Profitable boutique cyber intelligence and security firm for sale. Virtual HUMINT specialization. One patent pending. Very unique space. Training programs that follow traditional intelligence tradecraft. Clients in the Fortune 500 space on 3 continents. Building intelligence programs, establishing strategy, collecting in virtual hostile areas. Several contracts in place with others in process. Ability to significantly expand with the right sales and marketing. Low overhead and personally owned, private firm. Activities include cyber intelligence and security strategic and program planning / implementation, interim CISO services, cyber intelligence advisory services and investigations (surface and dark web), social networking analysis and cyber persona creation, cyber counterintelligence, cyber operations and psychological operations. Strong understanding of socio-cultural actions, geopolitical events, structured analytic techniques and methods. Analytic writing, collection methods to craft threat intelligence, estimative intelligence, warning intelligence, adversary dossiers, and adversary tools. Training programs that provide leads and access to Fortune 100 and 500 companies. Established name and reputation. Easily expandable, high growth niche, unlimited potential. Looking to create a new company to drive all-source cyber intelligence initiatives with a cloud solution for structured analytic techniques and methods.

Strategic Plan development, acceptance, and dissemination
Vision, mission, guiding principles, roles, responsibilities, goals & initiatives
Program Plan development, acceptance, dissemination, and implementation
Standard Operating Procedures
Priority Intelligence Requirement development
Passive Intelligence Collection
Collection and analysis methods and techniques
Organization, Production, Processing - Decomposition
Structured Analytic Techniques - Analytic Writing and Dissemination
Cyber Intelligence Tradecraft Certification
Cyber CounterIntelligence Tradecraft Certification
Cyber Intelligence Analyst Certification
Clandestine Cyber HUMINT
Improve and provide feeds for automation
Improve detection and response
Intelligence Lifecycle Development
Threat Intelligence Program Development
Improve and provide feeds for automation and remediation
Security operations
Enhance and improve remediation actions
Centralize threat intelligence – Intelligence as a Service – Analysis as a Service
Drive improvements to risk management
Improve workflow through well-defined roles and responsibilities
People, process and technology enhancements
Drive the quality improvements of your intelligence
Situational awareness of your attack surface – digital footprint
Web – Social Media - Darknet
Virtual HUMINT Creation and Management
Internet Exposure Assessment - Attack Surface Analysis - Perception Management - Sentiment Analysis
Deep Web, Forums, Social Networking, Closed Sites, Darknet
Deception Detection and Credibility Analysis
Pattern, Trends and Tendency Analysis
Competitive Intelligence Assessment and Program Analysis
Campaign Analysis with Recommendations and Opportunities
Darknet / Deep Web exploration
Pattern, Trends and Tendency Analysis
Denial and deception identification
Competitive Intelligence Assessment and Program Analysis
Campaign Analysis with Recommendations and Opportunities

Posted Jul 17, 2015

Did you know that social networking is a great way to buy a business? Sign up now and we'll show you how.

By clicking "Sign Up" you confirm that you accept the Terms of Use and Privacy Policy, including cookie use.

Disclaimer: DealStream has not independently verified any of the information in this listing and makes no warranty as to its accuracy or completeness.