top of page

ALICO Cyber Solutions leverages extensive experience in high threat environments to bring unparalleled security competency.

- Cyber Operations and Mission Support
- Security Operations Center
- Configuration Management
- Key Terrain-Cyber, Security Architecture, and Secure Appliance, Application
- STIG Compliance
- Network Architecture Hardening, Security, and Enumeration

- Systems Administration and Enterprise Exchange
- Risk Mitigation, Intrusion Prevention, Vulnerability Assessments, Threat Hunting, Incident Response, and Ethical Hacking
- Network Architecture Hardening, Security, and Enumeration
- Systems Administration and Enterprise Exchange
- Risk Mitigation, Intrusion Prevention, Vulnerability Assessments, Threat Hunting, Incident Response, and Ethical Hacking
- Cyber Operations and Mission Support
- Security Operations Center
- Configuration Management
- Key Terrain-Cyber, Security Architecture, and Secure Appliance, Application
- STIG Compliance
Past Performance
Defense Information Systems Agency (DISA)
GSM-0 II 2021-present
Network Cybersecurity Assurance

Top Secret Facility Security Clearance

Military Backgrounds

Experience Working Alongside Direct Competitors

bottom of page