Skip to main content

Cybersecurity Services

About

The Office of the Chief Information Officer (OCIO) Cybersecurity Services Staff (CSS) supports and secures the DOJ and Components' missions by providing cybersecurity leadership across the Department. CSS provides solutions and services that protect and preserve the confidentiality, integrity, and availability of the Department’s electronic information. Specifically, the team provides capabilities in identity management, insider threat detection and prevention, and intrusion prevention to facilitate the Department’s mission delivery and improve our overall risk posture.

Meet the Chief Information Security Officer

Leadership

Vu T. Nguyen

Cybersecurity Services Director and Chief Information Security Officer 

 

Official Photo of Vu T. Nguyen

Mission

The Office of the Chief Information Officer (OCIO) Cybersecurity Services Staff (CSS) supports and secures the DOJ and components' missions by providing cybersecurity leadership across the Department through the following:

  • Insight, coordination, guidance, and recommendations concerning Federal programs and initiatives
  • Enterprise-level programs to enable threat detection and remediation of cybersecurity attacks
  • Enterprise licensing for security solutions, support, and technology to enable cost-effective cybersecurity solutions

Responsibilities

DOJ is targeted for cyber intrusions and attacks because of its various missions in enforcement, litigation, incarceration, civil protection, and national security. In response, CSS provides solutions and services that protect and preserve the confidentiality, integrity, and availability of DOJ's electronic information. Specifically, CSS provides capabilities in identity management, insider threat detection, and intrusion prevention to improve DOJ overall risk posture to make better-informed risk-based decisions.

Justice IT Service Offerings

Shield your enterprise against threats and strengthen your cyber defenses. DOJ provides a holistic security service including: Security Operations Center, Trusted Internet Connection (TIC), continuous monitoring, and an unmatched capability to integrate advanced threat intelligence from across the federal government. Let us worry about security so you can focus on your mission.

Access to DOJ Cybersecurity Services is for public agencies only.

Justice IT Service Offerings / Cybersecurity Services

Justice IT Service Offerings | Cybersecurity Services
Interactive catalog
Accessible PDF (1.7 MB)

 

Security Operation Center

DOJ Security Operations Center (JSOC) is the first provider of Security Operations Center as a Service (SOCaaS) for government customers serving as the central nexus for network monitoring, incident response, cyber threat intelligence collection, and cross-agency threat information sharing.

  • 24x7x365 monitoring and incident response with analysts cleared for Top Secret (TS)/Sensitive Compartmented Information (SCI) to cover all classification levels and to respond to threat intelligence from open and classified sources
  • Integrated monitoring includes Microsoft Office 365 and other cloud services
  • Hunt missions identify anomalies to exceed automated detection

Assessment and Continuous Monitoring

DOJ’s proprietary Cyber Security Assessment and Management (CSAM) automates assessments and authorizations to provide a comprehensive assessment and continuous monitoring service. More than 20 government agencies depend on the CSAM service to fulfill their Assessment and Authorization (A&A) needs.

  • Automated inventory, configuration, and vulnerability management and monitoring
  • Enterprise-wide risk posture view through a heat map, which lays out the strongest and weakest areas of an organization
  • Experienced client engagement specialists and technical support

Cloud-optimized Trusted Internet Connection (TIC)

DOJ’s cloud-optimized TIC service securely connects agencies to the internet and commercial cloud service providers with a modular, scalable design to protect both on-premise and cloud based applications.

  • Best of breed security technologies to meet and exceed all Federal TIC requirements
  • Direct connection to cloud service providers (Amazon, Azure, Microsoft Office 365) with minimal latency and high bandwidth
  • Highly resilient U.S. east and west instances with dual-rail high availability design

 

Inquire about Cybersecurity Services