Ghost Cyber Group
Ghost Cyber Group
  • Home
  • Services
  • About Us
  • Contact Us

About Us

PROFESSIONAL CERTIFICATIONS

U.S. Small Business Adminstration Certification

PROFESSIONAL BACKGROUND

The Ghost Cyber Group (GCG) is owned and operated by Veterans of the United States Air Force who hold a combined 30+ years of professional experience managing projects, programs, and personnel with an extensive history of decisive leadership and technical expertise in both the government and private sectors. 


The following list is a brief summary of the unique professional perspective and experience the GCG offers its clients:


  • TS/SCI Security Clearance Process
  • Special Access Programs (SAP)
  • Active Duty Military Operations
  • Department of the Air Force
  • Department of Defense (DoD)
  • Federal Contracting/Procurement
  • Fortune 50 - Private Sector Ops
  • IT/Cyber Exam Prep & Beta Tests
  • Beginner-Advanced Cyber Training
  • Air Force Instructor Certification
  • Lean Continuous Improvement
  • Published Authors - Crosstalk, The Journal of Defense Software Engineering


The GCG has a passion for cybersecurity that spans all industries, and its founding members have diverse backgrounds in multiple engineering disciplines that assist in their ability to think outside of the IT/Cybersecurity box and provide customers with in-depth solutions to even the most unique business needs:  


  • Engineering Industry Experience
    • Cybersecurity Engineering 
    • Software Engineering 
    • Systems Engineering 
    • Facility Engineering 
    • Manufacturing Engineering 
    • Quality Engineering 
    • Metrology Engineering 
    • Electronics Engineering

CONFERENCES + TRAINING + CERTIFICATIONS

The GCG maintains cybersecurity knowledge relevancy by attending a variety of professional conferences on an annual basis, including but not limited to: 


  • Black Hat USA 
  • DEF CON 
  • S3CCON 
  • BSidesOK 
  • SANS Summits 
  • AWS Re:Invent


In addition to the numerous hours of conference training attended annually, the GCG maintains, and significantly exceeds, compliance with the DoD 8570/DoD 8140 by staying current with the following IT/cybersecurity industry certification requirements:


  • CompTIA Project+
  • CompTIA Security+
  • CompTIA PenTest+
  • CompTIA Network Vulnerability Assessment Professional (CNVP)
  • EC-Council Certified Network Defender (CND)
  • EC-Council Certified Ethical Hacker (CEH)
  • EC-Council Certified Ethical Hacker Master
  • EC-Council Certified Hacking Forensic Investigator (CHFI)
  • EC-Council Certified Security Analyst (ECSA)
  • SANS/GIAC Assessing and Auditing Wireless Networks (GAWN)
  • Pentester Academy Certified Red Team Expert (CRTE)
  • Google IT Support Professional

WHAT MAKES US DIFFERENT

MISSION + VISION + CORE VALUES

MISSION = LIVE+EAT+SLEEP+BREATHE+SECURE = ALL THINGS CYBER

LIVE CYBER

SLEEP CYBER

LIVE CYBER

We live out our mission by adhering to our core values with an unwavering sense of duty and dedication. 


Core Values = 

+ Confidentiality

+ Integrity

+ Availablity 

EAT CYBER

SLEEP CYBER

LIVE CYBER

Wake Up = Read Cyber News

Eat Breakfast = Solve Cereal Box Cipher

Work Commute = Cyber Podcasts

Eat Dinner = Cyber Documentary


We believe a steady diet of cyber nuggets provides the calories required to fuel the cyber fight. 

SLEEP CYBER

SLEEP CYBER

BREATHE CYBER

We believe that advanced technology can help better secure the things we want to protect most. Through utilizing technology that runs through the night, we allow our customers to sleep easy knowing their environments are monitored and protected. Don't be fooled, if we're awakened at 2 a.m. by the technology we've deployed, you'll never see us more alert.

BREATHE CYBER

ALL THINGS CYBER

BREATHE CYBER

If you can't tell, we're deeply passionate about cybersecurity. So much so, we started a cyber business just so we could talk to more people about cybersecurity. We are in continual pursuit of advanced education and equally enjoy training other people. Some of our proudest moments have come in the form of mentoring future cyber professionals and celebrating together after they've passed their first cyber certification exam. 

SECURE CYBER

ALL THINGS CYBER

ALL THINGS CYBER

We're in business to secure our customers business. We accomplish this mission by listening thoroughly, planning accordingly, and executing with precision. We are committed to collaborating with our customers on how to best secure against unauthorized access, use, disclosure, disruption, modification, and destruction by utilizing technical controls, policies and procedures, user education, and incident response planning. 

ALL THINGS CYBER

ALL THINGS CYBER

ALL THINGS CYBER

Networks

Cloud

Applications/Databases

Wireless Devices (Wi-Fi, NFC, RFID, BT)

Internet of Things (IoT)

Industrial Control Systems (ICS)

Supervisory Control & Data Acq(SCADA)

Medical Devices


If it talks or listens, it's likely susceptible to a cyber attack (including people). 

vision =

VISION = Educate and empower those who secure all things cyber.


GHOST CYBER GROUP

CORE VALUES =

Confidentiality

  • We sign iron-clad Mutual Non-Disclosure Agreements (MNDA) to protect our customer's proprietary data and view ourselves as an extension of their internal cybersecurity team, treating the security of their business as we would our own.  


Integrity

  • We are military veterans who swore an oath to our country and internalized the U.S. Air Force (USAF) Core Values many years ago. These USAF core values are forever part of our DNA:
    • Integrity First - We conduct ourselves with unwavering honesty/transparency, no exceptions. 
    • Service Before Self - We're in business to secure our customer's business. 
    • Excellence In All We Do - We do not, and will not, accept mediocrity. 


Availability

  • Rest assured, we're able, capable, and accountable to our commitments, we execute when called upon, and will never leave our customers behind. 

WHY US

Military Service Makes a Difference

As veterans of the United States Air Force, we understand what it means to be disciplined, maintain a strong work ethic, and keep our composure under pressure. We've proven to be reliable, show loyalty, and possess the ability to work cohesively on diverse teams. We've worked with advanced technology and equipment, have experience planning, organizing, and executing complex tasks in dynamic environments, and lived through the need to manage uncertainty and risk in uncertain times. As TS/SCI security clearance holders, we've been trusted to help secure some of our Nation's most sensitive data and systems, now we're helping our clients secure theirs. 


We've leveraged our military background and private sector experience to develop robust cybersecurity services that offer our clients comprehensive solutions to protect their systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction with the ability to track activity in their environments with military precision.

Mentorship

If you know someone that's interested in starting a career in cybersecurity, and in need of a mentor who can help sift through the noise to find answers to tough cyber questions, send them our way. One of our passions is to help grow the cyber community and workforce through knowledge-sharing and continuous education.

CONTACT US

Ghost Cyber Group

‪

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept