Government

Supporting government missions through secure technology.

Certifications

  • Certified Information Systems Security Professional (CISSP)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Security Essentials (GSEC)

Regulatory Compliance & Frameworks

  • CMMC, NIST, PCI, ISO2001, ISO42001 and HIPAA
  • NIST Cybersecurity Framework, Risk Management Framework and CIS Controls

Executive Skills & Competencies

Security Leadership: Executive leader responsible for defining and leading Cybersecurity strategic vision, technology selection, roadmap execution, risk management and serve as the executive sponsor for Cybersecurity initiatives across engineering, operations, and regulatory bodies while building and mentoring high-performing security-first teams. Operations Officer‑in‑Charge for Elite Cyber Protection team missions delivering CVA/H, threat hunting, and mission assurance.

Technology & Architecture: Security Engineering | Product Security | Zero Trust | Vulnerability Assessment & Management | Cloud Infrastructure Security | Data Protection & Encryption | Endpoint Detection & Response | AI Security | API Security | Threat Modeling | Dev-Sec-ML-AI-Ops | Secure Architecture Design | Penetration Testing

Owner Past Performance

Lockheed Martin: Navy Aegis Combat System Security, Coast Guard Deepwater System Security, Coast Guard National Security Cutter System Security, Coast Guard Sentinel-Class Cutter System Security

L3 Harris: Navy Ship to Shore Connector secure architecture design, test and delivery, security training for Navy personnel, Coast Guard National Security Cutter System Security.

Technical Services and Core Competencies

  • CISO-as-a-Service
  • Vulnerability Scanning & Remediation
  • Continuous Attack Surface Management
  • Regulatory Compliance (PCI-DSS, SOC2, HIPAA, SOX)
  • Security Frameworks (NIST CSF, ISO 27001, CSA)
  • CMMC Level 1 and 2 Readiness
  • Policy and Workflow Development
  • Secure Policy Configuration Management (CIS & STIGS)
  • Zero Trust Security Integration
  • Secure Architecture Design and Threat Modeling
  • Product Security Dev-Sec-ML-AI-Ops
  • Endpoint Monitoring, Detection and Response
  • Third Party Security Risk Assessment
  • C-SCRM Cybersecurity Supply Chain Risk Management
  • Cloud Security Integration and Migration
  • IT System Modernization and Administration
  • Penetration Testing (Red Team)
  • Security Control Validation Testing

Government Contracting Codes

UEI: TWB7WLF1L8K9  |  CAGE: 17NX1  |  DUNS: 144899240

NAICS:

541511 – Custom Computer Programming Services
541512 – Computer Systems Design Services
541519 – Other Computer Related Services
541611 – Administrative Management & General Management Consulting Services
541614 – Process, Physical Distribution, and Logistics Consulting Services
541618 – Other Management Consulting Services
541715 – Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology & Biotechnology)
541690 – Other Scientific and Technical Consulting Services
541990 – All Other Professional, Scientific, and Technical Services
518210 – Data Processing, Hosting, and Related Services
611430 – Professional and Management Development Training
561621 – Security Systems Services (except Locksmiths)

Request Consultation

Select a time that works for you and we'll discuss your cybersecurity needs.

Privacy Policy

Last Updated: November 30, 2025

Information We Collect

Information You Provide

We collect information that you voluntarily provide to us when you:

  • Fill out our contact form
  • Request information about our services
  • Subscribe to our communications
  • Engage our cybersecurity services

We collect information that you voluntarily provide to us when you:

  • Fill out our contact form
  • Request information about our services
  • Subscribe to our communications
  • Engage our cybersecurity services

Automatically Collected Information

When you visit our website, we may automatically collect certain information, including:

  • IP address
  • Browser type and version
  • Operating system
  • Referring website
  • Pages visited and time spent on pages
  • Access times and dates

Third-Party Services

Our website currently uses Google Fonts, which may collect information about your visit. Google's privacy policy applies to their font delivery service. We are working to self-host fonts to eliminate external dependencies.

How We Use Your Information

We use the information we collect to:

  • Respond to your inquiries and provide customer service
  • Deliver cybersecurity services you have requested
  • Send you information about our services (with your consent)
  • Improve our website and service offerings
  • Detect, prevent, and address technical issues or security threats
  • Comply with legal obligations and protect our legal rights

How We Share Your Information

We do not sell, trade, or rent your personal information to third parties. We may share your information only in the following circumstances:

Service Providers

We may share your information with trusted third-party service providers who assist us in operating our website and conducting our business, provided they agree to keep your information confidential.

Legal Requirements

We may disclose your information if required to do so by law or in response to valid requests by public authorities (e.g., court orders, subpoenas).

Business Transfers

In the event of a merger, acquisition, or sale of all or a portion of our assets, your information may be transferred to the acquiring entity.

With Your Consent

We may share your information for any other purpose with your explicit consent.

Data Security

We implement appropriate technical and organizational security measures to protect your personal information against unauthorized access, alteration, disclosure, or destruction. These measures include:

  • SSL/TLS encryption for data transmission
  • Secure server infrastructure
  • Access controls and authentication
  • Regular security assessments
  • Employee training on data protection

However, no method of transmission over the internet or electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your information, we cannot guarantee absolute security.

Data Retention

We retain your personal information only for as long as necessary to fulfill the purposes outlined in this Privacy Policy, unless a longer retention period is required or permitted by law. Contact form submissions are retained for 3 years unless you request deletion.

Your Rights

Depending on your location, you may have the following rights regarding your personal information:

Access and Portability

You have the right to request access to the personal information we hold about you and receive a copy in a portable format.

Correction

You have the right to request correction of inaccurate or incomplete personal information.

Deletion

You have the right to request deletion of your personal information, subject to certain exceptions.

Restriction and Objection

You have the right to restrict or object to our processing of your personal information in certain circumstances.

Withdraw Consent

Where we rely on your consent to process your information, you have the right to withdraw that consent at any time.

To exercise any of these rights, please contact us at privacy@encapcyber.com.

California Privacy Rights

If you are a California resident, you have additional rights under the California Consumer Privacy Act (CCPA):

  • Right to know what personal information is collected, used, shared, or sold
  • Right to delete personal information
  • Right to opt-out of the sale of personal information (we do not sell personal information)
  • Right to non-discrimination for exercising your privacy rights

European Privacy Rights

If you are in the European Economic Area (EEA), you have rights under the General Data Protection Regulation (GDPR), including those outlined in the “Your Rights” section above. Our legal basis for processing your information includes:

  • Consent: When you provide explicit consent
  • Contract: When necessary to perform a contract with you
  • Legal Obligation: When required by law
  • Legitimate Interests: When necessary for our legitimate business interests

Children's Privacy

Our services are not directed to individuals under the age of 18. We do not knowingly collect personal information from children. If you become aware that a child has provided us with personal information, please contact us immediately.

Do Not Track Signals

Some browsers include a “Do Not Track” (DNT) feature. Our website does not currently respond to DNT signals. We do not track users across third-party websites.

International Data Transfers

Your information may be transferred to and processed in countries other than your country of residence. These countries may have data protection laws different from your country. We take appropriate safeguards to ensure your information remains protected.

Changes to This Privacy Policy

We may update this Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page and updating the “Last Updated” date. You are advised to review this Privacy Policy periodically for any changes.

Contact Us

If you have questions or concerns about this Privacy Policy or our data practices, please contact us:

EncapCyber, LLC
Email: info@encapcyber.com
For security vulnerabilities: info@encapcyber.com

Consent

By using our website and services, you consent to our Privacy Policy and agree to its terms.