Cyber Command.
Physical and digital.
One command.

Shield of Steel Cyber Command is the digital half of our firm. Officers on the ground, analysts in the SOC, one incident commander when an event crosses both. CMMC Level 2-aligned. Memphis-based. Veteran-led. The same people who write your physical post orders write your incident-response plan.

Compliance Posture
CMMC Level 2 · Self-Attested
NIST SP 800-171 practice aligned · 3PAO ready
SOC coverage24 / 7 / 365 live
Median IR start< 15 min first call
Detection signalsEDR · NDR · ID · Cloud
Leadership100+ yrs combined
Compliance lensCMMC L2 · HIPAA · PCI
24/7
SOC Coverage
Live US-based analysts on rotation. No off-shore triage. No voicemail at 3 a.m.
110+
CMMC Practices
All 110 NIST SP 800-171 practices mapped, implemented, and evidenced inside our own fence-line.
< 15min
IR First Contact
From ticket open to analyst engaged. Every engagement logged with the same rigor as a physical post.
10
Disciplines
Compliance, assessment, code review, response, training, SOC, network, cloud, intelligence, financial-services — under one roof.
01 / Why both, one command

Most breaches
start in the lobby.

A ransomware crew walks into a logistics office behind a delivery driver. A social engineer tailgates through a garage gate. A laptop gets lifted out of a parked car on Front Street. The attack surface is the building and the network — if you defend one without the other, you're defending half.

Shield of Steel already runs the physical side. Licensed officers on your doors. GPS-tracked patrols on your perimeter. Alarm response with published SLAs. We've been doing that work across Tennessee and Mississippi with a leadership team that carries 100+ years of combined field experience — military, federal, and law-enforcement.

Cyber Command extends that discipline across the logical perimeter. Same people. Same standard. Same dispatch number. When your HVAC vendor's laptop throws a Cobalt Strike beacon at 2:14 a.m., the SOC analyst who catches the alert is down the hall from the supervisor who controls the officer closest to the breach. One incident. One commander. One after-action report.

We built the cyber practice the way we built the physical one: in-house only, W-2 staff, measurable outcomes, written plans, no reseller licensing dressed up as a service. Every engagement is scoped, priced, and delivered under a signed statement of work — the same way we quote a standing post.

This page is an index. Use the grid below to jump to the discipline you need. If you don't know yet, start with an assessment — we'll tell you in writing what you need, why, and what it costs, with no obligation to engage us for the build.

02 / The converged stack

Two halves.
One after-action.

The convergence is not theoretical. It is how we route calls, run tabletops, and write reports — together, by design, from the first intake meeting.

Physical Defense

Shield of Steel
Physical

Licensed armed & unarmed officers, GPS-tracked mobile patrol, 24/7 alarm response, executive protection, and event security — the working bench of our firm since inception, deployed across all 95 Tennessee counties.

  • Officer presence + post orders
  • Mobile patrol + alarm response
  • Executive protection + travel
  • Event + venue security
  • Badge + access control ops
Digital Defense

Cyber Command
Digital

CMMC-aligned compliance, managed SOC with live analysts, vulnerability assessment and penetration testing, incident response and digital forensics, security awareness training, network/endpoint security, cloud security, and threat intelligence.

  • Managed SOC + EDR/NDR
  • Incident response + DFIR
  • Vulnerability + penetration test
  • CMMC + HIPAA compliance
  • Cloud & identity, threat-intel
03 / Compliance posture

CMMC Level 2.
Self-attested.
Before the contract requires it.

We run the same controls internally that we ask our clients to adopt. All 110 NIST SP 800-171 practices are documented inside our own System Security Plan, evidenced with screenshots, artifacts, and policy, and reviewed quarterly. We are not federally contracted today — and we are posture-ready for the day we are, or the day a client needs us to be.

What "self-attested" means here: we have completed our own NIST 800-171 assessment, submitted a score in SPRS-equivalent format internally, and we maintain the evidence package to hand to a 3PAO on thirty days' notice. We have not yet undergone a third-party certified assessment. We won't claim what we haven't earned.

Attestation
CMMC Level 2
NIST SP 800-171 Rev 2 · 110 practices · self-attested · evidence retained on file
Framework
NIST 800-171
Rev 2 · DoD baseline
Review cadence
Quarterly
Internal audit + SSP refresh
3PAO
Ready · 30 days
Evidence package prepared
Adjacent lenses
HIPAA · PCI · SOC 2
Mapped for client engagements
04 / Capabilities

Ten disciplines.
One command.

From CMMC readiness through financial-services regulatory compliance, each discipline is staffed in-house and deliverable against a signed scope. Pick a page to go deeper — every card below links to the full offering.

C · 01Compliance

CMMC & Compliance

NIST SP 800-171 gap analysis, System Security Plan drafting, POA&M execution, and 3PAO readiness — for CMMC L1 and L2. HIPAA, PCI, and SOC 2 mapped on request.

CMMC L1 / L2NIST 800-171SSP / POA&M
C · 02Assessment

Vulnerability & Pen Test

External and internal network scanning, authenticated web-app testing, social engineering, and red-team exercises — scoped, timeboxed, and delivered with a retest.

External / internalWeb app · APIRed team
C · 03Response

Incident Response & DFIR

24/7 IR retainer, on-demand breach response, digital forensics, malware reverse engineering, and post-incident reporting that holds up in litigation and insurance.

IR retainerDFIRLitigation-ready
C · 04Training

Security Awareness

Monthly phishing simulations, role-targeted training modules, executive tabletop exercises, and a measured human-risk score that goes on the board deck.

Phishing simsRole trainingTabletops
C · 05Monitoring

Managed SOC · 24/7

US-based analyst rotation, EDR and SIEM managed for you, correlated alerting with median triage under fifteen minutes, and a weekly ops review with named staff.

24/7 analystsSIEM + EDRMDR
C · 06Perimeter

Network & Endpoint

Next-gen firewall management, endpoint hardening, zero-trust network access, segmentation, and posture enforcement on laptops, servers, and OT endpoints.

NGFWZero TrustEDR
C · 07Cloud

Cloud & Identity

AWS, Azure, and GCP security posture management, CSPM remediation, identity-provider hardening, conditional access, and SaaS-to-SaaS risk review.

CSPMIAM · SSOSaaS risk
C · 08Intelligence

Threat Intelligence

Dark-web and deep-web monitoring for your brand, credentials, and executives. OSINT collection, attribution, and actionable indicators fed into the SOC.

Dark webOSINTBrand + exec
C · 09AppSec

Secure Code Review

SAST, DAST, SCA, IaC, and secrets scanning — plus manual secure-code review for novel business logic, threat modeling, and SDLC / CI-CD integration across ten languages.

SAST / DAST / SCAManual reviewSDLC
C · 10Financial Services

Financial-Services Security

FFIEC CAT, SOX ITGC, GLBA Safeguards, PCI-DSS v4, NYDFS 23 NYCRR 500, SEC 17a-4, BSA/FinCEN — for community banks, credit unions, broker-dealers, RIAs, and fintech-partnered institutions.

FFIEC · GLBASOX · PCINYDFS · SEC
05 / Who leads Cyber Command

Practitioner. Manager.
Analyst.

Cyber Command is run by a director with prior military cyber-operations experience — including adversarial-simulation and red-team operational roles — and a three-cert stack that covers senior technical practice, management & governance, and SOC analyst depth. Each credential is ANSI-accredited and each is accepted as a DoD 8140 baseline. Nothing below is marketing-grade; every cert here is on file and verifiable.

Credential 01 · Practitioner
ANSI · DoD 8140 IAT III / IAM II

CompTIA SecurityX (formerly CASP+)

CompTIA's senior-level advanced security practitioner certification. Covers enterprise security architecture, security operations, governance & risk, and technical integration across on-prem, cloud, and hybrid environments. Hands-on performance-based exam; not an entry-level credential.

Credential 02 · Manager
ANSI · DoD 8140 IAM II

ISACA CISM

Certified Information Security Manager. The management-and-governance credential issued by ISACA — information risk management, incident management, security program development, and security governance at the program and board layer. The cert auditors expect when a CISO or security lead signs an attestation.

Credential 03 · Analyst
ANSI · DoD 8140 CSSP-Analyst

CompTIA CySA+

Cybersecurity Analyst — the SOC-facing, detection-and-response credential. Threat and vulnerability management, security operations and monitoring, incident response, compliance, and performance-based analytic work against live log, EDR, and SIEM data. The analyst-discipline counterpart to the architect and manager credentials above.

Prior experience
Military cyber operations · adversarial-simulation & red-team
06 / Methodology

Assess. Architect.
Operate.

Every engagement — from a one-time pen test to a multi-year managed SOC contract — runs the same three-phase cadence. No discovery without a scope. No build without a plan. No operation without measurable outcomes.

Phase One · 2–4 weeks

Assess

We start by understanding what you have, what regulators expect, and what an adversary would go after first. NIST 800-171 gap analysis if CMMC is driving the work. Crown-jewel mapping if it isn't. Outputs: a written risk register, a prioritized remediation roadmap, and an honest read of where you stand.

Gap analysisRisk registerWritten roadmap
Phase Two · 4–12 weeks

Architect

We design the controls, write the policy, deploy the tooling, and document the decisions. SSP drafted, POA&M filed, EDR rolled, MFA enforced, segmentation cut, backups tested. You get a reviewable artifact package and a hand-off runbook — whether we operate it going forward or you do.

SSP · policyTooling · rolloutRunbooks
Phase Three · ongoing

Operate

24/7 SOC stands up. Incident retainer activates. Monthly phishing sims run. Quarterly business review lands on your desk with metrics — not slide theatre — tied to the risk register from Phase One. Annual pen test on the calendar. Renewal is earned, not assumed.

24/7 SOCIR retainerQBR metrics
07 / Next step

Walk your digital
perimeter with us.

A senior analyst and a senior officer will meet with your team, review your environment — both sides — and deliver a written assessment within ten business days. No cost, no obligation, no pitch deck. Every engagement quoted line by line, under signed scope.