Our Services

 

Cloud Security

Cloud security is an emerging capability based on the adoption and transition to cloud.  Cyber Centurion engineers start with the migration of traditional cyber security to the cloud infrastructure and continue by evaluating new technologies such as Software Defined Perimeter, Machine Learning and Artificial Intelligence.  We also understand that we must not lose focus of security best practices such as strong passwords, good user training and eliminating things like phishing attacks and mis-configurations.

Compliance Assessments

Compliance assessments are a necessary component to any complete cyber security program and unlike risk or vulnerability assessments, compliance assessments measure against a specific standard. Our engineers are effective at compliance assessments because we understand the standards being measured and overlap between competing and complementary standards (such as PCI-DSS, NIST 800-53, ISO/IEC 27002, etc)

Cyber Security Training

Cyber security training can take many forms, from annual refresher courses, to advanced device specific training.  We measure the effectiveness of our training throughout the course, and in conjunction with our compliance, risk and vulnerability assessments, throughout the year.

Risk Assessments

Understanding the risk to your organization is more than just applying a standard template to the enterprise. We evaluate your risk appetite across the organization, assess your exposure, develop mitigations to each risk, and build a prioritized list based on time to implement, cost, and effectivness.

Security Operations

Security operations is more than just watching a system for anomalies, it also includes response activities. Our security operations engineers, understand the systems they monitor, the impact of adverse events, and the critical path to resolve those events.

Security Strategy

Strategy comes from a clear, concise measurable goal and builds into an actionable plan.  Our staff understand how to shape the goals, identify the capabilities and environment necessary to reach the goal, and implement the management processes and systems to monitor progress.

Systems/Security Architecture

Building in security from the ground up is a key to maintaining a secure environment. Our architects, understand the relevant frameworks (TOGAF, DODAF, JARM, etc) and how to manage and implement security within those frameworks while maintaining the integrity and goals of the enterprise system.

Vulnerability Assessments

Vulnerability assessments are the validation of all your security solutions. Our assessments can easily scale from one enclave or department to an entire enterprise and encompass, technical and non-technical security implementations from Firewall/system configurations, through user training and policy effectiveness.

About

We provide security focused cyber solutions to ensure mission success.

Cyber Centurion is a cyber security and systems engineering firm with over 20 years of proven technical and management experience across various clients and markets.  We support our clients mission with experienced talent, tested solutions, proven methodologies, advanced analytics and demonstrated results.  We understand the risks our clients face in their mission, our experience, resources, and network protect our client’s mission and reputation.

Why Cyber Centurion

In ancient Rome, a centurion was a professional officer, commanding groups of up to a thousand men. These officers were chosen because of their Strength, Abilities and Discipline.  Centurions lead from the front, inspiring by their example.

Since the mid 90s, we’ve honed our cyber and systems engineering skills across commercial, federal and education markets to meet the client challenges of the day.

Choose Cyber Centurion for our:

Strength

Strength in numbers and our numbers come from a vast network of cyber professionals across the federal government and commercial companies.  We have the right resources and benefits to attract and retain the best talent at all experience levels to meet our clients needs.

Ability

We  understand the implementation and operation of the systems we are securing.  The ability to design, implement and manage a system is critical when protecting and defending an enterprise.

Discipline

The adversary is relentless and committed, to beat them, an intelligent and adaptable  solution is required.  Our engineers are disciplined to understand the second and third order effects of our proposed solutions.

Careers

At Cyber Centurion, we recognize that our employees are investing their time and skills in our company.  We believe in investing in our employees.  Our competitive benefits include 401K, Health care, Dental, Vision, Paid holidays to match federal time off, Retirement planning, Tax assistance and much more.

Hot positions:

HOT – Senior Data Scientist – HOT

HOT – Data Scientist – HOT

HOT – Computer Engineer, Data Systems – HOT

HOT- Computer Scientist, Data Analysis – HOT

HOT – Computer Engineer, Data Administration – HOT

Security Control Validator – Technical Assessor

Security Control Validator – CSSP Technical Assessor

News

What I Learned About Leadership During A 24-Hour Adventure Race

Originally posted on July 7, 2020 @ 10:25 pm Recently I competed in a 24-hour Adventure Race designed to test your physical, mental and emotional fortitude and abilities.  I signed up months ago with a good friend to compete in the 2-person coed category. We’re both in good shape, and figured with some training, a …

Introducing Cyber Centurion

Originally posted on June 26, 2020 @ 5:00 am Over the past 22 years, I’ve developed a passion for helping clients identify and remediate cyber and systems challenges.  That passion can be seen in the demonstrated successes in IT and security across Education, Commercial, International, Federal, Department of Defense and Intelligence Community markets and clients. …

Cyber Security During A Merger or Acquisition

Originally posted on October 14, 2020 @ 4:50 pm In my professional career, I’ve seen several mergers and acquisitions from the inside. Whether it was from the acquiring company or acquired, as an individual contributor, manager or executive, each had one thing specifically in common: it was the most dangerous time for both organizations’ information …