Cyber Security

CEDELIS develops comprehensive cyber security plans and implementation strategies that incorporate key lifecycle elements and defense-in-depth principles.

  • Security Policies & Procedures
  • Certification and Accreditation
  • Security Design & Integration
  • Vulnerability Evaluation & Testing
  • Operational Support
  • Intrusion Detection Services

System Engineering

CEDELIS analyzes, designs, develops and tests systems to ensure the integration of software, hardware, reliability, maintainability, safety and other requirements in the total engineering effort. These efforts include:

  • Formulating operational concepts
  • Performing mission, functional, cost-benefit and risk analysis
  • Selecting systems architecture
  • Preparing specifications for operating systems to ensure designs meet applicable security specifications
  • Documenting security on both new and fielded information systems
  • Providing support on certification evaluation and test support to ensure all technical security features are considered and functioning properly

Project Management

CEDELIS utilizes dynamic program and project management capabilities, blending Agile and PMI best practices tailored for cybersecurity and IT operations to ensure flexibility, responsiveness, and customer satisfaction.
  • Strategic Alignment & Goals: CEDELIS aligns all activities with the organization’s mission, objectives, KPIs, and OKRs, focusing on ROI with current and future needs.
  • Budget Management: Financial planning is integrated with project and program management to ensure cost-efficiency, considering existing budgets, constraints, and maintenance plans.
  • Testing & Quality Assurance: Rigorous testing and quality assurance are conducted for hardware, software, and networks, with Agile practices ensuring continuous improvement and rapid feedback.
  • Documentation & Training: Comprehensive documentation is maintained for backups, security, and configurations, and training programs keep staff updated on the latest methodologies and technologies.

Project Management

CEDELIS follows Project Management Institute (PMI) best practices, to include processes that are guided through the five stages: initiation, planning, executing, controlling, and closing.

Strategic Goals: Business objectives, target ROI, present & anticipated needs.

Budgets: Existing budgets, budget constraints, systems and infrastructure maintenance and replacement plans.

Project Management & Implementation: Project management, ITSM, resource management, schedule and budget constraint management, change management.

Testing and Quality Assurance: Hardware, software, network testing, and monitoring and quality assurance.

Documentation & Training: Backups, security, change control, configuration guidelines, inventory and topology.

Capabilities Statement

CEDELIS is an 8(a) Service-Disabled Minority Veteran-Owned Small Business (SDVOSB) that offers innovative IT services to Federal and Civilian agencies. We combine real world experience, technical expertise, and willingness to achieve success by being flexible and agile to our customers’ needs. We work closely with our clients to create customized plans that are seamlessly integrated, effective and sustainable.

Company Information

CAGE Code: 86RV3 DUNS: 926054979

NAICS Codes:

541511
Custom Computer Programming Services

541512
Computer Systems Design Services

541513
Computer Facilities Management Services

518210
Computing Infrastructure Providers, Data Processing, Web Hosting, and Related Services

Veteran Small Business Certification

Small Business Association 8(a) Certified

Core Competencies

  • Cybersecurity Services

  • Information Assurance

  • IT Architecture

  • Project Management

  • Operations & Management Consulting

  • IT Modernization

  • Cloud Migration Experts

  • Small Business Set-Aside Participants

  • Program Architecture

Past Performance / Differentiators

DEFENSE ADVANCED RESEARCH PROJECTS AGENCY

  • Tier 1 Cybersecurity Provider: Delivered top-tier cybersecurity services across Unclassified and Classified domains, specializing in Cybersecurity Operations, Cloud Services, and RMF compliance.
  • Mission-Critical Leadership: Spearheaded ATO SCA-V, CCRI, and CCORI assessments, driving successful authorizations and readiness inspections that secure DARPA’s critical missions.

DEFENSE INTELLIGENCE AGENCY

  • Classified Network Security: Executed high-stakes Security Control Assessments (SCA) on classified networks, reinforcing compliance and protecting national security assets.
  • Risk Mitigation Expertise: Identified and mitigated risks, ensuring the robustness of DIA’s cybersecurity defenses against evolving threats.

STRATEGIC CAPABILITIES OFFICE

  • ITX Division IT Support: Provided comprehensive IT services, optimizing infrastructure and security for mission-critical operations.
  • Infrastructure Enhancement: Streamlined IT operations and deployed advanced technologies, enhancing the division’s operational efficiency and mission success.

DEPARTMENT OF THE INTERIOR

  • RMF & Cybersecurity Leadership: Led Information Assurance initiatives, tailoring RMF and cybersecurity strategies for diverse systems and security levels.
  • ISSO Training & Expertise: Delivered expert training and advisory services, empowering ISSO teams with advanced cybersecurity skills and knowledge.