IT & Cyber Innovations

IT Support Services

Ethic Tech has a broad range of experience providing IT support services for a variety of Federal Government customers. These services include:

  • CIO/G6 Advisory & Consulting Services
  • Strategic Planning
  • Portfolio Management
  • Cloud Migration Support Services
  • Management Dashboards
  • IT Architecture Design & Implementation
  • Configuration Management
  • ERP Support
  • Software Development & Engineering
  • Verification & Validation
  • Systems & SAN Administration
  • Network Design & Optimization
  • Cybersecurity & Forensics Support
  • Database Engineering
  • Helpdesk Services
  • IT & VTC Infrastructure Services
  • Disaster Recovery/Resiliency Support
  • Data Center Management
  • Public Works Mapping and GIS Services
  • RMF & SCA-V Support Services


Software Development

Ethic Tech designs, develops, integrates, and maintains a variety of Information Technology (IT) applications & systems for customers across the Department of Defense. Focusing on the Agile Development Methodology, we work closely with customers to ensure robust, timely products are produced to meet customer objectives and mission needs.

Our software development services include:

  • Software & Systems Development
    • Web Server Front End and Back End Development
    • Container Development and Orchestration
    • Model and Simulation Development
  • Collaborative Interface Design
  • Requirements Capture & Validation
  • Configuration Management
  • Database Design & Management
  • Data Warehousing Services
  • Mobile Application Development
  • Management Dashboards
  • Project Management
  • Testing & Documentation


Cybersecurity

Ethic Tech provides a wide range of Cybersecurity Services. Our technical professionals adhere to the National Institute of Standards and Technology (NIST) guidelines for all Cyber-related tasks to include supporting customer in Security Control Assessment - Validation (SCA-V) activities as well as Risk Management Framework (RMF) by developing process & procedure artifacts, providing Enterprise Mission Assurance Support Services (eMASS) validation, and developing technical diagrams for obtaining Authorities to Operate (ATOs) for our customers.

Some of the cybersecurity solutions we offer include:

  • Information Assurance
  • RMF & SCA-V Support
  • CCIR Support
  • STIG & IAVA Support
  • Vulnerability and Threat Analysis
  • Defensive Cyber Support
    • Splunk for Enterprise
    • Firepower Threat Defense
    • Stealth Watch
    • Identity Services Engines (ISEs)
    • User-based Analytics (Insider Threat)
  • Intrusion Detection
  • Incident Response
  • Cybersecurity Engineering
    • Threat Modeling
    • Weapon System attack graph creation, scoring, and visualization
    • Operation Survivability through Cyber Resiliency (OSCR) intelligence integration and forensic & triage capability support
  • Threat and Risk Assessment
    • Risk Quantification Methodology
    • Vendor/Supply Chain Risk Analysis, Monitoring, and Visualization
    • Supply Chain Vulnerability Assessment and Risk Management
  • Support for Cyber Security Test Bed (CTSB) to conduct Cyber-Electromagnetic Activities (CEMA) testing of DoD weapon systems and components


Verification & Validation

Ethic Tech accredits HWIL and M&S system through performance analysis, verification, and validation.  These efforts support system test, performance characterization, and interoperability assessment.

  • Analysis and Analytical Tool Development
    • Anomaly, trend, and pattern detection and alerts
    • Root cause determination
    • Automated data process and visualization
    • Environmental effects model implementation and evaluation
  • Verification & Validation
    • Requirements analysis and verification methods
    • Statistical Analysis
      • Test data and truth data comparisons to key parameters
      • Pass/Fail Determination