Cyber Security

For more information please contact: Marshall Combs mcombs@gemtechnology.com (443) 878-2812
Ransomware cyber security concept

As countries across the world continue to face increasingly sophisticated cyber-attacks from both foreign and insider threats, GEM Technology (GEM) provides its clients with specialized Cyber Security support services to proactively detect and assess Cyber Security risks and vulnerabilities in order to counter malicious cyber threats to national security; and to safeguard the sharing of information. These solutions are similarly used to complement our Counterintelligence/Counterterrorism services.

GEM relies on the leadership and experience of its highly effective staff of cyber experts with over 10 years of experience in Information Technology, Cyber Security, Systems Engineering, Systems/Network Administration, and conducting complex cyber investigations; applying industry-leading tradecraft and cutting-edge cyber capabilities to support this evolving and growing priority. GEM’S Certified Information Systems Security Professional (CISSP)-certified cyber professionals engineer, test, and integrate various Network Defense technologies including Snort Intrusion Detection System (IDS) sensors, SourceFire IDS, Blue Coat Security Analytics Platform, HBGary Active Defense, FireEye, and Host Based Security System (HBSS) modules in compliance with Intelligence Community (IC) security standards.

GEM’s Cyber Security Support Features
Program Management Services
Engineering Services
Security Services
Training Services

 

Computer security concept in word tag cloud