Technology

Technology2019-01-27T02:07:13+00:00

Technology Challenges Today

Today’s technology is ever changing and complex, companies are faced with defining their IT strategy to fit with their business strategy.

Syndicus NACON computer scientists have skills in most of the familiar technologies today, as well as some of the most hard-to-find, critical skill sets.

Services include the right staff for the right time in the right way: temporary help contractors, contract-to-hire, technical consulting, and direct placements. Our technical services solutions aim to improve customers’ business cases.

Our technical skills include:

  • SAP technicians who analyze, design, and program for clients

  • CRM Siebel programmer analysts

  • C, C+, and C++ programmer analysts

  • Java and HTML5 developers in LAMP environments

  • Linux engineers

  • Microsoft support engineers

Our technical solutions include:

  • Software testing, penetration testing, and vulnerability assessments

  • Technology selection processes

  • Computer system validation

  • Compliance Solutions

  • IT outsourcing

  • Sandboxed Virtual Machines

Technology Services – Cybersecurity

How does one create cyber awareness and establish a secure network? By engaging cyber security resources such as Syndicus NACON that are capable of providing high-quality information security services and solutions that are tailored to meet your commercial or governmental organization’s security needs.

Syndicus NACON can supply personnel who are subject matter experts in computer security and troubleshooting, with many years’ experience inside both the Intelligence Community and government agencies.

In the broadest sense, we specialize in supplying hard-to-find critical skill sets that you may need for your information security programs. In fact, to support HIPAA and HITECH initiatives, we employ security professionals familiar with the healthcare sector, including a Registered Health Information Administrator (RHIA) who has more than a decade of health informatics experience.

We develop custom computer security training, with an emphasis on:

  • Computer Network Operations (CNO) and Wireless Reconnaissance

  • Helping develop Information Operations/CNO tactics, techniques, procedures (TTP) and certification

  • Developing specialized software, penetration testing services, malware analysis, and reverse engineering.

  • Web-based training on Virtual Machines in VirtualOnDemand®, our patented, sandboxed environment.

For software development, we are proficient in:

  • C++, Java, C#, Intel Assembly and various interpreted languages, such as Python and Ruby.

  • Windows and Linux operating system internals and have in-depth experience developing Windows device drivers relating to file system internals, network protocols, and Universal Serial Bus (USB) devices.

  • Developing Windows applications using .NET, ATL, COM/DCOM, ActiveX, MFC, ADSI, and Win32 programs.

Our technical consulting services include:

  • Secure network design

  • Data loss prevention

  • Wireless penetration testing

  • Cybersecurity forensics

We conduct security assessments based on the Open Source Testing Methodology Manual (OSTMM), the Information System Security Assessment Framework Draft, and ISO-17799. If testing is for the purpose of accreditation, certification, or validation of compliance with a regulatory requirement (HIPAA, SOX, GLBA, GXP), the client must provide this information prior to the contract execution of a Statement of Work.

Our Security Assessment scope of work includes:

  • Architecture review

  • Policy review

  • Vulnerability assessment

  • Password auditing

  • Security awareness evaluation

  • Configuration review

  • Social engineering

  • Wireless security audit

  • Open-source intelligence audit

  • Data loss prevention (DLP) audit

  • Penetration test

  • Assessment report

  • Remediation plan

  • Recommendation

Ready to Talk

Your Name (required)

Your Email (required)

Subject

Your Message

Industry Resources

Download Our Latest White Paper: Evaluating and Testing of Derfensive Cybersecurity Tools and Methods

DOWNLOAD NOW

Name (required)

Email (required)

Company

Phone Number