Cornerstone Defense supports numerous customers across the Cyber mission landscape. Our diversified cyber capabilities, focused on both Mission and unique Customer requirements, are comprised of the following five key areas: Defensive, Offensive, Operations, Modeling/ Simulation, and Intelligence. In addition to Cyber specific areas, we also provide significant Engineering Support Services to deliver complete and mission-focused support to each of our Customers.

Each Cyber Capability Area includes: Domain Expertise, Subject Matter Experts (SMEs), application of appropriate technologies beneficial to the mission, delivery of proven patterns, and mission results.
DEFENSIVE CYBER: Our Cyber Team works with our clients to identify data value, network targets, existing defenses, and risks/gaps. Our Defensive Cyber support incorporates the design, deployment, and operation of cyber protective solutions. We tailor each solution to mission specific needs and leverage these proven advanced technologies utilizing Next Generation Firewalls, Software-Defined Networking, and Predictive/Proactive Defenses. Our SMEs track, identify, and apply beneficial emerging technologies such as Defensive Playbooks, Machine Learning, and Artificial Intelligence enabled defensive operations. We have extensive experience evaluating and improving enterprise security. Our team conducts cyber analysis activities to include the application of the Risk Management Framework and 800-171 controls across each mission and/or an entire enterprise. In each support effort, the Cornerstone Defense Cyber Team seeks to identify current protection state and gaps to define and deliver the most effective mitigations.
OFFENSIVE CYBER: Our Cyber Team is an integral member of multiple missions and programs that require advanced engineering and mission expertise. Support of our current programs include target analysis, access and exploitation, and both non-attribution and integrated protections. Many of our solutions involve Inside Threat Detection that leverages inside network and security knowledge for offensive operations. Our SMEs are highly-cleared experts in national and adversary Tactics, Techniques, and Procedures (TTPs).
CYBER OPERATIONS: Our Cyber Team supports both strategic and day-to-day operations across agency mission support efforts. Support encompasses C-SOC support for Intelligence Community (IC) customers, forensic analysis, and post-attack remediation. Our Cyber Team builds and operates cyber operational environments that leverage technologies including Splunk and ELK, as well as Cyber Orchestration tools, typically Phantom. We integrate these solutions into more extensive enterprise operations using technologies such as ServiceNow and Cloud resident solutions in AWS, C2S, and Azure.
MODELING AND SIMULATION: Our Cyber Team routinely utilizes Modeling and Simulations to test and verify network capabilities. Our SMEs create and apply use cases to emulate real-world environments to both test cyber tools and refine TTPs. Our Cyber Team is often asked to consider an adversary’s intentions and capabilities by forming and testing potential detection and defense mechanisms. We monitor emerging technologies to identify new protections and threat vectors, and then include these findings in future test scenarios.
CYBER INTELLIGENCE: Our Cyber Team tracks and leverages both defensive and adversarial Cyber patterns to improve our solutioning. We generate data and perform analyses that result in both formal and informal intelligence reports. Not only do our SMEs attend global events on emerging technologies and tactics, they also work with Customers and U.S. Intelligence sources to remain current and actively contribute to the mission knowledge base.
ENGINEERING SUPPORT: Our Cyber Team provides proven System, Software, and Network Engineering support for its Cyber customers. Support in this area includes Agile development of advanced network architectures, high-performance computing, and big data analytics leveraging advanced database technologies.  

Connect With Us

Find us on Social Media and keep up to date with job openings and the latest news!  

Facebook LinkTwitter LinkLinkedIn Link

Get In Touch

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form