Ceiling and Visibility Unlimited

Cybersecurity Engineering

CaVU Consulting, Inc. is a premier provider of Cybersecurity services to the US Navy and Department of Defense (DoD). Member’s of CaVU’s CyberSecurity Workforce possess Certified Information Systems Security Professional (CISSP) and Certified Secure Software Lifecycle Professional (CSSLP) credentials, as well as certifications and training in multiple Microsoft and Unix operating systems, Cisco networking hardware, and various DoD C4I systems and applications.

CaVU Cybersecurity Engineers and Analysts are helping progress some of the most advanced platforms and applications in the Navy’s portfolio to date. CaVU is leading the charge with establishing a secure and operable unmanned airborne system (air, ashore and afloat segments) that will advance the force projection of tomorrow’s Navy. Likewise, CaVU is a valued contributor to establishing and advancing security measures and operations for Navy network service providers. This encompasses aiding in an Agile software development process for automated troubleshooting of software defined networking (SDN) components at both the end-node and infrastructure points of the Navy’s most relied upon network connectivity program.

Services Include:

  • National Institute of Standards and Technologies (NIST) Compliant Systems Security Engineering
  • Risk Management Framework (RMF) Transition, Intelligence Community Doctrine (ICD) 503 Guidance and Reciprocity Consultation
  • Operational Test and Evaluation of Cybersecurity in Acquisition Programs
  • Specialization in Naval Information Warfare Center, Pacific (NIWC PAC) and Naval Air Systems Command (NAVAIR) approval processes for Interim and Operational Accreditations
  • Program Protection for Complexity Levels Ranging from Small Independent Standalone Systems to Acquisition Category (ACAT) Level 1
  • Cyber Failure Modes, Effects, and Criticality Analysis (FMECA) – Critical Path Analysis
  • Secure Software Lifecycle – Working with Software Development Teams to Build in Security and IA Compliance from Inception Through Production
  • Computer Network Defense – Boundary Defense and Host-Based Security
  • Security Assessments, Penetration Testing, and Independent Verification and Validation
  • Information Assurance (IA) Compliance – Inclusive of Scanning, Analysis, Patching, Remediating
  • Enterprise Mission Assurance Support Service (eMASS) & Xacta Package Development, Submission, and Maintenance
  • Cross Domain Solutions (CDS) – Capabilities Definitions, Systems Design Integration Between Enclaves, Guidance and Development & Representation for Approval Packages