CYBERSECURITY SERVICES

OVERVIEW

Lyndon Strategies provides specialized cybersecurity solutions tailored to the evolving needs of the aviation, defense, and radar sectors. Our cyber team brings over 20 years of experience in securing critical infrastructure, implementing risk management frameworks, and conducting vulnerability assessments.

We understand that cybersecurity is a rapidly evolving field in aviation. If your team has a cyber need but isn’t sure exactly what it entails, we’re here to help. We provide expert guidance to assess your needs and offer actionable, results-driven solutions. Below is an overview of our core cybersecurity offerings, certifications, and past performance.

No project is too large or small. Lyndon Strategies is a choice sub-contractor and industry partner for large bids that need industry knowledge and a diversified team. Lyndon Strategies is a certified DOT DBE, WOSB, and SDVOSB.

NAICS

NORTH AMERICAN INDUSTRY CLASSIFICATION SYSTEM (NAICS)
  • 541511 – Custom Computer Programming Services
  • 541512 – Computer Systems Design Services
  • 561621 – Security Systems Services
  • 541519 – Other computer-related services
  • 541690 – Other Scientific & Technical Consulting Services

FEDERAL

U.S. FEDERAL CONTRACTING SYSTEM
  • DUNS – 118005432
  • CAGE – 8ZMA8
  • UEID/SAMS – PT68ELY99E39

INDUSTRY CERTIFICATIONS
& EDUCATION

  • Certified Information Systems Security Professional (CISSP)
  • Security + CE
  • Cyber Systems Operations Course (U.S. Air Force & Dept. of Defense)
  • FAA Part 25 Aviation Certification
  • M.S. | Cybersecurity
  • B.S. | Computer Science
  • Top Secret Clearance

SERVICES

CYBERSECURITY OFFERINGS

Our cybersecurity approach aligns with the Certified Information Systems Security Professional (CISSP) framework, ensuring the most up-to-date practices across all cybersecurity domains:

  • Security and Risk Management: Prevention
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security
CONTRACTING & COMPLIANCE READINESS

We support FAA, DHS, and DoD cybersecurity compliance, including Federal Cybersecurity Compliance Terms: CMMC, RMF, and Zero Trust implementation for aviation and defense clients.

EXPERIENCE

CYBERSECURITY OPERATIONS & SUBCONTRACTOR SUPPORT
  • Cybersecurity Maturity Model Compliance (CMMC)
  • Security Control Assessment (SCA)
  • Supply Chain Risk Management (SCRM)
  • Cooperative Vulnerability and Penetration Assessment (CVPA)
  • Adversarial Assessments (AA)
  • Software Composition Analysis (CSA)
  • Continuous Monitoring (CONMON)
  • Model Based Systems Engineering (MBSE)
  • Information Assurance Vulnerability Management (IAVM)
  • Penetration Testing & Vulnerability Mgt
  • Security Technical Implementation Guide (STIG)
  • NIST 800-53 and 800-171
  • Zero Trust Architecture (ZTA)
  • Technical Tools & Platforms
    • Nessus
    • Open VAS
    • Subversion (SVN)
    • VirtualBox & VMware
    • JIRA/Confluence
    • Linux OS
    • Q-53 Flash
    • Scrum, Agile, Program Mgt

PAST PERFORMANCE

  • Risk Management & Compliance: Provided end-to-end risk assessment expertise, assessment, implementation, and Risk Management Framework (RMF) monitoring for aviation and defense clients.
  • Secure Data Sharing: Researched, designed, and developed cryptographic sharing solutions for classified data workflows.
  • Supply Chain Security: Directed supply chain attack risk assessments with program development to include: policies, technical procedures, and program knowledge continuity artifacts.
  • Software & Systems Security: Executed software composition analysis (SCA) and continuous monitoring (CONMON) for supply chain threats.
  • Software & Systems Security: Utilized Model Based Systems Engineering (MBSE) with modem security tools to design cyber resilient safety in systems.
  • Aviation & Embedded Systems Security: Performed product, application, and OS security for avionics certification of FAA Part 25 transport aircraft & helicopters.
  • Penetration Testing & Threat Intelligence: Developed and executed penetration testing campaigns against embedded applications and designs security mitigations; exploit scripts in bash and python for fuzzing, flooding, MITM, and testing of emerging threats.
  • Penetration Testing & Threat Intelligence: Developed and conducted attack tree threat modeling on software, OS, and interconnected systems.
  • Research & Whitepapers: Authored whitepaper support on advanced cybersecurity topics in pursuit of research projects and partnerships with universities.
  • Program & Incident Response Leadership: Coordinated of multi-disciplinary teams across aviation, cybersecurity, and engineering for problem resolution, deliverables, test events, and milestones.