DCMG recognizing the need to recruit retain and properly train cybersecurity experts. DCMG employs qualified cybersecurity experts with experience identifying and analyzing sophisticated cybersecurity threats. The Department of Defense Directive 8570 governs the information assurance functions of Department of Defense systems and those with access to them. DoD 8570 establishes the policies and responsibilities of Department of Defense information assurance, including training, certification and workforce management. DCMG ensures all personnel meet 8570 prior to assignments.

  • Security Scans/Manual Checks for Systems and Lab Environments
  • Risk Management Framework (RMF)
  • Security Assessments in Support of Information Assurance Vulnerability Management (IAVM)
  • Database Design, Administration and Management
  • Hardware/Software Inventory Verification for Supported Systems
  • Conducting/Documenting System Security Plan Analyses for Supported Systems
  • Penetration testing
  • Security testing
  • Verification/Validation Systems Compliancy with IA Controls/Requirements
  • Updating/Maintaining CM SOPs Network Security and Diagram Design
  • Updating/Maintaining Testing Standard Operating Procedures (SOPs)
  • Security Patch Rollups
  • Vulnerability Remediation Asset Manager (VRAM)
  • eMASS
  • Transition from Department of Defense Information Assurance Certification and Accreditation Process ( DIACAP) to RMF