echo

Cyber Security Operations

At Kearney & Company, we take a proactive approach to addressing the ever-changing and expanding cyber threat landscape facing the government. Our team specializes in various security domains, while integrating our technical expertise with our audit practice. In doing so, Kearney bridges the gap between security and compliance to not only reduce risk and strengthen security, but also ensure our clients comply with all federal requirements. 

Our team of highly sophisticated and diverse security professionals makes implementing all security initiatives seamless, while reducing our clients’ technical debt and threat profile.  

Kearney’s cyber security capabilities include: 

  • Governance, Risk, and Compliance (GRC): Identify gaps, risk issues, and challenges within the overall security program with the goal of reducing the risk of a data breach or security incident while complying with all regulations. Activities include Information System Security Officer support, security control assessments, and enterprise risk assessments.  
  • Security Operations and Engineering: Proactively identify detection gaps within the current security stack. Kearney finetunes all security tools to maximize return on investment while also further enhancing all security capabilities.  
  • Vulnerability Management: Perform automated scanning to readily identify vulnerabilities that exist within a client’s environment and may lead to compromise. Kearney cyber security professionals prioritize remediation strategies based on perceived risk to further reduce the threat landscape.  
  • Penetration Testing: Perform manual testing to identify unknown risks, while reducing the attack surface. Specific testing includes web application, host-based testing, and social engineering.  
  • Security Awareness and Training: Administer various training avenues to test the situational awareness of all personnel. We perform targeted and holistic phishing tests to ensure that all users know how to spot and report suspected phishing e-mails.  

Client Success

“We have been in a remote (telework) setting for seven months now, and I want to express my deepest appreciation for all the hard work you’re doing to keep our mission moving forward. Many of us have a different routine than we did last year, with many more stresses, variables, and challenges to overcome. Without hesitation, your work is more than just keeping the lights on, you’re adding solutions, capabilities, and stability to our network, applications, security, and productivity tools for our agency. The entire leadership from the Chairman on down is aware of all that you do, [so] know that you and your efforts are appreciated by everyone.”

“I’ll take the chance to share that the auditors mentioned potentially receiving an ’Optimized’ level for risk management this week. If that’s in fact the maturity level we’ll be rated at, that would take us up three levels in one year…but regardless of what the audit says, I’m very happy with where the risk management program is and where it’s going.”

“Kearney’s technical knowledge is very impressive, and I truly appreciate the ‘get it done’ attitude.”

Contracts

Please visit our Government and Public Services page for more information on our different contract vehicles.

Andrew Stockel
Principal
Chris Thompson
Principal
To top