Quasars News

September 2022Quasars has been awarded a task order to provide Integration and Program Management support to the DHS Office of the Chief Readiness Officer.

> All News...


Quasars has been supporting cyber projects since 2003 including federal information security, risk/vulnerability management, and Assessment and Authorization (A&A) at ED, NIH, DHS, and DoD. Quasars capabilities include implementation of the Risk Management Framework and ensuring compliance with FISMA, FIPS, NIST, and other key standards and guidelines. Quasars has expertise in risk assessments, security planning, cloud transition, security policies and procedures, contingency planning and incident response planning, as well as security awareness, cyber outreach, and training. Our cyber professionals have certifications including PMP, CISSP, CASP, CISM, CISA, CRISC, CEH, CAP, and various GIAC certifications.

Quasars currently supports the DHS cybersecurity mission through technical consulting and quality assurance support for cyber threat data repositories. Our cyber successes attest to our capability to deploy the necessary people, processes, and tools to support agency and department wide cybersecurity missions alike. In order to provide technical support to federal cyber initiatives as they emerge, our ability to understand cybersecurity requirements and effectively implement processes to meet them is paramount. Our approach offers clients a mix of personnel ideal for supporting the full range of cybersecurity requirements. The breadth of our active cyber engagements ensures that we can provide elite cybersecurity talent along with other functional experts who collaborate to provide optimum solutions. Our internal management and leadership is steeped in the cyber mission and able to identify, attract, and retain cyber talent.

Quasars’ Cyber capabilities include proactive and reactive cybersecurity services. A selection of our capabilities are described below, followed by a more comprehensive list of our service offerings.

Security Architecture Review (SAR)

Quasars evaluates our client’s security posture to determine whether they have properly architected cybersecurity solutions. We ensure that agency leadership fully understands the risks inherent implemented cybersecurity solutions. We utilize in-person interviews, documentation reviews, and evaluations of the environment and supporting systems to provide a holistic analysis of how an HVA’s individual security components integrate and operate, including how data is protected during operations.

Systems Security Engineering (SSE)

Quasars identifies security vulnerabilities and minimizes or contains risks associated with these vulnerabilities throughout the Systems Development Life Cycle. SSE focuses on, but is not limited to the following security areas: perimeter security, network security, endpoint security, application security, physical security, and data security.

Risk and Vulnerability Assessment

Quasars assesses threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. Our services include Network Mapping, Vulnerability Scanning, Phishing Assessment, Wireless Assessment, Web Application Assessment, Operating System Security Assessment (OSSA),and Database Assessment.

Incident Response

Our services help organizations impacted by a cybersecurity compromise determine the extent of the incident, remove the adversary from their systems, and restore their networks to a more secure state. IR is an integrated process that incorporates digital forensics to ensure evidence is retained for investigation, briefs System Owners and CISO on current and emerging threats and attack vectors, and includes training to ensure that users and stakeholders receive reinforced security awareness leveraging lessons learned from incidents.

Penetration Testing

Our assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network. Lessons learned may then be used to improve security by addressing vulnerabilities and additional staff training. Staff pen testing certifications include: CEH, LPT, OSCP, CEPT, CRTOP, CPT, PenTest+, GXPN, GPEN.

Biometric Security

Quasars is a leading provider of Biometric Systems Engineering and Technical Assistance (SETA) support to Department of Homeland Security (DHS) components and other federal agencies. Our prime contracting experience includes the management of large technology and systems-based programs including multiple programs within DHS at the Transportation Security Administration (TSA) and the Department of Defense that include support to Biometric programs and systems, Information Sharing and reporting.

Quasars has biometric experience at DHS, DOJ, DoD and the Intelligence Community. We are comprised of proven professionals that have the technical qualifications and proven corporate experience to support diverse Biometric Identity Management Projects. Our work in Information Management within DHS, DoD and the DOJ has given Quasars valuable insights into their needs and how technology can be leveraged to project a wide range of Biometric Identity programs and requirements.

Information Security Service Offerings
Access Control
Contingency Planning
Configuration Management
Segregation of Duties
Enterprise Security Management & Compliance
Identity & Access Management
Information & Communications Infrastructure Security
Certification & Accreditation
Implementation Training
Security Monitoring & Incident Response
Security Assessment & Analysis
Information Assurance
Risk Management
FISMA Compliance
Security Governance
Security Architecture Implementation
Cloud Security
Strategic Communications and Outreach
Data Sharing Initiatives
Manual Identity Sharing
International Information Coordination
Biometric Vulnerability and Gap Assessments
Biometric Roadmap Development and Analysis
Biometric Database Development
Definition of Threat Vectors
Risk Based Screening Methodologies for Biometrics
Biometric Information Sharing
Data Fusion and Enterprise Architecture support for Biometric and Security Image Sensor Arrays
Identity Fraud Detection