Cyber Solutions

Governance, Policy, Compliance Consulting

  • NIST and RMF Framework
  • Security Policy and Compliance

Network Security / Operations / Engineering

Consulting and Engineering / Integration Support for Network Security Tools and Infrastructure includes:

  • Next Generation Firewall Integration / Engineering / Consultation
  • Infrastructure Installation and Monitoring
  • Analysis and Modeling of Network Components
  • Fabric Traffic Management / Capture / Analysis
  • User Behavior & Predictive Analysis tools
  • Implement and Support the Production of Security and Compliance Framework
  • NIST/RMF Implementation: Categorize, Audit, Harden, Test, Monitor
  • Industry Standards for Compliance

National Institute of Standards and Technology (NIST) Compliance / Risk Management Framework (RMF) Compliance

Value Proposition

  • Proven past performance and relevant professional service capabilities from delivering over SR500M of IT projects in KSA in the past 5 years.
  • Broad domain and industry experience with turn-key IT projects Government, Military, Public Safety and Oil & Gas Sectors.
  • Strategic Collaborations / Partnerships with Global Technology Leaders for Cybersecurity including Dawson, Raytheon, Lockheed Martin and Cyber Security Works.
  • ISO certified, TMForum Member, MOMRA Classification and GAMI Registration.
  • A well established Saudi IT services company with a successful project delivery track record of over 35 years.