
Cybersecurity Engineering & Operational Support
VERSA provides full life cycle cybersecurity services and support for firewalls, Virtual Private Network (VPN) concentrators, remote access services, wireless network compliance systems, Information Assurance, and Web usage systems. Our security engineers ensure federal policy compliance management for all managed systems, ongoing research for security risks, and full security documentation packages. VERSA supports system security plans and serves as an engineering liaison to the Office of the Information System Security Officer (ISSO).
VERSA also advises federal customers on security vulnerabilities and tracks mitigation of serious vulnerabilities to ensure that systems remain secure and compliant. VERSA supports the following activities:
Designing of firewall solutions based on NIST guidance and Agency specific Security Policies that incorporate single and/or multiple firewall environments.
Installing, configuring, and maintaining firewall hardware and software into new and existing network infrastructures, including hybrid cloud environments.
Administration of firewall policies and services in accordance with customer specific Security Policies and Change Control Processes.
Monitoring of firewall services to ensure availability and integration with other technical controls, such as email/web security systems, incident response or intrusion detection systems (IDS).
Management of customer firewalls, including periodic upgrades to hardware and software.
Performing firewall rule base reviews as new threats arise and implementing required changes as-needed.
Identifying, diagnosing, and resolving firewall problems including firewall connectivity, rule base issues, utilization, etc. using available tools as needed.
Creating and maintaining comprehensive documentation packages as they relate to firewall topology, equipment, and configuration(s).
Participating in after-hours upgrades, troubleshooting, and on-call availability as needed.
Designing both Remote Access and LAN-to-LAN VPN solutions based on federal guidance and customer based security policies.
Installing, configuring, and maintaining VPN hardware and software into new and existing network infrastructures, including hybrid cloud environments.
Implementing and maintaining both client and clientless remote access VPN solutions for mobile devices that include laptops, smartphones, and tablets.
Establishing, monitoring, and maintaining secure LAN-to-LAN VPN tunnels to external business partners and Cloud networks.
Monitoring and providing reports for remote access VPN services to ensure availability and optimal performance.
Maintaining, operating, and administering two-factor authentication solutions which include appliances, hardware and software tokens and middleware software, and integrate solution with directory services platform.
Managing the customer’s VPN infrastructure, including upgrading hardware and software.
Identifying, diagnosing, and resolving VPN problems including connectivity issues, utilization, etc.
Creating and maintaining comprehensive documentation as it relates to VPN Services topology, equipment, and configuration(s).
Participating in after-hours upgrades, troubleshooting, and/or on-call availability as needed.
Providing IT Security support to the customer’s ISSO and System Owner’s (SO), working closely with System Administrators and other customer stakeholders in support of the overall IT Security Program.
Providing support to the customer ISSO to address findings and Plans of Action and Milestones (POAMS) for all managed systems.
Providing support to the customer ISSO to ensure IT systems have all security controls in place and functioning properly in accordance with current NIST guidance.
Conducting vulnerability tests and assessing results using available tools.
Supporting the customer ISSO with continuous monitoring and risk profiling activities.
Create and package incident related evidence and artifacts for customer managed components for management review.
Designing Content Filtering solutions that include Web Security Gateways and Email Security Gateways, based on current NIST guidance and agency specific Security Policies.
Installing, configuring, and maintaining Content Filtering hardware and software into new and existing network infrastructures, including hybrid cloud environments.
Administering Content Filtering policies and services in accordance with customer specific Security Policies and Change Control Processes.
Monitoring Content Filtering services to ensure availability and integration with other technical controls, services and components, such as firewalls, Data Loss Prevention, Advance Persistent Threat Systems, email platform, incident response and/or Internet Services, etc.
Managing the customer’s Content Filtering system architecture including periodically upgrading hardware and software.
Performing Content Filtering policy reviews as new threats arise and implementing required changes as-needed.
Identifying, diagnosing, and resolving Content Filtering systems problems including policy issues, utilization, etc. as needed.
Creating and maintaining comprehensive documentation packages as they relate to Content Filtering solutions, equipment, and configuration(s).
Participating in after-hours upgrades, troubleshooting, and on-call availability as needed.
Designing a Network Access Control solution that is based on the most recent version of NIST guidance 800-53 and customer specific Security Policies.
Installing, configuring, and maintaining Network Access Control hardware and software into new and existing network infrastructures.
Administering Network Access Control policies and services in accordance with customer specific Security Policies and Change Control Processes.
Monitoring Network Access Control services to ensure availability and integration with other technical controls, services and components, such as firewalls, Wireless Network, LAN, Identity Management Systems, etc.
Managing the customer’s Network Access Control system architecture including periodically upgrading hardware and software.
Performing Network Access Control policy reviews as new threats arise and implementing required changes as-needed.
Identifying, diagnosing, and resolving Network Access Control system problems including policy issues, utilization, etc.
Creating and maintaining comprehensive documentation packages as they relate to Network Access Control system equipment, and configuration(s).
Participating in after-hours upgrades, troubleshooting, and on-call availability as needed.