At BE, we build resilient cyber infrastructure and platforms resulting in commercially backstopped unattributed cyber infrastructure for our clients. Our teams perform Cyber Operations proactively creating and launching offensive cyber operations and aggressively counter adversarial attacks. BE performs technical operations, collection, analysis and reporting for:
- Computer Network Operations
- Computer Network Defense
- Cyber Threat Intelligence
- Counter Intelligence
How BE Differentiates Offensive Cyber:
BE has been supporting the Intelligence Community (IC) delivering cyber defense, exploitation, and analysis services since 2014. BE has supported the Federal Bureau of Investigation (FBI) in particular for over 20 years. In support of our classified clients, we work closely with FBI detailees to coordinate cyber intrusion information, enabling cyber intelligence sharing and gap identification. Our teams bring regional expertise and real time threat and forensic analysis where we identify adversarial activity trends.
By combining our FBI program experience and our full-spectrum cyber operations support from a classified client, we are well positioned to address the Operational Technology Division (OTD’s) cyber needs. BE supports every aspect of the cyber operational life cycle both offensively and defensively – including computer network intrusion and exploitation, operationalized pen testing, and implementing best practices to ensure we stay safe while we operate.
From an offensive cyber operations perspective, we conduct:
- Computer network exploitation (CNE) analysis – our teams infiltrate target networks, extracting and collecting data using COTS tools.
- Operationalized pen testing – our teams conduct Security Evaluations and penetration testing of GOTS and COTS products for proposed technology acquisitions.
- Physical Access – we deliver field physical access support to enable remote access and our teams are familiar with and enable wi-fi access points
- Working towards DevSecOps solutions in concert with our clients
From a defensive cyber optic, we conduct cyber threat hunting. Our teams assess technologies and software to determine security postures and risks and identify exposures. We compute defensive strategies with our understanding of proxies, firewalls, and Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) and are familiar with network communication protocols. Our teams work with Wi-Fi access points, possess both cyber and forensics technical skills, and use forensics tools such as Forensic Toolkit (FTK), Paraben, Helix, Ilook, Xways, WireShark, and FireEye.
Combined with our offensive cyber capabilities, we bring Technical Analyst and Targeter experiences to our clients’ missions, identifying and assessing vulnerabilities and technology trends, and combine them with technical operations and activities – with our clients receiving actionable leads that they can act on to proactively built targeting packages. Our Technical Analysts have experience examining collected data and/or media, using MacOS, working with mobile technologies, and programming (i.e., Java, C, C++, Perl, Python). Our teams collect HUMINT and cyber information to further operations by reviewing attribution, conducting link analysis, and then coordinating the findings with headquarters and the field to generate potential concept of operations (CONOPS).
Our operational cyber life cycle capabilities enable our clients to address cyber threat requirements with fulsome planning, collection, exploitation, analysis, and dissemination of cyber operations.
Capabilities:
We understand the unique challenges facing our nation and our highly skilled consultants deliver services that protect against the full spectrum of conventional and asymmetric threats. More broadly, our experience supporting the missions of the intelligence, defense, and law enforcement communities – combined with our technical and human-centric capabilities in the areas of data analytics, CI operations, and offensive and defensive cyber operations – enables us to design, deliver, implement, and support OTD’s mission.
Contracts:
Our operational IC experience can be provided in a classified forum if interested. We welcome an opportunity to more fully brief your program office.
- GSA Multiple Award Schedule (MAS)
Contract Number: 47QTCA18D00EV - CIO-SP3 Unrestricted GWAC
Contract Number: HHSN316201200055W
Angelina Michetti
Director, Intel Growth
570-259-2225
amichetti@renxtech.com