System and Network Administration
ANASEC's System and Network Administrators are highly skilled and knowledgeable IT professionals. Our System and Network Administration staff can maintain and operate any size computer system and/or network. Common System Administration duties include installation, support, and maintenance of servers or other computer systems. System Administrators will plan for system maintenance and respond to service outages and other computer related issues.
ANASEC's System and Network Administrators are highly skilled and knowledgeable IT professionals. Our System and Network Administration staff can maintain and operate any size computer system and/or network.
|
|
Development / Programming
The Systems Development Life Cycle (SDLC) is the process of creating or modifying systems and applications. The SDLC concept is the model and/or methodology that people use to develop systems and applications. In software engineering the SDLC concept supports many kinds of software development methodologies. The SDLC methodologies form the framework for planning and controlling the creation of an information system or application. The SDLC is also known as the software development process.
Computer programming or simply programming is the process of designing, writing, testing, debugging / troubleshooting, and maintaining the source code of computer programs. Source code is written in various programming languages. The purpose of programming is to create a program that automates many manual functions and displays a certain desired behavior. The process of writing source code often requires expertise in many different subjects, including knowledge of the application domain, specialized algorithms and formal logic.
The Systems Development Life Cycle (SDLC) is the process of creating or modifying systems and applications. The SDLC concept is the model and/or methodology that people use to develop systems and applications. In software engineering the SDLC concept supports many kinds of software development methodologies.
|
|
Certification and Accrediation (C&A)
Certification and Accreditation (C&A) is a process for implementing information security controls to a computer environment. It is a systematic procedure for evaluating, describing, testing and authorizing systems prior to or after a system is in operation. The C&A process is used extensively in the U.S. Federal Government and Department of Defense (DoD). Some C&A methods include FISMA, DIACAP and DCID 6/3.
Certification and Accreditation (C&A) is a process for implementing information security controls to a computer environment. It is a systematic procedure for evaluating, describing, testing and authorizing systems prior to or after a system is in operation.
|
|
Information Assurance (IA)
Information Assurance (IA), Information Security or IT Security (IS), is the practice and implementation of protections as applied to computers, applications, and networks. The objective of IT security is to protect information or data, its systems, and property from loss, theft, exploitation, or natural disaster. IT Security is the protection and safeguarding of electronic data, systems and property of while maintaining Confidentiality, Integrity and Availability.
Information Assurance (IA), Information Security or IT Security (IS), is the practice and implementation of protections as applied to computers, applications, and networks.
|
|
Database Design and Administration
Database Designers and Administrators or DBA�s are responsibilities for the design, implementation, maintenance and repair of a company�s database or data warehouse. DBA�s and database designers often share work on development and designs of database strategies, security, administration, monitoring and improving database performance and capacity, and planning for future expansion requirements.
Database Designers and Administrators or DBA�s are responsibilities for the design, implementation, maintenance and repair of a company�s database or data warehouse.
|
|
Systems Analysis
Systems Analysts will research the issues, make plans and solutions, recommend software and systems, and coordinate the development to meet business or other requirements. They will are familiar with multiple varieties of programming languages, operating systems, and computer hardware platforms. Quite often Systems Analysts will write user requests into technical specifications, so they act like liaisons between vendors and information technology professionals. They can also develop cost analysis, design considerations, and implementation time-lines.
Systems Analysts will research the issues, make plans and solutions, recommend software and systems, and coordinate the development to meet business or other requirements.
|
|
Background Screening/Investigations
Background Screening/Investigations provide
an in-depth history or stature of a subject's
background. Assets, financial data, workers
compensation, criminal and civil history are
just the start of a background investigation.
We offer pre-employment screening for the private sector and also support federal government needs to meet a variety of personnel security investigations (PSIs) including adjudication services. ANASEC has developed a case assignment and tracking system (CATS) used over secure a website to assign, track, and close case. Authorized users can log-on, retrieve assignments, download/receive supporting documents, and complete a Report of Investigation (ROI).
Background Screening/Investigations provide
an in-depth history or stature of a subject's
background. Assets, financial data, workers
compensation, criminal and civil history are
just the start of a background investigation.
|
|
Due Diligence Research
Due Diligence Research of potential Partners,
Mergers, Acquisitions, and Joint Ventures provides
an accurate picture of a person or company prior
to a financial commitment. An in-depth history of
a subject's background, assets, financial data,
worker's compensation, criminal and civil history
are just the start of a due diligence background
investigation. Corporate background investigations
go directly to the heart of the organization. Competitive
intelligence surveys are also a technique used to
gather information on an organization.
Due Diligence Research of potential Partners,
Mergers, Acquisitions, and Joint Ventures provides
an accurate picture of a person or company prior
to a financial commitment. |
Crisis Management
Crisis Management focuses on critical decision-making
in an emotional environment, establishing flexible
response tactics, and managing events to minimize
loss of life, profits, assets or reputation. ANASEC
helps clients anticipate and identify the risks
of potentially catastrophic occurrences. Emergency
Response Guidelines are developed to mitigate and
control the loss of assets or reputation due to
a host of potential threats.
ANASEC's crisis management team will help organizations
to:
|
- Identify and Assess Potential Threats
- Develop Crisis Management Plans
- Develop and Implement Emergency Response Guidelines
- Conduct Program Overview for Senior Managers
|
- Establish Company Crisis Management Teams
- Identify Crisis Categories and Create Contingency
Plans
- Support Crisis Management Team in Actual Emergencies
- Conduct Post-Crisis Evaluations
|
Crisis Management focuses on critical decision-making
in an emotional environment, establishing flexible
response tactics, and managing events to minimize
loss of life, profits, assets or reputation.
|
Security Policy Development
Security Policy Development provides the rules
and resources needed to protect your company; technology
alone cannot protect infrastructure. ANASEC can
establish sound policies to act as the base for
your technology and the organization as a whole.
A comprehensive assessment of the organization and
its’ current policies are the starting point
for an evaluation. Based on findings, a specific
policy is created for your company to meet your
unique needs.
|
Security Policy Development provides the rules
and resources needed to protect your company; technology
alone cannot protect infrastructure. |
Program or Project Management
ANASEC�s program management provides a layer above project management focusing on selecting the best group of programs, defining them in terms of their projects and providing an infrastructure where projects can be run successfully but leaving project management to the project management community where a set of sequential steps are implemented based on organizational needs or direction.
|
ANASEC�s program management provides a layer above project management focusing on selecting the best group of programs, defining them in terms of their projects and providing an infrastructure where projects can be run successfully but leaving project management to the project management community where a set of sequential steps are implemented based on organizational needs or direction.
|
Security Operations
ANASEC can help build a complete Security Operations Center (SOC) environment at your facility, providing both physical managed services and/or a data infrastructure. We will then step you through the process of staffing, managing and monitoring the SOC internally or manage it on your behalf. Operational policies and procedures will be tailored to your specific operational and regulatory requirements, and are based on security operations best practices.
|
ANASEC can help build a complete Security Operations Center (SOC) environment at your facility, providing both physical managed services and/or a data infrastructure.
|
Operations Security (OPSEC)
ANASEC can provide personnel with experience in OPSEC.
OPSEC is not a specific category of information.
Rather, it is a process for identifying, controlling,
and protecting generally unclassified information
which, if it becomes known to a competitor or adversary, could be used to your disadvantage. We can identify
your critical information, determine its vulnerability,
analyze any threats, determine the appropriate risks, and provide an assessment of protection.
|
ANASEC can provide personnel with experience in OPSEC.
|
Vulnerability
Assessments/Force Protection
ANASEC has identified and utilizes a talented pool of highly skilled, seasoned security experts. Each professional staff member possesses an impressive background in security, investigations, personal protection, project management, security operations management, anti-terrorism and force protection experience. Our candidates are extremely familiar with Antiterrorism Operational Assessments (AOA) to test procedures to detect terrorist pre-operational surveillance activities, execute security procedures, implement installation defensive measures to protect from terrorist attack, and control access to systems and facilities. Our team has provided assistance to installations in developing, writing and/or updating shortfalls in site specific Force Protection Plans, utilizing the AT Plan template for fixed installations and including all five pillars of force protection (Information Security, Physical Security, Antiterrorism, Law Enforcement, and High Risk Personnel Security).
|
ANASEC has identified and utilizes a talented pool of highly skilled, seasoned security experts.
|
|