The Cornerstone Defense Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our operational support team focuses on building and deploying innovative tools and monitoring their effectiveness, while our intelligence analysts and targeting team helps our customers plan and conduct informed operations based upon precise intelligence.
Organizations and agencies in this market include Military Intelligence, National Intelligence, Signals Intelligence/ MPO, Cyber Command, Defense Intelligence Agency (DIA), Federal Bureau of Investigations (FBI), Department of Homeland Security(DHS), and the Department of State (DoS). Each Intelligence Capability Area Includes Domain Expertise, Subject Matter Experts (SMEs),application of beneficial relevant technologies, and delivery of proven patterns, ultimately resulting in mission results.
Our team supports a classified Intelligence Community customer’s Critical Mission and Networks branch where we are involved in all areas of technical and functional operations for their global encrypted network. Our Engineering teams are involved in design and architecture, capacity planning, implementation, software-defined network operations (Cisco, Juniper, Brocade), VTC, VOIP and Voice, systems. We support technology changes and adds, new customer integration, testing, and evaluations, ATO accreditation, Firewall Intrusion Detection / Security, and network and system provisioning. The Intelligence team also provides Program and Project management support for all phases of the program, utilizing Agile/Scrum or DevSecOps methodologies to optimize efficiencies for the customer. Cornerstone provided customer support in these technical areas ensures continuity across the program and better communications throughout the multiple functional and technical areas of our customer’s Critical Mission and Networks Branch.
Our Defensive Cyber support incorporates the design, deployment, and operation of cyber protective solutions. We tailor each solution to mission specific needs and leverage these proven advanced technologies utilizing Next Generation Firewalls, Software-Defined Networking, and Predictive/Proactive Defenses. Our SMEs track, identify, and apply beneficial emerging technologies such as Defensive Playbooks, Machine Learning, and Artificial Intelligence enabled defensive operations. We have extensive experience evaluating and improving enterprise security. Our team conducts cyber analysis activities to include the application of the Risk Management Framework, CMMC, and 800-171 controls across each mission and/or an entire enterprise. In each support effort, the Cornerstone Cyber Defense Intelligence Team seeks to identify current protection state and gaps to define and deliver the most effective mitigations.
Our direct support encompasses C-SOC operations for Intelligence Community (IC) customers, forensic analysis, and post-attack remediations. Our Intelligence Team builds and operates cyber operational environments that leverage technologies such as Splunk and ELK along with Cyber Orchestration tools including Phantom, and Threat Forensics via Python and R. We integrate solutions into enterprise operations using technologies such as ServiceNow and Cloud resident solutions in AWS, C2S, and Azure.
We provide OSINT, SIGINT, HUMINT, GEOINT, ELINT, MASINT, TECHINT, CYBEINT/DNINT, FININT and ALL- SOURCE intelligence analysis,targeting, and operational support. Our skilled analysis capabilities include: Intelligence Collection, Intelligence Analysis, Intelligence Data Fusion, Targeting and Operationalization of Intelligence, Technical Support for Analysis Targeting and Tools, Analytic Tradecraft Improvement and Training, Geo-location and Exploitation, Social Networks / Patterns of Life Analysis, Language Specific Support
Support in this area includes Agile development of advanced systems architectures, high-performance computing, and big data analytics leveraging advanced database technologies. Our engineers and architects ensure that requirements, designs, and systems address mission needs and our application development expertise helps government customers implement solutions (i.e., Kubernetes, Containerization, PaaS implementation) that protect our critical infrastructure against threats from adversaries at every level. We go far beyond traditional defense to build or align to advanced solutions (Platform One, Cloud One, Iron Bank), offensive capabilities, and out-of-the-box approaches that proactively defend our national security systems.
Our Intelligence Team is an integral member of multiple missions and programs that require advanced engineering and mission expertise. Support of our current programs include target analysis, access, and exploitation, and both non-attribution and integrated protections. Many of our solutions involve Inside Threat Detection that leverages inside network and security knowledge for offensive operations. Our SMEs are highly cleared experts in national and adversary Tactics, Techniques, and Procedures (TTPs).
Splunk | Wireshark | OpenStack | Ansible | NetApps | Nagios | HP Openview| Stealthwatch | Github | Netsaint| IPPlan | Jenkins | Maven | JAX-R | Openshift | Cisco Packet Tracer and Graphical NetworkSimulator-3 | J-Unit | Spring Boot | Sniffer Pro | JDSU/Acterna | RedHat | AWS