Cyber Security


CACI's robust portfolio of cyber security solutions and best practices enables us to provide value to our customers in the Intelligence Community, the Department of Defense (DoD), and other federal agencies. Representative customers include:

Defense Advanced Research Projects Agency (DARPA) Cyber Fast Track (CFT):The DARPA CFT is an innovative research and development program that evaluates the ability of cyber projects to be performed at an asymmetric advantage in time, cost, and effort compared to more traditional applied research areas. CFT engages numerous cyber-related efforts across the spectrum of computer network operations (CNO), including software and hardware applied to such areas as attack/exploit, radio frequency (RF) cyber, and advanced defensible infrastructure. The program demonstrates that cyber efforts can be accomplished rapidly and cost-effectively while introducing capabilities to a new user base. CFT allows for non-standard, cutting-edge organizations and individuals throughout the cyber community to strengthen DoD’s cyber security capabilities and its understanding of the tradecraft. More than 130 projects have been developed under CFT. These projects include revolutionary software and hardware innovations that have been transitioned and deployed throughout DoD. Successful transitions include technologies in the fields of forensics, software-defined radio, novel cyber surfaces, malware analysis, mobile platform security, and vulnerability research.

DARPA Plan X: CACI built and integrated DARPA’s Plan X system infrastructures to help the DoD plan for, conduct, and assess cyberwarfare. Our agile development processes have led to faster development and testing of a cyber Common Operating Picture (COP) planning tool that integrates sensors, traffic flow, and vulnerability assessments. DARPA Plan X will enable soldiers to plan cyber warfare using video game interfaces, greatly reducing training time and easing the integration of cyber warfare into battle planning.

U.S. Air Force Air, Space and Cyberspace Environment – Information Operations Suite (ACE-IOS): ACE-IOS is a suite of models used as part of numerous training federations. These federations run using the High Level Architecture (HLA)/Run-Time Infrastructure (RTI), the Distributed Interactive Simulation (DIS) protocol, and hybrid HLA-DIS based federations. ACE-IOS facilitates the computer play of many components of command and control warfare.

ACE-IOS is multi-sided and is accredited to play from the Secret releasable to the Top Secret/Sensitive Compartmented Information (TS/SCI) level. The Network Module (JNETS) in ACE-IOS replicates communications networks whose nodes may be kinetically and non-kinetically attacked. A graphical representation of those effects is readily available to the control cell to highlight successful C2-attack and C2-protect. Any strikes by LAT/LON or basic encyclopedia, category code, and facility ID against the C2 module's target set are also captured by the Network Module.

Affecting the status and health of these facilities modeled in ACE-IOS has cascading effects within JNETS and directly affects the communications efficiency, operations, and results, to include forcing JNETS to dynamically reconfigure the communications network topology. JNETS uses cascading sets of communication links and paths between end-nodes and intermediate network nodes (C2 facilities and satellites).

This allows JNETS to be reactive to the current battlefield, backbone network(s) topologies and status, current order of battle (OB) and hierarchy for ground, air, and naval forces, electromagnetic (jamming) environment, and exercise control and Major Simulation Event List (MSEL) direction and required communication events. Effects on IADS are the only part of these networks currently distributed back to the combat games and directly to models such as the Distributed IO Constructive Environment (DICE) air defense simulation.

U.S. Air Force Central Command (USAFCENT) Network Operations and Security Center (NOSC): CACI provides unsurpassed classified and unclassified network services to 30,000 deployed USAFCENT soldiers in the Southwest Asia theater, supporting 8,000 network devices and 25,000 workstations. We also provide cyber and information assurance support to the CENTCOM bases in the Middle East, receiving the highest ratings on the Cyber Command Readiness Inspections (USAFCENT Shaw AFB 2012 and Bagram Air Base 2013) from the Defense Information Systems Agency (DISA) for physical and network security. The program consistently receives the highest customer satisfaction ratings possible.

In one of the most unstable regions of the world, we ensure the secure flow of critical network communications essential to support the mission.

U.S. Department of Energy: CACI supports the Information Assurance Response Center (IARC), which continuously monitors all classified and unclassified network activity throughout the Nuclear Security Complex. As the Security Operations Center lead contractor, we provide 24/7/365 network monitoring, incident response/management, malware reverse engineering, and network forensics support.

U.S. Department of Commerce: As part of the U.S. Navy's Space and Naval Warfare Systems Command (SPAWAR) contract, CACI is developing the next-generation Bureau Export Control Cyber Infrastructure, Version 2 Security Operations Center (SOC) Implementation Plan for the U.S. Department of Commerce. CACI is ensuring that SOC stays ahead of evolving threats and threat aggressiveness and keeps in step with best practices and evolving technologies. CACI is also providing cyber threat analysis, which includes proactively monitoring public and restricted-access threat and vulnerability information resources ranging from alerts and trends to vendor-specific advisories.

Army Communications-Electronics Research, Development and Engineering Center (CERDEC): As the prime on multiple CERDEC contracts for the Intelligence and Information Warfare Directorate (I2WD) and Space and Terrestrial Communications Directorate (S&TCD), we support a broad range of cyber security activities and the mission of identifying, developing, evaluating, tailoring, and inserting emerging information technologies into operational systems. Our work helps provide troops with the cyber security services, effective intelligence, superior integrated systems, and offensive and defensive cyberspace information warfare tools needed to ensure information dominance. Our work also includes cutting-edge R&D work in the area of wireless and mobile security. Since CACI began supporting CERDEC more than 25 years ago, we have successfully managed more than 80 subcontractors over the life of the effort.

Defense Travel System Travel Assistance Center (DTS TAC): The CACI ISO 27001 externally certified Security Management System (SMS) supports the mission of the 24x7 DTS TAC, which provides assistance to DoD travelers worldwide. The ISO 27001 SMS ensures the availability, integrity, and confidentiality of DTS TAC information, business processes, human capital, and infrastructure assets. The SMS establishes a framework for managing IT security risks, ensuring security policies and plans are fully implemented, and measuring the effectiveness of the SMS/controls for continual improvement.

Cyber Security Solutions :
  • Description 1
  • Description 2
  • Description 3
  • Description 4