Cyber Security Services

Defining digital trust that enables service optimization




Today’s enterprise data systems are highly interconnected and optimized to freely flow data between machines, on-premises databases, cloud based platforms, personal devices, partner and supplier networks and citizens—all while withstanding today’s ruthlessly complex and constantly evolving threat environment. Achieving an optimized security posture in this complex and fluid landscape requires breaking it down into defensible digital domains using cyber security services in lockstep with the evolving Risk Management Framework (RMF). This is now the new federal standard. But getting there requires comprehensive, preemptive threat solutions that identify anomalies and continuously harden your IT infrastructure against enterprise threats over its entire system development lifecycle. This and only this will ensure the continuously adaptive security posture that enables service optimization.

This is our mission and our passion at Akima Global Technology.

A Risk Management Framework (RMF) driven solution

Agile and scalable to any size project, the Akima Global Technology teams respond to today’s threat environment with a risk-based, holistic view of enterprise threats. From this strategic view we design and build a RMF-driven solution that accommodates the mission, incorporates the adaptive architecture, processes, practices, tools, controls, continuous monitoring and authorizations needed to create and sustain secure IT systems within and across digital domains through their evolution and transformation. And in the event that your digital ecosystem has been breached, we provide complete incidence response services that identify the cause and source of the breach, remediate any problem, capture and preserve forensic information, harden the enterprise against future attacks and provide complete continuity of operations (COOP) and disaster recovery support services.

Aligning the DOD Risk management Framework with the entire System Development Lifecycle provides our customers a security solution that continually adapts to today’s evolving threat environment

Ensure the safe and uninterrupted flow of all your data

Whether you require change and configuration management, adaptive cyber security capability, a security architecture that takes you to the cloud, a comprehensive BYOD policy implementation and management solution or custom big data security analytics, Akima Global Technology Cyber Security Services has the strength and flexibility to ensure the safe and uninterrupted flow of your critical business services to and from all of their intended destinations—all the time. And that means service optimization wherever your mission takes you.

Specialized Security Services

Big Data Security

  • Real time correlation of events
    Custom analysis of structured and unstructured data
    Log analysis

Cloud Security

  • Security tool virtualization
  • Architecture


  • Policy development
  • Mobile Device Management
  • Data Classification

Additional Capabilities & Compliance

  • Certification & Accreditation (C&A)
  • STIG

Insider Threat

  • Audit logging
  • Privileged identity management
  • Security convergence
  • Anomaly detection and behavior analysis

Customer Highlights

Bureau of Indian Affairs

Reston, Virginia

Established in 1824, the Bureau of Indian Affairs (BIA) is the oldest bureau in the United States Department of the Interior. It provides services to 1.9 million American Indians and Alaska natives while providing stewardship for 55 million surface acres and 57 million subsurface mineral estates held in trust for American Indian, Indian Tribes and Alaskan Natives. Akima Global Technology provides the BIA’s Office of Information Security and Privacy (OISP) a proactive, defense-in-depth Information Assurance (IA) strategy with a holistic view of the policies, standards, processes and metrics that support the BIA’s security architecture and all of its individual components. This is an enterprise-wide, full-lifecycle initiative which includes the following services:

  • Security engineering and architecture support
  • Security monitoring and analysis
  • Vulnerability analysis
  • Incident tracking and response
  • Security log analysis
  • Database and application security
  • Data loss prevention
  • Penetration testing
  • Computer forensics

Defense Information System Agency

Washington, DC

Akima Global Technology provides network and software security engineers who test and evaluate software and hardware for security vulnerabilities during development for secure and non-secure networks. They interface with developers, system administrators, security and other staff members to determine and implement optimum solutions for security vulnerabilities. They also assist personnel in understanding each security fix before and during installation, reducing the risk of vulnerability reoccurrence. Our engineers assist in securing new systems and coordinating turnover of systems to production being handled at other locations. The engineers help maintain the integrity of the site accreditation and they help coordinate activities related to the creation and maintenance of the site accreditation package.

  • System security inspections to determine operating system integrity
  • Implementation of application interfaces and access control products
  • Vulnerability analysis and resolution recommendations/implementation
  • Security Readiness Review (SRR) support
  • Host-based IA tool deployment and maintenance
  • Lifecycle security management
  • Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) scorecard and risk assessment in accordance with DoD 8500 IA controls
  • System and network security administration
  • Security awareness and education
  • Coordination of turnover of systems into production at other facilities

U.S. Army – Medical Network Operations and Security Center (MEDNOSC)

Fort Sam Houston, Texas

The U.S. Army’s Medical Network Operations and Security Center is responsible for the operation, management and defense of the medical portion of the Army LandWarNet, an integrated combination of functional applications and network transmission services. Akima Global Technology’s Information Assurance personnel provide Network Security Engineering support for the three major components of this network: Enterprise Network Management, Network Services, and Internal Services. Akima Global Technology’s responsibilities include:

Network Services

  • 24×7 on-site network support
  • Army Medical Departments and Medical Treatment Facilities audit
  • Network security design support
  • Virtual private network (VPN) infrastructure management
  • Firewall management
  • IP address management
  • Incident response
  • Configuration management of WAN services network electronics
  • Enterprise management of architectures to security suites
  • Global network defense
  • IPv6 implementation
  • Process and tools integration

Enterprise Management

  • Remediate, repair or improve network, and prepare situational reports
  • Enterprise level network configuration management services
  • Forward task orders from operations centers to Army Medical Treatment Facilities 

Internal Services

  • Local Area Network (LAN) management
  • Logistics
  • Tool support for Information Technology Infrastructure Library (ITIL) management processes

Contact us

Operational Headquarters
2553 Dulles View Drive
Suite 700
Herndon, VA 20171

Albuquerque Office
6501 Americas Pkwy
Suite 1050

Albuquerque, NM 87110



Employment verification requests must be submitted via the link below:

Request Employment Verification

The Work Number processes all employment verification requests for the Akima portfolio of companies.


Employees of the Akima portfolio of companies:
Direct all verification of employment requests to The Work Number; be sure to provide the employer code listed above.

You can view your self-report by visiting the Employee Resource Center on the employee portal.



This helps us prevent spam, thank you.