Information Technology & Cybersecurity
Kaizen Approach leverages decades of experience in supporting the Intelligence Community and DOD to the greatest benefit of all our government customers.
Stronger Cybersecurity
Kaizen Approach is a trusted, reliable, and engaged partner that has years of experience advancing the government mission through prime and sub-contract vehicles. Plus, we are a Service-Disabled Veteran-Owned Small Business (SDVOSB) and have been in business since 2009.
We have a proven track record of delivering highly trained and certified individuals who are passionate about their work, proactive in their actions and can push through the challenges that can arise. Then, as a smaller company, we have the agility to change course if requirements change and have the ability to respond quickly throughout every stage. All of that is built on a foundation of objectivity. Because we do not sell products, we can offer unbiased assessments and freely implement the solution that is right for the circumstance. It also qualifies us to remediate findings from penetration testing or vulnerability assessments impartially.
Why Choose Kaizen Approach?
- U.S. Department of Veterans Affairs certified Service-Disabled Veteran-Owned Small Business (SDVOSB)
- International Traffic in Arms Regulations registered (ITAR)
- Follow Generally Accepted Accounting Principles (GAAP)
- Accounting system deemed adequate by the Defense Contract Auditing Agency (DCAA)
- Expertise in government and commercial markets
- Vendor-neutral to avoid conflicts of interest
- Dedicated full-time Technical Recruiter, Human Resources & Contracts personnel
A few of the services we provide include:
Cloud Engineering/Security
- AWS management/Security Groups
- Virtual networking
- Virtual firewall design, deployment, management, instance configuration.
- AWS instance creation, configuration, Linux AMIs for Ubuntu, and AWS Linux2
- Audit collection, correlation, tagging – using rsyslog,syslog-ng, nifi, netflow
Security Architecture and Design
- Security evaluation of tenant projects to shared services, firewall inspection
- LAN/WAN boundary and network infrastructure integration of new services and systems
- Product testing and component evaluation
Linux and Windows System Administration (Virtual and On the Metal)
- Patching/IAVM
- OS upgrades
- System maintenance
- Change Control and Configuration Management
Network Engineering
- Routing, switching and firewalls maintenance and upgrades
- DMVPN/overlay networks
- Virtual networking
Help Desk / LAN Technical Support
- Front line support
- Ticketing and escalation
Compliance
- Risk Management Framework (RMF includes SP800-53 and related publications)
- NSA/CSS Information System Certification and Accreditation Process (NISCAP) and Initial Capabilities Document (ICD) 503.
- IATT/ATO/SSP
Cross Domain Systems
- Guard maintenance and operations
- CDS/Guard testing and evaluation
Experienced and Certified
We invest heavily in people and training. We believe that current certifications and ongoing education are critical to staying ahead of potential threats and being able to help our customers protect our country’s most critical IT networks.
- Our security engineers are CISSP certified.
- Our network engineers have CCNA or CISSP certifications.
- Our Linux system administrators are RHCSA certified