
Our team of highly trained and experienced professionals can identify and track threats to your network and your organization. In addition to a comprehensive background screening process, professional associates are required to have at least five years of related experience and a Bachelor of Science degree with an emphasis in Anthropology, Sociology, Law Enforcement, Military Science, Information Technology, Telecommunications, or Computer Science. Senior associates are required to have at least 10 years of related experience and a Master of Science degree with a strong emphasis on Information Security and Assurance, or a Juris Doctor (J.D.) degree.
All associates are required to earn and maintain Information Technology related certifications issued by (ISC)2, Cisco, Microsoft, Novell, EC-Council, GIAC, CWNP, CIW, CompTIA and other industry recognized organizations.
Contract services are strictly confidential.
Our Mission and Methodology
We live in a a rapidly changing, globalized economy. The Internet is increasingly used as a primary attack vector by rogue hackers, organized crime syndicates, and terrorist organizations. High profile individuals, businesses, and government entities are at significant risk of attack with potentially catastrophic results.
What we don't quite understand as seriously as we should is the extent of malicious cyberactivity that grows, that is growing now at unprecedented rates, and with extraordinary sophistication"
Covert Cyber Ops employs sophisticated techniques and technologies to gather relevant and actionable intelligence within legal constraints and internationally recognized agreements. Covert Cyber Ops provides comprehensive threat assessment and analysis, with strategic consultation and advisement. Real-time offensive and defensive notification is provided before, during, and after an attack event. Covert Cyber Ops enables the client to secure sensitive data and assets, while revealing potential and actual attack vectors and methodologies.
The information provided by Covert Cyber Ops is actionable and can be used to prosecute a legal retaliatory strategy against attackers, including the implementation of effective asset defense and risk mitigation strategies.