CORE-CSI understands today’s dynamic threats to our customers. Our computer security professionals.

Cyber Security

CORE-CSI understands today’s dynamic threats to our customers. Our computer security professionals are well-versed in security best practices mandated by various federal mandates. We follow industry standards and best practices, Department of Defense and Intelligence Community Standards, and National Institute of Standards and Technology to mitigate and defend from Advanced Persistent Threats (APTs).
We provide advanced Computer Network Operations (CNO) and Computer Network Defense (CND), and Information Assurance (IA) services in support of our customers’ missions.  CORE-CSI incorporates the NIST-based Risk Management Framework (RMF) to track, prioritize, and mitigate vulnerabilities.

Area of Expertise

Our cyber security professionals and solutions help secure information, infrastructure, and personnel from threats and attacks to prevent the loss of valuable data and resources. CORE-CSI offers cleared, experienced, certified, and skilled security professionals with expertise across a wide range of programs and information security engineering services.

Information Assurance Services

Service Area

  • Preparation of A&A packages for varied Impact levels system (HHH – MMM – LLL)
  • Development of security classification guides based on ICD-503, NIST 800-53, and Concepts of Operations (CONOPS).
  • Preparation of System Security Plans (SSPs) and System Security Authorization Agreements (SSAAs).
  • Development of security inspections, patch management processes, assessments, and recommendation of mitigation

Operational Security

As one of the world’s leading cybersecurity service providers, we are best placed to help businesses identify, assess, mitigate & respond to the cybersecurity risks they face. We provide our customers with peace of mind that their most valuable assets are protected through an unrivaled suite of services.

Services Area

  • Security and Privacy Assessment
  • Security and Data Privacy Consulting
  • Ethical Hacking – Technical Assessments
  • NIST Security and Risk Standards
  • ISO Security and Risk Standards
  • Chief Information Officer as a Service (CISO)
  • Information Security Expert as a Service (ISE)
  • Vulnerability Assessment
  • Network Penetration Testing
  • Web Application Security Assessment
  • Wireless Network Security Assessment
  • Social Engineering / Phishing Simulation
  • Physical Security and Penetration Testing

Areas of Support

Domain Areas

  • Imagery intelligence (IMINT) Systems
  • Health and Grants Management Systems
  • Human intelligence (HUMINT) Systems
  • Financial Management and Budgeting Systems


United States Army

National Geospatial Agency