Areas of Practice
Security governance & compliance
Federal government agencies are mandated by the Federal Information Security Management Act (FISMA) to understand the security risk posed to their information system and required to take appropriate action. That’s where we come in. Rhim Technologies provides an end to end program including certification and accreditation, implementation, testing, and continuous monitoring related to meeting federal, state, and organizational security requirements. We offer a number of services related to governance and compliance some of which are as follows: developing and maintaining policies, procedures, and processes, security awareness training implementation and tracking, security documentation and maintenance.
Malware/reverse engineering
Malware and intrusion analysis examines malicious software, such as bots, worms and trojans to understand the nature of their threat. This involves reverse engineering the compiled executable and examining how the program interacts with its environment. Malware analysis involves documenting the specimen's attack capabilities, understanding its propagation characteristics, and defining signatures for detecting its presence. The compilation of malware analysis, reverse engineering, and computer forensics build a holistic account of Advanced Persistent Threats (APT).
cyber threat analytics & intrusion analysis
Collection, classification, and exploitation of knowledge about adversaries - Turning this intelligence and analysis into defense by tracking cyber actors and developing pursuit angles with heuristic signaturing of Tools, Techniques, and Procedures (TTPs) to detect, respond to, and defeat Advanced Persistent Threats (APTs). This intelligence gives network defenders the pertinent information that is used to reduce the adversary's likelihood of success with each intrusion attempt.
Information security
Rhim Technologies provides information security services not just to federal agencies but to the private industry as well . We provide services to protect confidential information on our client's networks, including enterprise assessment, security advisory and design/architecture. Information Security Program Assessments are performed to identify threats and vulnerabilities and in return mitigation plans are created for lowering risks for client's financial information systems. We will review your existing infrastructure, analyze the security controls, and document the security capabilities and risks in an official Certification Package. Upon completion of the Certification Package, we will help you put together a Plan of Action & Milestones (POA&M) to address the risks. Our expert consultants will help you determine the appropriate Security Controls for your infrastructure, based on your business requirements and your mission.
big data analytics
Unique analysis for discoveries within large complex datasets which implement strategies that minimize false positives. These discoveries uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful business related information. This capability allows more accurate results when implementing predictive technology solutions.
cloud security
Cloud services are bringing new IT service deployment models to organizations across the public and private sector. With this rapidly growing technology being implemented within organizations it is important that it be adopted within the realm of a security program to ensure effective compliance with security policies and standards. Our security practitioners assess requirements to obtain security authorization and rigorous testing of security controls seeing the process through to a FEDRAMP-ATO.