ON THE CYBER HUNT

ADVERSARIES IN CYBERSPACE CAN ATTACK UNSEEN. WE KNOW HOW TO FIND THEM, SEE THROUGH THEIR CAMOUFLAGE, IDENTIFY WHERE THEY’VE BEEN, AND TRACK WHERE THEY’RE GOING. WE CAN ANTICIPATE THEIR MOVEMENTS TO PREDICT THE NEXT ATTACK.

INGENUITY PREDICTS

SAIC KNOWS YOUR ADVERSARIES’ MOVEMENTS—AND THEIR NEXT MOVE
In today’s hyper-connected world, where threats loom as large as opportunities, cyber is foundational to everything. SAIC analyzes and predicts cyberattacks to build secure, agile, and adaptive systems.

STAYING AHEAD OF THREATS

INNOVATIVE APPROACHES TO CYBERSECURITY AND PREPAREDNESS

WE GO BEYOND NETWORK SECURITY. Deterring, denying, and preempting attacks by adversaries begins with deep, accurate visibility into networks and IT systems. To keep predatory movements and activities in sight at all times, SAIC delivers continuous monitoring and data analytics tools developed with industry-leading partners. Our cyber situational awareness, combined with our long history of support to the Intelligence Community, provides visibility into events beyond the enterprise boundary, to anticipate, assess, and map changes in the shifting battlespace.

CYBERSECURITY MANAGER:
KESTER BUCKMIRE

Kester Buckmire leads a robust team of cybersecurity and intelligence professionals who are at the forward edge of providing support to our nation’s Department of Defense. He has a passion for computer science and strives to build trust with customers and exceed their expectations by staying relevant to their missions. “Interacting with innovative professionals and being part of an industry that underpins almost everything we do nowadays makes me enjoy what I do,” he commented. “There is never a dull moment in cyber.”

ON THE MOVE, READY TO ACT

THWARTING INTRUSIONS AND MAINTAINING PREPAREDNESS AGAINST PROJECTED THREATS

SAIC KNOWS CYBER IS A COMPLEX AND CHANGING ENVIRONMENT, one requiring a persistent and coordinated security posture. Our seasoned and nimble team—which includes former U.S. Cyber Command joint qualified officers and cyber service component leaders—has the deep expertise in cyber joint operation planning and coordination necessary to rapidly and efficiently execute on cyber operational orders.

WE PROVIDE THE FOLLOWING CYBER OPERATIONS SERVICES:

  • Cyberspace Operations
  • Intelligence
  • Analytics
  • Engineering
  • Training
  • Wargaming

THE INTERNAL WATCH

INSIDER THREAT DETECTION

SECURITY CAN BE COMPROMISED BY THREATS WITHIN, not just external actors. Our active cyber defense augments computer network defense measures with advanced analytical “hunt” capabilities—collecting activities and performing data aggregation, correlation, and trending—to identify real-time anomalous behaviors inside the network.

For U.S. Central Command (USCENTCOM), active cyber defense services identify roles, authorized activities, and data access rights in support of insider threat investigations. Our data collection tools improve detection and analysis of real-time adversarial actions within the USCENTCOM environment, supporting watch officers with hunt operations in information system security activities.

NETWORK AGILITY AND RESILIENCE

SYSTEMS BUILT TO BEND,
NOT BREAK

Our innovative solutions are designed and built with cybersecurity in mind. Agile and resilient to cyberattacks, our systems remain operational while simultaneously resisting hacking attempts from adversaries.

MITIGATING CYBERATTACKS

SAIC cyber architecture and engineering experts design security into systems and infrastructure. With tailored security services—including penetration testing—network operations are fortified, vulnerability gaps are filled, and tasks are automated.

STRATEGY. POLICY. GOVERNANCE. COMPLIANCE. Mission assurance rests on a foundation of airtight, end-to-end cyber frameworks built for both current and future needs. SAIC experts evaluate and validate existing network security controls and then establish a dynamic, reliable, full-life-cycle cybersecurity operations and management structure. Our proven approach balances risk tolerance, budget, and size or type of network.

Our commitment to cyberattack mitigation starts with SAIC CyberSecurity Edge™, a proven and repeatable network implementation solution.

LEARN MORE

PENETRATION TESTER:
TRACY WILLIAMS

Tracy Williams is relentless in his pursuit of deeper understanding about not just the hows, but also the whys, of hacking.

He thrives on discovering how operations systems interact with other information systems. He also enjoys training warfighters one-on-one, using non-traditional techniques that help them think differently about malware and cyber adversaries.

Tracy even practices his cybersecurity techniques and methodologies on his own time. “I don’t think you can ever know enough,” he says. “The more we connect, the greater the threat becomes. It’s a never-ending battle of risk as more and more devices go online. Cybersecurity will never go away.”

A CYBER STRONGHOLD

U.S. ARMY CYBER

SUPPORTING THE ARMY’S CYBER MISSION

ENDURING THREATSCAPE. Adversaries are always looking to exploit a vulnerability, whether it's through infrastructure, situational awareness, or mission applications. We are securing the mission with information assurance for personnel systems, defensive cyber engineering for logistics, and advanced cyber and intelligence integration.

SECURITY, ASSURANCE, AND READINESS. U.S. Army Cyber Command (ARCYBER) is responsible for training and fielding a robust Army cyber force. We’re supporting the Army’s Cyber Center of Excellence in Augusta, Georgia, with needs analysis and delivery of cyber curriculum. Working collaboratively with Augusta University, we’re supporting the Army’s readiness mission by preparing a next-generation cyber workforce.

U.S. CENTRAL COMMAND

KEEPING SCORE FOR THE HUNTER. SAIC provides a full range of cyber services, including inspection criteria and review, certification and accreditation, incident management, cyber hunt, and insider threat mitigation.

Using an SAIC-developed tool called the Cyber Scorecard, our large team of cyber experts assisted USCENTCOM in their assessment of the health of their networks, identifying vulnerabilities and resource needs. The Cyber Scorecard also helped bolster USCENTCOM’s boundary defense and reduce cyber risk for the Combatant Command. We were instrumental in helping USCENTCOM earn the highest network inspection rating by the Defense Information Systems Agency.

MOVING FORWARD » TOMORROW’S CYBER WARRIORS

Workforce Development

Cyber is everywhere and threats keep changing. That’s why we’ve invested in the SAIC Cyber Institute, which provides our employees training in the latest cyber trends and technologies. We’re helping them quickly respond to changing mission challenges while advancing their careers.

K-12 Education

We’re inspiring K-12 students to pursue careers in cyber through the Cyber Academy at Huntsville City Schools in Alabama, and in community events such as AFA’s CyberPatriot cyber defense competition and the Virginia Beach STEM Trifecta Challenge.

LEARN MORE
Cyber Training

Preparing our service members and government civilian employees to recognize and prevent cyber threats helps secure our nation. Our cyber training experts have developed interactive cyber courses on detecting and managing emerging cyber threats.

LEARN MORE

REDEFINING INGENUITY

SEE THE WORLD DIFFERENTLY
 
TRAINING THAT IMPROVES PERFORMANCE
 
UPGRADING VEHICLE AND WEAPONS SYSTEMS