Cyber Security Solutions

Cyber Security Solutions


Our product agnostic approach aims to be disruptive by asserting that ‘real ’Cybersecurity cannot be achieved by plugging another ‘shiny box’ into a network. ‘Real’ Cybersecurity is achieved through subject matter experts, not products. In our humble opinion, most organizations already have all the

products they need to achieve an acceptable level of Cybersecurity. What they

desperately need most is to be shown how to effectively and efficiently employ those products and tools. In essence, their most pressing need is for someone

to assist them with maximizing their existing investment.

About Agile Cybersecurity Solutions

ACS has become a trusted leader in Cybersecurity. Our unique combination of proven methodologies and multi-disciplined cyber expertise forms a proactive, end-to-end Cybersecurity solution. ACS offers everything that’s required to build a strong defense against the cyber threat, but also to keep you one step ahead of it.

Vision Statement

Our vision is to develop market distinction innovations around the concept of “precognition,” a holistic approach to cyber security, bridging the gap between social sciences and artificially intelligent technologies, utilizing mathematical algorithms and top industry cyber professionals, all of it with a laser focus on PREDICTING, PREVENTING and PERSISTING against cyber incidents ... anytime and from anywhere.

Why OTR?

Our single most important differentiator that sets us apart from others in the Cybersecurity industry is the trusted partnerships that we have formed with the best and brightest Cybersecurity talent over the past 30 years, through our cybersecurity team's program.

Cyber SEAL Program

In today’s economy, an agile workforce is the new normal. The Cyber SEAL Program is designed to attract the best and brightest talent in Cyberspace. We have found that most of the talent we are seeking cannot be hired through traditional means. We have developed this program to accommodate the needs of a growing segment of our workforce that is not interested in traditional relationships, providing us with another venue for satisfying our clients’ need for world- class Cybersecurity talent. These Cybersecurity practitioners integrate seamlessly with existing teams and act as a catalyst for quick and decisive action, critical to next generation Cybersecurity services and solutions.

Cyber SEAL Performance

Intrusion Detection/Managed Detection & Response (MDR)

Cyber SEALs manage 24x7 operations of intrusion detection system (IDS). At the Pentagon, this solution involved a team of 14 operators monitoring the output of multiple IDS products, each serving a specialized role in the detection of advanced and persistent threats (APTs) to US national security and in support of the warfighter. This engagement required a deep understanding of the characteristics of the information generated by each

component and how to correlate events so that the Pentagon could distinguish

true threats from noise.

Security Information & Event Management (SIEM)

Cyber SEALs implement, and tune SIEM/ Security orchestration, automation, and response (SOAR) systems. We recently led the implementation of a SIEM/SOAR system for a New York- based Health payer. The project required building use and business cases for collecting real time security event information from multiple mission-critical systems supported by several different software vendors, and then ensuring that the organization took specific actions when threats were realized.

Payment Card Industry (PCI) Data Security Standards (DSS) Compliance

Cyber SEALs establish PCI Compliance programs for

organizations taking credit card payments in person, online, and through call centers. These efforts involve assessing all aspects of an organization’s Cybersecurity program then developing and tracking action plans to remediate identified deficiencies.

Incident Response Planning

Cyber SEALs develop enterprise incident response plans for financial services corporations tailored to their specific governance, organizational, and IT realities. These plans are tested in several tabletop and live scenario exercises involving senior executives from IT, Legal, Corporate Communications, Human Resources, and Facilities. Lessons learned from each exercise result in improvements validated in subsequent exercises, leading these corporations to continuously mature and improve their processes.

Zero Trust (ZTA) & Insider Threat (InT) Strategies, Architectures, Actionable Implementation Plans

Cyber SEALs work with organizations to transform insider threat detection, response, and mitigation capabilities to improve the security posture of these organizations. At the U.S. Patent and Trademark Office (PTO), Cyber SEALs lead the Data Protection, Monitoring, & Insider Threat (InT) Mitigation implementation Program. This program is a significant part of USPTO’s Cyber Security Division, which is responsible for monitoring and responding to all cybersecurity events and incidents, including insider threats.

These services include detecting and rapidly responding to insiders who pose a threat to the confidentiality, integrity, and availability of all Controlled Unclassified Information (CUI) stored, processed, and disseminated. 

Cyber SEALs direct the implementation of services dedicated to improving detection techniques, maturing insider threat incident response, and developing a robust mitigation strategy. These high - profile and key positions also serve as an organization’s primary Cybersecurity technical point of contact overseeing the task order scope and ensuring that services are delivered on-time and meet the quality requirements.

Market Distinct Innovations

Cyber SEALs have collaborated with a former NASA Administrator and his team of biometric & neural computing technology subject matter experts with

the deployment and testing of authentication technology into classified environments.

Client Testimonials

“The ACS Cyber SEAL Program and its elite members are outstanding. Mr. Fernandes, your team’s contribution was exemplary. The team’s attitude in executing all task assignments, willingness to perform any service to assist the greater Team, your skill in working with our clients and personnel from other firms supporting the contract, and your technical efforts in bringing to

client’s attention areas where the greater Team might better serve our client are all attributes worthy of recognition. The Team would have failed in its mission if the ACS Cyber SEALs had not volunteered to deploy on short notice to the [undisclosed OCONUS location]. The high stress environment ACS put itself into on behalf of its teammates, the greater Team, and the client, demonstrated championship level work ethic and professionalism. ACS served as a model to the greater Team and its execution was observed carefully by the

less experienced teammates. Well done!

Ted A. Swisher

Task Manager

Defense Information Systems Agency

United States Department of Defense

“Carlos Fernandes has been instrumental in supporting the DHS CISA Dev Test Environment (DTE) as the ISSO, handling  ever- changing requirements and working with us to improve the process of detecting, remediating, and reporting security issues. His attentiveness to detail and ability to work directly with multiple technical teams made managing and keeping the DTE lab compliant a lot easier from the government side. We appreciate his hard work and contributions to the program!"


Wesley Chen

Lab Manager

Cybersecurity and Infrastructure Security Agency (CISA)

United States Department of Homeland Security

“Our mission has always been to offer our customers solutions and services that can enable business growth, provide improvements in productivity and efficiency, and help protect information as it flows both inside and outside of an organization. Working with ACS, our abilities enter into a new dimension of customer service that can have a profound effect on the welfare of our customers.”

Peter Kowalczuk

President

Canon Solutions America

Share by: