P E Systems provides Cyber Security and Operations services for both DoD and other government clients at CONUS and OCONUS locations. These services include intrusion detection/prevention, cyber defensive operations, Public Key infrastructure (PKI) and IT operations.
Intrusion Detection/Prevention and Cyber Defensive Operations: P E Systems security engineers monitors customer networks and systems for signs of malicious or unusual activity using a broad variety of intrusion detection systems, network forensics tools, and protocol analyzers. (Snort IDS, Sourcefire IPS, Riverbed Cascade Shark network analysis tool, SysLog, NetIQ Security Manager, and Splunk). We operate and maintain a nationally deployed infrastructure of security devices and software that include Snort IDS’s, Sourcefire IPS’s, Forescout CounterACT appliances, Splunk instances, Cascade Shark appliances, and various CentOS based open source software tools and packages. We participate in analysis of appliances, systems, software, configurations, and other technology solutions to determine impact and risk for deployment in the organizational network, and the identification associated appropriate monitoring and prevention solutions in accordance with the latest NIST 800 series, and customer security requirements and policies. We develop, test, manage, and deploy Snort and Sourcefire IDS/IPS policies with numerous intrusion rules set to alert, pass, and drop traffic. In conjunction with the customer’s ISSO personnel, we develop and refine incident response processes, activities, risk factors, roles, and responsibilities.
Public Key infrastructure (PKI): P E Systems provides on-site technical support for the SIPRNet Token Management System (TMS), Local Registration Authority (LRA) Subject Matter Expert (SME) for DoN Public Key Infrastructure (PKI), to assist in the protection of Class 3 DoD Certificates and Networks from unauthorized disclosure, theft, assault, or sabotage. Also, to provide Key Management Infrastructure (KMI) support by performing data entry and research through operation of KMI Manager/Client (MGC) workstations in order to perform duties specific to the transition of existing Electronic Key Management System (EKMS) Tier 2 accounts through registration and enrollment as well as update and maintain information specific to Communication Security (COMSEC) and cryptographic keying material, codes and authenticators that protect the telecommunications and weapons systems in the Department of the Navy.
Communication Security (COMSEC): P E Systems has experience providing Communication Security (COMSEC) account management and support to the Air Force’s (AF) Electronic Key Management Systems (EKMS) and AF Key Management Infrastructure (KMI) programmatic enterprise. Our staff provided acquisition and technical expertise that supported the development, acquisition, integration, test, deployment, and sustainment of cryptographic keys and devices, information assurance, and key management requirements. Our COMSEC Manager’s End Crypto Unit (ECU) experience included IFF (Identification Friend or Foe) KIV-77, KIV-78, KIT-1C, KIR 1-C, APX-124, APX-117/118 KY-58, KY-68, KY-100, KG-84, all families in the KIV-7’s and KIV-19, all families in the KG-175’s, and KG-250.
We hire personnel who possess the required certifications and security clearances to support any customer cyber need. They maintain currency with the technology using internal and on-the-job training. When possible, staff are cross-trained to provide backup and surge support. Our personnel utilize our QMS processes and customer best practices to ensure that quality is imbedded in our analysis, development, test, and maintenance actions.
For a detailed list of our Cyber Security and Operation disciplines, click here.