SlideShare a Scribd company logo
1 of 1
Download to read offline
Legato, LLC is a dynamic small business providing comprehensive IT Engineering Services to the Intelligence
Community. Legato’s founders have 50 years of combined service supporting the National Security Agency as both
Government employees and contractors, with experience in software engineering, systems engineering, network
engineering, cyber security, and program management and acquisition. Legato’s core values consist of:

       Customer satisfaction
       Employee well-being
       Passion in the work we do
       Commitment to all aspects of our business
       Integrity across all aspects of the company’s dealings

Legato possesses a full capability of corporate functions for finance, contracts, security and human resources. Legato’s
recruiting resources are focused on candidate compliancy with position requirements, utilizing an optimal combination of
automated tools, existing databases and employee referrals. Legato provides a competitive benefits package, with
emphasis on low employee turnover through understanding and matching candidate abilities to open positions, as well as
continual assessment of employee career path progression.

Core Capabilities

Legato’s core capabilities span software engineering, systems engineering, network engineering, cyber security, and
program/project management and acquisition.

Software Engineering: Legato provides software engineering support in architecture and design utilizing agile, spiral,
waterfall, RAD, and SOA approaches. Legato has familiarity with virtually all languages, to include C, C++, C#, TCL,
Pascal, SQL, Python, J2EE.net, ASP, PHP, and Ruby. Legato’s web development capabilities touch HTML, XML, JSP,
Perl, Java Script, and Flash.

Systems Engineering: Legato capabilities include requirements definition, allocation, and traceability at the system, sub-
system, and configuration item levels, as well as risk management and mitigation at the enterprise level. Legato provides
software vulnerability assessment and supports the certification and accreditation process, ensuring security engineering
rigor throughout the entire system development life cycle, through a thorough understanding of DITSCAP/DINCAP and
NISCAP.

Network Engineering: Legato provides architecture development and engineering expertise in VOIP, TC/IP, SATCOM,
network modernization and productization, backup and recovery, wireless communications, CDMA, GSM,
telecommunications, Frame Relay, ATM, and security engineering for firewalls and VPNs. Legato engineers support lab
environment configuration and testing to include throughput, specification confirmation, stress and load testing, as well as
latency testing. Legato supports system deployments both CONUS and OCONUS.

Cyber Security: Legato provides vulnerability minimization, threat prioritization, and security process refinement. Legato
is experienced with infrastructure design, enterprise configuration and penetration testing. Legato has familiarity with
firewalls, VPNs, intrusion detection and prevention, email security, proxy servers, web content filtering, gateway and
enterprise client virus, unified threat management platforms, incidence response and forensics.

Program/Project Management and Acquisition: Legato has on staff program and project managers experienced in
managing large life-cycle development programs. Legato provides acquisition professionals possessing a thorough
understanding of the FAR and DFAR, contract formulation, and milestone tracking against budgets, commitments,
obligations and outlays.


 

More Related Content

What's hot

CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easyEC-Council
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryInfosec
 
Aiman Alhajjah-Resume-07-29-16
Aiman Alhajjah-Resume-07-29-16Aiman Alhajjah-Resume-07-29-16
Aiman Alhajjah-Resume-07-29-16Aiman Alhajjah
 
Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011cllsoftball
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumSelex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumLeonardo
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity SolutionsErin Planting
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information securityAhmed Banafa
 
BISS - 11nov2011
BISS - 11nov2011BISS - 11nov2011
BISS - 11nov2011Agora Group
 

What's hot (20)

Hemant_Experience
Hemant_ExperienceHemant_Experience
Hemant_Experience
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Byron Jackson Resume - 2016
Byron Jackson Resume - 2016Byron Jackson Resume - 2016
Byron Jackson Resume - 2016
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
Adarsh Resume ISO27001
Adarsh Resume ISO27001Adarsh Resume ISO27001
Adarsh Resume ISO27001
 
Skills that make network security training easy
Skills that make network security training easySkills that make network security training easy
Skills that make network security training easy
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
Aiman Alhajjah-Resume-07-29-16
Aiman Alhajjah-Resume-07-29-16Aiman Alhajjah-Resume-07-29-16
Aiman Alhajjah-Resume-07-29-16
 
Cv gulam rasool
Cv gulam rasoolCv gulam rasool
Cv gulam rasool
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Resume
ResumeResume
Resume
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011Ivan Serranos Resume 6 2011
Ivan Serranos Resume 6 2011
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumSelex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security Forum
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity Solutions
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
BISS - 11nov2011
BISS - 11nov2011BISS - 11nov2011
BISS - 11nov2011
 

Similar to Overview capabilities

infrastructure_mgmt_services
infrastructure_mgmt_servicesinfrastructure_mgmt_services
infrastructure_mgmt_servicesRavi Verdes
 
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Cegonsoft Fames
 
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Cegonsoft Fames
 
Lerman, gerald 1
Lerman, gerald 1Lerman, gerald 1
Lerman, gerald 1JerryLerman
 
Mazenet tech profile
Mazenet tech profileMazenet tech profile
Mazenet tech profilescribehouse
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
SGS Technologie Corporate Presentation
SGS Technologie Corporate PresentationSGS Technologie Corporate Presentation
SGS Technologie Corporate PresentationSGS Technologie LLC
 
Jim Dougherty Resume
Jim Dougherty ResumeJim Dougherty Resume
Jim Dougherty ResumeJim Dougherty
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfKen Fuller
 
Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdfMehedi Hasan
 

Similar to Overview capabilities (20)

Resume-Mandar
Resume-MandarResume-Mandar
Resume-Mandar
 
infrastructure_mgmt_services
infrastructure_mgmt_servicesinfrastructure_mgmt_services
infrastructure_mgmt_services
 
Current Resume
Current ResumeCurrent Resume
Current Resume
 
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
Final year IEEE projects for CS IS EEE EC students in Chennai &Coimbatore |20...
 
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
Final year IEEE Projects|IEEE 2013 Projects|IEEE 2014 Projects|IEEE 2013-2014...
 
Profile-Dharmesh Prajapati
Profile-Dharmesh PrajapatiProfile-Dharmesh Prajapati
Profile-Dharmesh Prajapati
 
Lerman, gerald 1
Lerman, gerald 1Lerman, gerald 1
Lerman, gerald 1
 
Mycv Tb
Mycv TbMycv Tb
Mycv Tb
 
Malik M. Ashfaque - CV
Malik M. Ashfaque - CVMalik M. Ashfaque - CV
Malik M. Ashfaque - CV
 
Resume
ResumeResume
Resume
 
Mazenet tech profile
Mazenet tech profileMazenet tech profile
Mazenet tech profile
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Mycv Sas
Mycv SasMycv Sas
Mycv Sas
 
SGS Technologie Corporate Presentation
SGS Technologie Corporate PresentationSGS Technologie Corporate Presentation
SGS Technologie Corporate Presentation
 
Jim Dougherty Resume
Jim Dougherty ResumeJim Dougherty Resume
Jim Dougherty Resume
 
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdfreStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
reStartEvents DC metro & Beyond 11:17 Employer Directory.pdf
 
Company profile logikeye.pdf
Company profile logikeye.pdfCompany profile logikeye.pdf
Company profile logikeye.pdf
 
Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
 
Resume
ResumeResume
Resume
 
Jason's Resume
Jason's ResumeJason's Resume
Jason's Resume
 

Overview capabilities

  • 1. Legato, LLC is a dynamic small business providing comprehensive IT Engineering Services to the Intelligence Community. Legato’s founders have 50 years of combined service supporting the National Security Agency as both Government employees and contractors, with experience in software engineering, systems engineering, network engineering, cyber security, and program management and acquisition. Legato’s core values consist of:  Customer satisfaction  Employee well-being  Passion in the work we do  Commitment to all aspects of our business  Integrity across all aspects of the company’s dealings Legato possesses a full capability of corporate functions for finance, contracts, security and human resources. Legato’s recruiting resources are focused on candidate compliancy with position requirements, utilizing an optimal combination of automated tools, existing databases and employee referrals. Legato provides a competitive benefits package, with emphasis on low employee turnover through understanding and matching candidate abilities to open positions, as well as continual assessment of employee career path progression. Core Capabilities Legato’s core capabilities span software engineering, systems engineering, network engineering, cyber security, and program/project management and acquisition. Software Engineering: Legato provides software engineering support in architecture and design utilizing agile, spiral, waterfall, RAD, and SOA approaches. Legato has familiarity with virtually all languages, to include C, C++, C#, TCL, Pascal, SQL, Python, J2EE.net, ASP, PHP, and Ruby. Legato’s web development capabilities touch HTML, XML, JSP, Perl, Java Script, and Flash. Systems Engineering: Legato capabilities include requirements definition, allocation, and traceability at the system, sub- system, and configuration item levels, as well as risk management and mitigation at the enterprise level. Legato provides software vulnerability assessment and supports the certification and accreditation process, ensuring security engineering rigor throughout the entire system development life cycle, through a thorough understanding of DITSCAP/DINCAP and NISCAP. Network Engineering: Legato provides architecture development and engineering expertise in VOIP, TC/IP, SATCOM, network modernization and productization, backup and recovery, wireless communications, CDMA, GSM, telecommunications, Frame Relay, ATM, and security engineering for firewalls and VPNs. Legato engineers support lab environment configuration and testing to include throughput, specification confirmation, stress and load testing, as well as latency testing. Legato supports system deployments both CONUS and OCONUS. Cyber Security: Legato provides vulnerability minimization, threat prioritization, and security process refinement. Legato is experienced with infrastructure design, enterprise configuration and penetration testing. Legato has familiarity with firewalls, VPNs, intrusion detection and prevention, email security, proxy servers, web content filtering, gateway and enterprise client virus, unified threat management platforms, incidence response and forensics. Program/Project Management and Acquisition: Legato has on staff program and project managers experienced in managing large life-cycle development programs. Legato provides acquisition professionals possessing a thorough understanding of the FAR and DFAR, contract formulation, and milestone tracking against budgets, commitments, obligations and outlays.