Top Categories

Spotlight

Top Voted
Sorry, there is nothing for the moment.

Compliance, Threat Hunting, and Time-Sensitive Tooling

Organizations leverage SRG for compliance, threat hunting, and time-sensitive software development.

Discover More

Book a Free Discovery Call Today





    Background

    SECURITY RESEARCH GROUP

    The foundation for your secure future

    COMPLIANCE

    The SRG compliance team is unlike any other in the world. Our proprietary compliance automation software is used by organizations like the U.S. Spaceforce and U.S. Navy to streamline and simplify the most complex compliance processes that exist. Trust SRG to help you achieve compliance easily, and in record time.

    SRG auditors have decades of experience with NIST Risk Management Framework (RMF), SOC II, ISO/IEC 27001, FedRAMP, NIST CMMC/CSF, HITRUST, HIPAA, GDPR, PCI-DSS, and more. Our tooling and processes allow our clients to achieve compliance or ATO up to 10x faster than others.

    THREAT HUNTING

    Our firm employs some of the best incident responders, threat hunters, and defensive cybersecurity analysts in the business. We are proud to offer defensive services proactively or during critical moments when clients need it most.

    The operators on our team have SME-level knowledge of many SIEM, EDR, and defensive tools, including: Splunk, Elastic, QRadar, Windows ATP, CrowdStrike, Carbon Black, YARA, Snort, Suricata, Bro/Zeek, Wireshark, SysInternals, Sysmon, Windows Event Logs, NetWitness, BlueCoat, Gigamon, WireShark, Volatility, EnCase, FTK, pfSense, and more.

    CUSTOM TOOLS

    Customized software, tools, and solutions development. We specialize in cybersecurity software development, tailored software tools, and time sensitive development.

    Our operators are highly proficient with the following programming languages, frameworks, and platforms: x86/64 ASM, C, C++, C#, .NET, Windows API, JavaScript, Python, Bash, and PowerShell.
    Ability to deliver production-ready, cross-platform solutions on a wide-variety of platforms, including Microsoft Windows, macOS, Android, iOS, Linux, BSD, and UNIX.


    AUDITORS, HUNTERS, AND ENGINEERS

    Our team of experts have backgrounds and careers working at the highest levels. Available personnel have high-impact resumes and experience working for:

    LEADERSHIP TEAM

    Cody Brown – Cyber Operations

    Cody is a former U.S. Navy CTN, On-Net (ION) Operator, and a graduate of NSA’s elite Remote Interactive Operator Training (RIOT) course. He has previously worked for the NSA, U.S. Cyber Command, and the Army Research Laboratory (ARL). He holds a Master of Information Technology from Virginia Tech and a Bachelor of Science in Cyber Operations from Dakota State.

    Joshua Barnett – Compliance

    Josh is a former U.S. Navy compliance manager and operational leader. He has spent 20 years managing security compliance and accreditation for organizations such as the FBI, Army G-2 DAMI-IM, NCIS, DHA, and NCDOC, and many others. He holds a Bachelor of Science in Computer and Information Systems Security and a CISSP.

    Mason Moran – Engineering

    Mason is a is a former U.S. Navy CTN with 11 years of military service and private sector experience. He has previously worked for the NSA, Navy Cyber Defense Operations Command, Cisco, and Wells Fargo. He holds a Bachelor of Science in Cybersecurity from the University of Maryland.

    Dillon Johnson – Threat Hunting

    Dillon is a former U.S. Navy CTN, threat hunter, and digital forensics expert. He served over 9 years in the Navy leading DFIR teams and building custom forensics tools, then he worked for Adobe, Starbucks SOC, and others. He holds a Master of Computer Forensics and Cyber Investigations from the University of Maryland.

    CERTIFICATIONS

    Our team holds more than 100 industry certifications from top authorities:

    We are your strongest allies

    The ones you can trust and rely on


    Get in touch

    Take the first step to regaining control and reducing risk.


    Email Contacts

    sales@securityresearch.us