Government Cybersecurity Capabilities – Totem

Our Government
Cybersecurity Capabilities

             For over a decade, the Totem team has been securing US Federal government IT systems. If you are looking for a DoD cybersecurity contractor, we have the past performance needed for your contract. Totem Technology dba is a division of Haight Bey and Associates LLC,  a prime Contractor Logistics Support (CLS) contractor for the US Air Force.  Our government cybersecurity work is a major component of this CLS contracts, and Totem executes everything from in-the-weeds network vulnerability scanning to high-level system policy development. Totem also subcontracts government cybersecurity work on several other DoD projects.  Members of the Totem team hold Information Assurance Technician (IAT) and Information Assurance Manager (IAM) Level III industry certifications per the DoD Cybersecurity Workforce Management Program (8570.01-M).  We leverage this experience and expertise to bring military-grade cybersecurity to the small business. 

             The Totem Team have also performed cybersecurity work in DoD Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments. We have performed device inventory efforts and cyber-hygiene improvements on production ICS/SCADA networks and comprehend the fragility of such environments. If you are working on a government ICS/SCADA contract but do not possess in-house professionals to complete the cybersecurity requirements, then let Totem’s ICS/SCADA cybersecurity team help your organization.

             Members of the Totem team have also worked on IT cybersecurity projects for NASA as well the Centers for Medicare and Medicaid Systems (CMS)—the entity responsible for managing the Affordable Care Act (ACA) IT systems.  Our tasks included:

• serving as Information Systems Security Officers (ISSO) for US Federal government IT systems

• training government employees to hold the ISSO role

• implementing enterprise-grade Governance, Risk Management, and Compliance (GRC) tools to manage IT systems’ cybersecurity program

• managing subcontractors and supply chain vendors as part of supply chain risk management processes.

Contact us if you’re interested in contracting or subcontracting government cybersecurity work. We are confident that we are the best veteran owned, small businesses DoD cybersecurity contractor.