Why PurpleSec?

​PurpleSec is a veteran owned and led cyber security company providing services in Washington, DC. Our proven methods backed by experts work to seamlesslessly integrate security into your existing business processes and technology.

 

Call Us: 202-556-3903

Email Us: [email protected]

Request Consult
Meet Our Experts
  • Direct experience working for the Defense Information Systems Agency, U.S. Cyber Command, and other government agencies.
  • Have an average of 20 years of security experience from the C-level to technical implementation and controls.
  • Hold numerous certifications including CISSP, CRISC, CISM, CISA, GCED, OSCP, GWAPT, MCSE, MCP, CCNA, and more.

About PurpleSec

We go beyond security checkboxes

our mission - purplesec

Mission

To excel in our craft, embody professionalism, and drive progress through relentless innovation and boundary-pushing expertise.

our vision - purplesec

Vision

To be the unrivaled leader in our field, exemplifying professionalism and inspiring the future of our industry with expertise and innovation.

our goal - purplesec

Goal

To provide customers with peace of mind through expertly crafted, secure havens, while continuously pursuing enhancements in security measures.

Our Security Model

 

National Institute of Standards and Technology (NIST) Special Publication 800-137, “Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations,” offers a framework for implementing continuous monitoring practices within organizations’ information systems.

 

Our program’s objective is to safeguard information systems from cyber threats, promptly identify vulnerabilities, and address them effectively. We utilize AI and Machine Learning to expedite all aspects of threat management.

 

A crucial element of continuous monitoring is risk assessment, which entails identifying and prioritizing risks to an organization’s information systems. We perform real-time risk assessments as packets navigate our network, conduct deep packet inspection on all traffic, and implement security controls to mitigate identified risks.

 

Security status reporting is another vital component of continuous monitoring. The publication outlines guidelines for reporting security status, including standard reporting formats and selecting appropriate reporting mechanisms.

 

In addition, it offers recommendations for distributing security status reports, encompassing sharing reports with senior management and relevant stakeholders. We supply on-demand weekly status reports.

government policy - security insights

 

Improve your security ROI with a fully manged solution at an affordable price

SPEAK WITH AN EXPERT

Our Methodology

Our security experts strive to redefine the limits of possibility. They envision, develop, and actualize state-of-the-art analytic and machine learning models that fuel groundbreaking processes. Embracing agility, they continuously experiment and iterate, optimizing speed and transparency while delivering transformative solutions at every stage.

SEE OUR CASE STUDIES

PurpleSec's certified security experts

Our Culture

 

In addition to training and development, we prioritize fostering a supportive and inclusive work environment. We believe that a positive, collaborative workplace culture is crucial for attracting and retaining top talent.

 

This employee-centric approach benefits our staff while enhancing customer satisfaction and client outcomes.

 

At PurpleSec, we appreciate that our people are the foundation of our success in the ever-changing cyberspace landscape.

 

Through investing in their development, equipping them with the necessary tools, and cultivating a positive and supportive workplace culture, we remain confident in our ability to excel in the field and deliver exceptional cyber security services that our clients expect and deserve.

Certified Experts

 

At PurpleSec, we recognize that our success in cyberspace hinges on our most valuable resource – our people. Our teams consistently train, learn, and refine their skills to stay ahead of emerging threats and advancements in the field, ensuring we deliver top-tier cyber security services to our clients.

 

Our human capital strategy emphasizes attracting, developing, and retaining exceptional talent for cyber and support roles. By investing in our personnel, we secure a competitive edge in the industry. We seek individuals with solid technical expertise, complemented by soft skills like critical thinking, problem-solving, and communication.

 

Once on board, employees benefit from continuous training and development opportunities, empowering them to reach their full potential. We support them in acquiring relevant certifications and participating in industry events and training programs.

DEI in cyber security

Jason Firch MBA - cyber security expert

Jason Firch

CEO / CMO

Seth Kimmel, OSCP - Cyber Security Expert

Seth Kimmel

CTO / OffensiveSec Lead

Joshua Selvidge, CCENT - Cyber Security Expert

Josh Allen

CPO / DefensiveSec Lead

Michael Swanagan

Michael Swanagan

Technical Editor-In-Chief

Dalibor Gašić - cyber security expert

Dalibor Gašić

Head Of Security Research

Dušan Trojanović - cyber security expert

Dušan Trojanović

Senior Security Researcher

Eva Georgieva - cyber security expert

Eva Georgieva

Senior Security Researcher

Kenneth Thomas - cyber security expert

Kenneth Thomas

Senior Security Researcher

Liam Smith - cyber security expert

Liam Smith

Security Researcher

Eryk Waligora - cyber security expert

Eryk Waligora

Technical Writer

Strahinja Stankovic - cyber security expert

Strahinja Stankovic

Technical Writer

Security-First Approach

 

Our security-first approach emphasizes continuous monitoring and management of risks and threats, using cutting-edge tools and automation techniques to ensure constant protection.

 

This strategy focuses on four essential elements:

 

  • Real-time threat detection
  • In-depth threat understanding
  • Automated threat response
  • Comprehensive reporting for security and compliance outcomes

 

Real-time discovery allows for instantaneous detection of potential security threats, enabling swift responses to emerging risks.

 

The security-first approach offers profound insights into each threat’s nature and severity, empowering organizations to make informed decisions on appropriate responses.

 

To address threats, the security-first model employs automated policies, processes, and controls that streamline the response process, facilitating rapid and effective actions against potential threats.

 

Lastly, comprehensive reporting capabilities deliver valuable insights into the efficacy of security and compliance measures, allowing organizations to make data-driven decisions for enhancing their security posture.

Cyber security research - security insights

 

Improve your security ROI with a fully manged solution at an affordable price

SPEAK WITH AN EXPERT

Explore Our Security Services

managed it security services - purplesec

Managed Security

Learn More >

penetration testing services - purplesec

Penetration Testing

Learn More >

vulnerability patch management services - purplesec

Vulnerability Mgmt

Learn More >

security gap assessment services - purplesec

Risk Assessment

Learn More >