Syndicus offers an array of technical services. Our computer scientists have skills in most of the familiar technologies today, as well as some of the most hard-to-find, critical skill sets required.
Services include the right staff for the right time in the right way: temporary help contractors, contract-to-hire, or direct placements. Syndicus’ technical services solutions aim to improve customers’ business cases.
Some of the technical skills include:
- SAP technicians who analyze, design and program for clients
- CRM Siebel programmer analysts
- C, C+ and C++ programmer analysts
- Java developers in LAMP environments
A few of our technical solutions are:
- Software testing, penetration testing and vulnerability assessments
- Technology selection processes
- Computer system validation
- IT outsourcing
Technology Services – Cyber Security
Syndicus can supply personnel who are subject matter experts in computer network exploitation (CNE), computer network attack (CNA) and red teaming – with many years’ experience inside both the Intelligence Community and government agencies.
From a solution perspective, we specialize in developing custom computer security training, with an emphasis on Computer Network Operations (CNO) and Wireless Reconnaissance; helping develop Information Operations/CNO tactics, techniques, procedures (TTP) and certification; developing specialized software, penetration testing services, malware analysis and reverse engineering.
For software development, we are proficient in C++, Java, C#, Intel Assembly and various interpreted languages, i.e., Python, Ruby and others. We specialize in Windows and Linux operating system internals and have in-depth experience developing Windows device drivers relating to file system internals, network protocols and Universal Serial Bus (USB) devices. Our developers also have many years’ experience developing Windows applications using .NET, ATL, COM/DCOM, ActiveX, MFC, ADSI and Win32 programs.
In the broadest sense, Syndicus specializes in supplying hard-to-find critical skill sets that you many need for your information security programs. In fact, to support HIPAA and HITECH initiatives, we employ security professionals familiar with the healthcare sector, including a Registered Health Information Administrator (RHIA) who has more than a decade of health informatics experience.
The methodology used for our assessments is based on the Open Source Testing Methodology Manual (OSTMM), the Information System Security Assessment Framework Draft and ISO-17799. If tests to be performed are for the purpose of accreditation, certification or validation of compliance with a regulatory requirement (HIPAA, SOX, GLBA, GXP), the client must provide this information prior to the contract execution of a Statement of Work (SOW).
An example of our security assessment scope of work includes:
- Architecture review
- Policy review
- Vulnerability assessment
- Password auditing
- Security awareness evaluation
- Configuration review
- Social engineering
- Wireless security audit
- Open-source intelligence audit
- Data loss prevention (DLP) audit
- Penetration test
- Assessment report
- Remediation plan
Contact Us to for more information on our Technology Services capabilities.
Download our Technology Services White Paper
“DropSmack: How Cloud Synchronization Services Render Your
Corporate Firewall Worthless”
Please fill out the form below and a download link will be emailed to you immediately.