CyberEye

CyberEye

Computer and Network Security

Palm Harbor, FL 203 followers

A small, woman-owned cyber security consulting practice specializing in regulatory compliance and risk management.

About us

We are a small business with a laser sharp focus on bringing high quality cyber security assessment and assistance services to organizations that are embarking on a IT risk and compliance journey. Specialty areas include: HIPAA, CJIS, PCI DSS, RMF, and DoD CMMC

Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Palm Harbor, FL
Type
Privately Held
Founded
2019
Specialties
CMMC, RMF, HIPAA, PCI DSS, NIST, CJIS, ISO 27001, CIS, NIST CSF, State & Local, Legislative Branch, Commercial, Department of Defense, NIST 800-171, and ISO

Locations

Employees at CyberEye

Updates

  • View organization page for CyberEye, graphic

    203 followers

    🚀 Join Our Growing Cybersecurity Team! 🚀   Are you a cybersecurity professional with a passion for security controls assessments? We’re hiring a Cybersecurity Analyst to lead assessments and advisory engagements for our diverse clients.   🔍 What You’ll Do:   • Perform gap assessments using frameworks like NIST SP 800-53, FedRAMP, and CMMC. • Develop high-quality security assessment reports. • Partner with clients to identify and close security gaps.   💼 What We’re Looking For:   • 8+ years of cybersecurity experience. • Expert knowledge of security frameworks. • Strong client management and report development skills. • Cybersecurity certifications (CISSP, CISA, CASP+, etc.)   📍 Location: Remote (MD, TX, FL, CO, GA, SC, VA preferred)   Ready to make an impact? Submit your resume to jobs@cybereyesolutions.com and join us in securing the future! 💪   #CybersecurityJobs #RemoteWork #CyberAssessments #JobOpportunity #JoinOurTeam

  • View organization page for CyberEye, graphic

    203 followers

    Logging activities on your network is important to ensure the protection of your network and give your team visibility of what is going on within it. One important piece is limiting which personnel have access to audit logging functionality. Separation of Duties and the principle of least privilege goes hand in hand with this control and it is important to ensure that only personnel that NEED access to your logging functionality have it. #CMMC #DIB #NIST #DFARS #DOD

  • View organization page for CyberEye, graphic

    203 followers

    Network communications should be configured to deny all and allow by exception. Only allow traffic in and out that your organization has identified as necessary to ensure that the network can function properly. By doing so, your organization can shrink your attack surface to further protect it from adversaries. #CMMC #DIB #NIST #CUI #DFARS #FCI

  • View organization page for CyberEye, graphic

    203 followers

    Don’t let your login screen give away your password secrets. Logging in should be as cryptic as a magician’s trick. When you’re typing in your top-secret password, make sure the screen gives no clues to sneaky onlookers (aka shoulder surfers). Ensure your login feedback is so mysterious that even Sherlock himself couldn’t figure it out. Whether you’re on a giant screen or a tiny one, keep those password hints as hidden as a treasure map!

  • View organization page for CyberEye, graphic

    203 followers

    When it comes to the Highlander, everyone knows, there can be only one...but when it comes to critical tasks or systems, there should never be one person that controls everything. Separation of Duties can help ensure that it requires more than one person to complete critical functions for your organization.

  • View organization page for CyberEye, graphic

    203 followers

    Insider Threat, whether intentional or not, is a serious concern for companies, especially ones that have information that requires protection. Teaching your employees the indicators and how to report possible insider threats is important to protecting that information.

Similar pages

Browse jobs