Cyber Analytics Software
YARA Malware Identification Rules Development and Implementation
Boundary Protection Tools and Management (Firewalls, IPS/IDS, etc…)
Risk Management (Controls)
Security Information and Event Management (SIEM)
End Point Security Tools and Management(Antivirus, Data Loss Protection, etc…)
Configuration Management
User Activity Monitoring (UAM)
Responding to Cyber Incidents
Internet Protocol Address Management
Training and Education (Cybersecurity Awareness)
Yearly Asset Lifecycle Financial/Budget Planning