SlideShare a Scribd company logo
1 of 11
Download to read offline
NXLEVLInc.
Capabilities Brief 2017
Veteran-owned, minority owned business
CAGE Code: 4WEQ7
NAICS Codes: 541511,	541618,	561612,	561621,	561611,	611519	and	928110
COMPANYOVERVIEW
SAZH Inc, D.B.A NXLEVL is a government facility “cleared” technology and operations support company, serving the U.S. Intelligence
Community, DOD and law enforcement in the areas of National Security, Public Safety, Cyber Security and full spectrum Programming and
Software Development.
Our mandate is to deliver the most comprehensive operations support and technology solutions, possible within each client organization.
Additionally, NXLEVLs highly qualified personnel will support IC organizations to effectively combat criminal activity, and transnational
threats deriving from terrorist operation, drug activity, and cyber-attacks. Additionally, NXLEVL’s extensive experience working with
Federal Government agencies in providing software, database, and multimedia support at advanced levels with reflective quality work and E-
Learning technologies.
.
NXLEVLs roots are solidly grounded in patriotism, accountability and the belief that every operation and organization can benefit from
comprehensive planning, careful implementation, and focused execution. President and CEO Bobby L. Sheppard , Executive Vice President
Jay D. Anderson, and Chief Operations Officer Kent Dorsey have a combined 60 years of expertise in National Security and Technology.
NXLEVL operates as a veteran-owned minority small business (SDB) formed in Maryland, USA
.
NXLEVL | 01
NXLEVL’SLEADERSHIP
President and CEO: Mr. Bobby L. Sheppard is a security professional with 22 years of Anti-terrorism and intelligence expertise. Mr.
Sheppard’s career within law enforcement and security extends into a twenty-year career protecting high-level government officials and securing
some of the most high-risk facilities in the world. Mr. Sheppard received the majority of his training and experience as a Federal Police Officer for
the U.S. Capitol Police and as a Counterterrorism Analyst and Security Officer serving with the U.S. Central Intelligence Agency. Mr. Sheppard
has worked for Fortune 500 companies as a contractor and understands how the corporate world works and the unique requirements to be
considered in the areas of crisis management, cyber security and overall threat risks world-wide. Mr. Sheppard has a Bachelors degree from the
University of Maryland College Park in Criminal Justice and Masters degree in Cyber Security.
Chief Operations Officer (COO): Mr. Kent Dorsey is a technology professional with over 20 years of experience in advanced multimedia
development and software programming. Mr. Dorsey’s expertise and skill has been so distinct over the last two decades that he was able to receive
contract opportunities and begin his own business in SAZH Inc. Now Mr. Dorsey takes his extreme work ethic and unmatched development skill to
push SAZH Inc., to the NXLEVL of capability and client fulfillment.
Chief Information Security Officer (CISO): Mr. Corey McCall has over 17 years of experience in Systems Administration, System
Engineering, and Information Assurance. Mr. McCall specializes in Certification Testing, Insurance, Software Development, education and DoD
Environments. Mr. McCall also has experience supporting DISA providing ST&E’s, CCRI Preparation, Product Validations along with C&A,
FSMA Reviews, Operational Assurance, and Vulnerability Management. Mr. McCall has a Masters degree in Information Security from UMUC,
and Certifications in: Security+, ITIL, CEH, CASP, and CISM.
EVP/Director Jay D. Anderson is a security professional with a combined 30 years of law enforcement and military special operations expertise.
Mr. Jay D. Anderson is a highly skilled military operator for U.S. Special Operations with the 20TH Special Forces Group and has worked as a
federal police officer and special agent for more than fifteen years. Mr. Anderson also served in Operation Enduring Freedom and other operations
in Afghanistan, Central America and Iraq. Mr. Anderson received the Bronze Star for his service Operation Iraqi freedom.
NXLEVL | 02
NXLEVLPastPerformance
Contract for the DoD (CISD) **past performance**
Ø 1 Year Period of Performance
Ø Subcontract to WOOD Consulting Service, Inc.
Ø Web Programming/Design | Research & Development
§ Contract for the DoD (PATHMASTER) **past performance**
Ø 3 Year Period of Performance
Ø Subcontract to WOOD Consulting Service, Inc.
Ø Software Development |Web Programming/Design | Research & Development
§Contract for the DoD (TCDD) **past performance**
Ø 1 Year Period of Performance
Ø Subcontract to L3 Communications, Inc.
Ø Software Development |Web Programming/Design | Research & Development
§Contract for the DoD (TSP) ** past performance **
Ø 3 Year Period of Performance
Ø Subcontract to Advanced Integrated Technologies, Inc.
Ø Software Development |Web Programming/Design | Research & Development
NXLEVL | 03
NXLEVLCyberSecurityandSoftwareDevelopment
NXLEVL software development and multi-media aims
to be true innovators within the defense contractor
space. Our focus is not only on providing personnel for
current and future contract opportunities in Cyber
Security but also developing assets to be used by our
clients world wide.
What NXLEVL brings to the table is working on Cyber
Security software development, and exploring
proactive and tactical based cyber to prospectively
combat PHISHING, SOCIAL ENGINEERING, and
BRUTE FORCE ATTACKS.
Additionally, it is our goal to develop IDS and IPS
software that focuses on providing forensic
investigators and analyst with information that is clear
and concise and easily used to target potential malware
and other malicious code.
NXLEVL | 04
CyberSecurity&TechnicalCapabilities
• NXLEVL’s custom web programming services entail production of custom software and database development with
software analysis and design on multiple platforms in JavaScript, PHP, XML, CSS, HTML5, and SQL for SharePoint,
JOOMLA environments among others.
• COMPUTER PROGRAMMING AND DEVELOPMENT SERVICES
• NXLEVL’s computer training services entail software application training, computer software training, and computer
operator training. We focus on programming for Cyber Security technology and systems engineering. These services
include rapid or adhoc development on demand, coding to assist with lowering the attack surface for hacker penetration
and standard development services.
• INFORMATION ASSURANCE ACCREDITATION REVIEW AND AUDITS
• NXLEVL is one of the industries leaders in INFORMATION ASSURANCE review and auditing for IT Governance
accreditation. Our company has the capability to ensure that government and commercial information systems adhere to
governing and accrediting bodies such as FISMA, DSS, DISA and more.
• E-LEARNING DEVELOPMENT
• NXLEVL has tailored and customized our software applications with detailed graphical-user-interface (GUI) designs,
which delivers interactive educational concepts to stimulate and inform the users and viewers learning abilities. Through
our web-based and downloadable software applications, which uses enhanced multimedia algorithms to incorporate
blending learning methodologies.
NXLEVL | 05
NXLEVLNationalSecurity&PublicSafety
NXLEVL’s focuses on serving U.S. Special
Operations Forces and the Intelligence Community.
NXLEVL brings highly skilled Special Operation
soldiers pulled primarily from U.S. Army Special
Forces to provide Regional Commands worldwide
both experienced Military Trainers and Regional
Engagement and Continuity Representatives.
Additionally, NXLEVL can provide the Intelligence
community with “cleared” and experienced
personnel with Intelligence Operations and or
Analysis experience for All Source Intelligence
Analysis, HUMINT operation support, Counter
Narcotics operations, and High-level Surveillance
operations.
Finally, NXLEVL provides Cyber Threat Intelligence
support, providing personnel with strong familiarity
and knowledge of the Cyber Security threats facing
U.S. organizations, and highly experienced all Source
analyst expertise.
NXLEVL | 06
IntelligenceCommunitySupport
All Source Intelligence Analysis
Contracts that require NXLEVL to deploy personnel that have worked in an operational environment where the
Intelligence Analyst understands how to collect, analyze, summarize and report on traffic coming from HUMINT, SIGINT,
MASINT, and possibly ELINT sources.
Counterterrorism Analysis
NXLEVL deploys personnel with a primary background in terrorist groups and methodologies typically have worked in
agencies such as NCTC, CTC, and similar DOD components. These analysts are effective at understanding the
methodologies and ideologies behind terrorist attacks and work to create predictive analytical pictures based on prior
attacks, operational traffic, and terrorist group modis operandi.
Cyber Threat Intelligence
NXLEVL deploys all source intelligence analysts with deep understanding of cyber security and the threats,
attacks and vulnerabilities surrounding the Internet architecture of U.S. government organizations and
corporations that are being exploited by foreign state actors and criminal elements worldwide.
NXLEVL | 07
Intelligence Operation Support and Analysis
NXLEVL’s U.S. Special Forces qualified personnel can provide individual or team support to military,
law enforcement personnel and Intelligence Community organizations with analytical support to
contingency operations, and operational intelligence support to U.S. federal agencies.
U.S. Military officials and OGAs tasked with conducting operations during both peacetime and low-
intensity conflicts around the globe can rely our support and analytical services
NXLEVL Intelligence Support and Analysis Teams (ISAT) can provide expert advice and assistance to
any organizations tasked with conducting intelligence operations.
NXLEVL | 08
NXLEVL’sHIRINGAPPROACH
NXLEVL | 09
Vacancy	
Identification
Communication	with	
Client:
• Work	Planning
• Resource	Forecast															
• Position	Requirements
- Education
- Experience
- Skills
Candidate	
Sources
Candidate
Selection
Candidate
Hiring
• Reference	and	
Background	Checks	
• Extend	Offer
• New	Employee	
Orientation
•Insider	Threat	INDOC	
brief	and	training.	
Client	
Acceptance
Interview
Screening	&	
Reference	
Checks
No
No
No
Yes
Yes
Yes
• Specialized	Resume	Pool
• Independent	Local	Area	
• personnel
• Placement	Services
• Job	Fairs/	Tradeshows
• College	Recruitment/	
Interns
•
• Subscription	Web-Based	
Services
• Employee	Referral	
Program
Email : bobby.sheppard@NXLEVL.COM
Direct Line : 703-454-4571
Fax : 703-991-5971
CONTACTUS
NXLEVL | 10
NXLEVL Inc.
“Highly Capable and Technologically Superb!”
www.nxlevl.com

More Related Content

What's hot

How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceSyed Peer
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsPriyanka Aash
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgramTaha Kachwala
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceAndreas Sfakianakis
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligencePrachi Mishra
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness ProgramPriyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 

What's hot (20)

How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
CTI Report
CTI ReportCTI Report
CTI Report
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
 
Welcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat IntelligenceWelcome to the world of Cyber Threat Intelligence
Welcome to the world of Cyber Threat Intelligence
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
CSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICESCSCSS CYBER INTELLIGENCE SERVICES
CSCSS CYBER INTELLIGENCE SERVICES
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Building a Strategic Plan for Your Security Awareness Program
Building a Strategic Plan for Your  Security Awareness ProgramBuilding a Strategic Plan for Your  Security Awareness Program
Building a Strategic Plan for Your Security Awareness Program
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 

Viewers also liked

ổN định cấu trúc protein bằng phun sấy
ổN định cấu trúc protein bằng phun sấyổN định cấu trúc protein bằng phun sấy
ổN định cấu trúc protein bằng phun sấyNguyen Phuong
 
My Resumé
My ResuméMy Resumé
My Resumélbredahl
 
Josh whipday fmp schedule 14.01.13
Josh whipday fmp schedule 14.01.13Josh whipday fmp schedule 14.01.13
Josh whipday fmp schedule 14.01.13irrealimagens
 
Wells,Iris Resume
Wells,Iris ResumeWells,Iris Resume
Wells,Iris ResumeIris Wells
 
3D dressing mirror machine (1)
3D dressing mirror machine (1)3D dressing mirror machine (1)
3D dressing mirror machine (1)Ameenah alarbeed
 
Challenge Course Hour1
Challenge Course Hour1Challenge Course Hour1
Challenge Course Hour1Sarah Cantrell
 
Etat de l'art des Réseaux sociaux d'entreprise - Tome 8
Etat de l'art des Réseaux sociaux d'entreprise - Tome 8Etat de l'art des Réseaux sociaux d'entreprise - Tome 8
Etat de l'art des Réseaux sociaux d'entreprise - Tome 8Lecko
 
La domotique et les objets connectés 2015
La domotique et les objets connectés 2015La domotique et les objets connectés 2015
La domotique et les objets connectés 2015servicesmobiles.fr
 
La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...
La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...
La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...Simone Aliprandi
 
Les enjeux du Social KM dans le contexte de transformation numérique des orga...
Les enjeux du Social KM dans le contexte de transformation numérique des orga...Les enjeux du Social KM dans le contexte de transformation numérique des orga...
Les enjeux du Social KM dans le contexte de transformation numérique des orga...Lecko
 
Les 10 Tendances Webdesign de 2014 by Vanksen
Les 10 Tendances Webdesign de 2014 by VanksenLes 10 Tendances Webdesign de 2014 by Vanksen
Les 10 Tendances Webdesign de 2014 by VanksenVanksen
 

Viewers also liked (19)

ổN định cấu trúc protein bằng phun sấy
ổN định cấu trúc protein bằng phun sấyổN định cấu trúc protein bằng phun sấy
ổN định cấu trúc protein bằng phun sấy
 
biggest loser
biggest loserbiggest loser
biggest loser
 
Lenguaje corporal
Lenguaje corporalLenguaje corporal
Lenguaje corporal
 
Daydream view
Daydream viewDaydream view
Daydream view
 
ES6 basics
ES6 basicsES6 basics
ES6 basics
 
My Resumé
My ResuméMy Resumé
My Resumé
 
Josh whipday fmp schedule 14.01.13
Josh whipday fmp schedule 14.01.13Josh whipday fmp schedule 14.01.13
Josh whipday fmp schedule 14.01.13
 
Wells,Iris Resume
Wells,Iris ResumeWells,Iris Resume
Wells,Iris Resume
 
Natureview
NatureviewNatureview
Natureview
 
3D dressing mirror machine (1)
3D dressing mirror machine (1)3D dressing mirror machine (1)
3D dressing mirror machine (1)
 
Challenge Course Hour1
Challenge Course Hour1Challenge Course Hour1
Challenge Course Hour1
 
Fleetmatics Solutions
Fleetmatics SolutionsFleetmatics Solutions
Fleetmatics Solutions
 
Lenguaje Corporal
Lenguaje CorporalLenguaje Corporal
Lenguaje Corporal
 
Etat de l'art des Réseaux sociaux d'entreprise - Tome 8
Etat de l'art des Réseaux sociaux d'entreprise - Tome 8Etat de l'art des Réseaux sociaux d'entreprise - Tome 8
Etat de l'art des Réseaux sociaux d'entreprise - Tome 8
 
La domotique et les objets connectés 2015
La domotique et les objets connectés 2015La domotique et les objets connectés 2015
La domotique et les objets connectés 2015
 
La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...
La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...
La vera chiave dell'openness sono gli standard: partiamo dalla PA (Palermo, g...
 
Modul penuh mentor mentee (1)
Modul penuh mentor mentee (1)Modul penuh mentor mentee (1)
Modul penuh mentor mentee (1)
 
Les enjeux du Social KM dans le contexte de transformation numérique des orga...
Les enjeux du Social KM dans le contexte de transformation numérique des orga...Les enjeux du Social KM dans le contexte de transformation numérique des orga...
Les enjeux du Social KM dans le contexte de transformation numérique des orga...
 
Les 10 Tendances Webdesign de 2014 by Vanksen
Les 10 Tendances Webdesign de 2014 by VanksenLes 10 Tendances Webdesign de 2014 by Vanksen
Les 10 Tendances Webdesign de 2014 by Vanksen
 

Similar to NXLEVL Capabilities Brief-2017

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdfMehedi Hasan
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response MethodologySignals Defense, LLC
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docxfaithxdunce63732
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioCyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioClearedJobs.Net
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfKen Fuller
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson
 
David pitts executive resume-2016
David pitts executive resume-2016David pitts executive resume-2016
David pitts executive resume-2016David Pitts
 
National Cyber Summit Job Fair June 5, 2019, Huntsville
National Cyber Summit Job Fair June 5, 2019, HuntsvilleNational Cyber Summit Job Fair June 5, 2019, Huntsville
National Cyber Summit Job Fair June 5, 2019, HuntsvilleClearedJobs.Net
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdfreStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdfKen Fuller
 
Cleared Job Fair Job Seeker Handbook May 19, 2020 Virtual
Cleared Job Fair Job Seeker Handbook May 19, 2020 VirtualCleared Job Fair Job Seeker Handbook May 19, 2020 Virtual
Cleared Job Fair Job Seeker Handbook May 19, 2020 VirtualClearedJobs.Net
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek Mezack
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016David Hale
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2Ron Miller
 

Similar to NXLEVL Capabilities Brief-2017 (20)

Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Cyber capability brochureCybersecurity Today A fresh l.docx
Cyber capability brochureCybersecurity Today  A fresh l.docxCyber capability brochureCybersecurity Today  A fresh l.docx
Cyber capability brochureCybersecurity Today A fresh l.docx
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioCyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San Antonio
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Christina Carson Resume 2016
Christina Carson Resume 2016Christina Carson Resume 2016
Christina Carson Resume 2016
 
David pitts executive resume-2016
David pitts executive resume-2016David pitts executive resume-2016
David pitts executive resume-2016
 
National Cyber Summit Job Fair June 5, 2019, Huntsville
National Cyber Summit Job Fair June 5, 2019, HuntsvilleNational Cyber Summit Job Fair June 5, 2019, Huntsville
National Cyber Summit Job Fair June 5, 2019, Huntsville
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdfreStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
reStartEvents 10:13 Colorado & Beyond Employer Directory.pdf
 
Capability Statement_v3
Capability Statement_v3Capability Statement_v3
Capability Statement_v3
 
Cleared Job Fair Job Seeker Handbook May 19, 2020 Virtual
Cleared Job Fair Job Seeker Handbook May 19, 2020 VirtualCleared Job Fair Job Seeker Handbook May 19, 2020 Virtual
Cleared Job Fair Job Seeker Handbook May 19, 2020 Virtual
 
Derek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_kDerek J Mezack Resume 2015-AppSec_k
Derek J Mezack Resume 2015-AppSec_k
 
HaleResume28June2016
HaleResume28June2016HaleResume28June2016
HaleResume28June2016
 
ABANACLE_5x8_brochure - USA
ABANACLE_5x8_brochure - USAABANACLE_5x8_brochure - USA
ABANACLE_5x8_brochure - USA
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 

NXLEVL Capabilities Brief-2017

  • 1. NXLEVLInc. Capabilities Brief 2017 Veteran-owned, minority owned business CAGE Code: 4WEQ7 NAICS Codes: 541511, 541618, 561612, 561621, 561611, 611519 and 928110
  • 2. COMPANYOVERVIEW SAZH Inc, D.B.A NXLEVL is a government facility “cleared” technology and operations support company, serving the U.S. Intelligence Community, DOD and law enforcement in the areas of National Security, Public Safety, Cyber Security and full spectrum Programming and Software Development. Our mandate is to deliver the most comprehensive operations support and technology solutions, possible within each client organization. Additionally, NXLEVLs highly qualified personnel will support IC organizations to effectively combat criminal activity, and transnational threats deriving from terrorist operation, drug activity, and cyber-attacks. Additionally, NXLEVL’s extensive experience working with Federal Government agencies in providing software, database, and multimedia support at advanced levels with reflective quality work and E- Learning technologies. . NXLEVLs roots are solidly grounded in patriotism, accountability and the belief that every operation and organization can benefit from comprehensive planning, careful implementation, and focused execution. President and CEO Bobby L. Sheppard , Executive Vice President Jay D. Anderson, and Chief Operations Officer Kent Dorsey have a combined 60 years of expertise in National Security and Technology. NXLEVL operates as a veteran-owned minority small business (SDB) formed in Maryland, USA . NXLEVL | 01
  • 3. NXLEVL’SLEADERSHIP President and CEO: Mr. Bobby L. Sheppard is a security professional with 22 years of Anti-terrorism and intelligence expertise. Mr. Sheppard’s career within law enforcement and security extends into a twenty-year career protecting high-level government officials and securing some of the most high-risk facilities in the world. Mr. Sheppard received the majority of his training and experience as a Federal Police Officer for the U.S. Capitol Police and as a Counterterrorism Analyst and Security Officer serving with the U.S. Central Intelligence Agency. Mr. Sheppard has worked for Fortune 500 companies as a contractor and understands how the corporate world works and the unique requirements to be considered in the areas of crisis management, cyber security and overall threat risks world-wide. Mr. Sheppard has a Bachelors degree from the University of Maryland College Park in Criminal Justice and Masters degree in Cyber Security. Chief Operations Officer (COO): Mr. Kent Dorsey is a technology professional with over 20 years of experience in advanced multimedia development and software programming. Mr. Dorsey’s expertise and skill has been so distinct over the last two decades that he was able to receive contract opportunities and begin his own business in SAZH Inc. Now Mr. Dorsey takes his extreme work ethic and unmatched development skill to push SAZH Inc., to the NXLEVL of capability and client fulfillment. Chief Information Security Officer (CISO): Mr. Corey McCall has over 17 years of experience in Systems Administration, System Engineering, and Information Assurance. Mr. McCall specializes in Certification Testing, Insurance, Software Development, education and DoD Environments. Mr. McCall also has experience supporting DISA providing ST&E’s, CCRI Preparation, Product Validations along with C&A, FSMA Reviews, Operational Assurance, and Vulnerability Management. Mr. McCall has a Masters degree in Information Security from UMUC, and Certifications in: Security+, ITIL, CEH, CASP, and CISM. EVP/Director Jay D. Anderson is a security professional with a combined 30 years of law enforcement and military special operations expertise. Mr. Jay D. Anderson is a highly skilled military operator for U.S. Special Operations with the 20TH Special Forces Group and has worked as a federal police officer and special agent for more than fifteen years. Mr. Anderson also served in Operation Enduring Freedom and other operations in Afghanistan, Central America and Iraq. Mr. Anderson received the Bronze Star for his service Operation Iraqi freedom. NXLEVL | 02
  • 4. NXLEVLPastPerformance Contract for the DoD (CISD) **past performance** Ø 1 Year Period of Performance Ø Subcontract to WOOD Consulting Service, Inc. Ø Web Programming/Design | Research & Development § Contract for the DoD (PATHMASTER) **past performance** Ø 3 Year Period of Performance Ø Subcontract to WOOD Consulting Service, Inc. Ø Software Development |Web Programming/Design | Research & Development §Contract for the DoD (TCDD) **past performance** Ø 1 Year Period of Performance Ø Subcontract to L3 Communications, Inc. Ø Software Development |Web Programming/Design | Research & Development §Contract for the DoD (TSP) ** past performance ** Ø 3 Year Period of Performance Ø Subcontract to Advanced Integrated Technologies, Inc. Ø Software Development |Web Programming/Design | Research & Development NXLEVL | 03
  • 5. NXLEVLCyberSecurityandSoftwareDevelopment NXLEVL software development and multi-media aims to be true innovators within the defense contractor space. Our focus is not only on providing personnel for current and future contract opportunities in Cyber Security but also developing assets to be used by our clients world wide. What NXLEVL brings to the table is working on Cyber Security software development, and exploring proactive and tactical based cyber to prospectively combat PHISHING, SOCIAL ENGINEERING, and BRUTE FORCE ATTACKS. Additionally, it is our goal to develop IDS and IPS software that focuses on providing forensic investigators and analyst with information that is clear and concise and easily used to target potential malware and other malicious code. NXLEVL | 04
  • 6. CyberSecurity&TechnicalCapabilities • NXLEVL’s custom web programming services entail production of custom software and database development with software analysis and design on multiple platforms in JavaScript, PHP, XML, CSS, HTML5, and SQL for SharePoint, JOOMLA environments among others. • COMPUTER PROGRAMMING AND DEVELOPMENT SERVICES • NXLEVL’s computer training services entail software application training, computer software training, and computer operator training. We focus on programming for Cyber Security technology and systems engineering. These services include rapid or adhoc development on demand, coding to assist with lowering the attack surface for hacker penetration and standard development services. • INFORMATION ASSURANCE ACCREDITATION REVIEW AND AUDITS • NXLEVL is one of the industries leaders in INFORMATION ASSURANCE review and auditing for IT Governance accreditation. Our company has the capability to ensure that government and commercial information systems adhere to governing and accrediting bodies such as FISMA, DSS, DISA and more. • E-LEARNING DEVELOPMENT • NXLEVL has tailored and customized our software applications with detailed graphical-user-interface (GUI) designs, which delivers interactive educational concepts to stimulate and inform the users and viewers learning abilities. Through our web-based and downloadable software applications, which uses enhanced multimedia algorithms to incorporate blending learning methodologies. NXLEVL | 05
  • 7. NXLEVLNationalSecurity&PublicSafety NXLEVL’s focuses on serving U.S. Special Operations Forces and the Intelligence Community. NXLEVL brings highly skilled Special Operation soldiers pulled primarily from U.S. Army Special Forces to provide Regional Commands worldwide both experienced Military Trainers and Regional Engagement and Continuity Representatives. Additionally, NXLEVL can provide the Intelligence community with “cleared” and experienced personnel with Intelligence Operations and or Analysis experience for All Source Intelligence Analysis, HUMINT operation support, Counter Narcotics operations, and High-level Surveillance operations. Finally, NXLEVL provides Cyber Threat Intelligence support, providing personnel with strong familiarity and knowledge of the Cyber Security threats facing U.S. organizations, and highly experienced all Source analyst expertise. NXLEVL | 06
  • 8. IntelligenceCommunitySupport All Source Intelligence Analysis Contracts that require NXLEVL to deploy personnel that have worked in an operational environment where the Intelligence Analyst understands how to collect, analyze, summarize and report on traffic coming from HUMINT, SIGINT, MASINT, and possibly ELINT sources. Counterterrorism Analysis NXLEVL deploys personnel with a primary background in terrorist groups and methodologies typically have worked in agencies such as NCTC, CTC, and similar DOD components. These analysts are effective at understanding the methodologies and ideologies behind terrorist attacks and work to create predictive analytical pictures based on prior attacks, operational traffic, and terrorist group modis operandi. Cyber Threat Intelligence NXLEVL deploys all source intelligence analysts with deep understanding of cyber security and the threats, attacks and vulnerabilities surrounding the Internet architecture of U.S. government organizations and corporations that are being exploited by foreign state actors and criminal elements worldwide. NXLEVL | 07
  • 9. Intelligence Operation Support and Analysis NXLEVL’s U.S. Special Forces qualified personnel can provide individual or team support to military, law enforcement personnel and Intelligence Community organizations with analytical support to contingency operations, and operational intelligence support to U.S. federal agencies. U.S. Military officials and OGAs tasked with conducting operations during both peacetime and low- intensity conflicts around the globe can rely our support and analytical services NXLEVL Intelligence Support and Analysis Teams (ISAT) can provide expert advice and assistance to any organizations tasked with conducting intelligence operations. NXLEVL | 08
  • 10. NXLEVL’sHIRINGAPPROACH NXLEVL | 09 Vacancy Identification Communication with Client: • Work Planning • Resource Forecast • Position Requirements - Education - Experience - Skills Candidate Sources Candidate Selection Candidate Hiring • Reference and Background Checks • Extend Offer • New Employee Orientation •Insider Threat INDOC brief and training. Client Acceptance Interview Screening & Reference Checks No No No Yes Yes Yes • Specialized Resume Pool • Independent Local Area • personnel • Placement Services • Job Fairs/ Tradeshows • College Recruitment/ Interns • • Subscription Web-Based Services • Employee Referral Program
  • 11. Email : bobby.sheppard@NXLEVL.COM Direct Line : 703-454-4571 Fax : 703-991-5971 CONTACTUS NXLEVL | 10 NXLEVL Inc. “Highly Capable and Technologically Superb!” www.nxlevl.com