CENTERPOINT’s certified penetration testers and ethical hackers apply advanced offensive techniques that mimic real world attacks. With these reality-based scenarios, we readily identify methods that would be attackers could use to circumvent the security features of applications, systems, or networks.
Experience in cybersecurity, innovative solutions and engineering talent: these three critical components prepare CENTERPOINT’s teams to face and defeat today’s most daunting cyber threats. We engineer cybersecurity architecture and solutions with emphasis on system resilience, compliance, and early identification of vulnerabilities.
CENTERPOINT’s teams of assessors conduct risk and vulnerability assessments to determine clients’ exposure to threats and vulnerabilities as a result of deviations from acceptable configurations and policies. We assess the level of risk, and develop recommendations for appropriate mitigation countermeasures in operational and non-operational situations.
After an intrusion, you must respond swiftly and effectively. We provide you the expertise in data collection and correlation to:
Today’s threats demand a more proactive role in detecting and isolating sophisticated attacks. We enable you to locate and eradicate entrenched threats through dynamic and adaptable hunting techniques of hypothesizing, collecting intrusion artifacts, and correlating data. In the end, we help you find and eradicate any cyber threads lurking in the darkness of your digital environment.
GSA awarded CENTERPOINT four (4) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) on IT Schedule 70 to provide agencies quicker access to key, pre-vetted support services that will expand agencies’ capacity to test high-priority IT systems, rapidly address potential vulnerabilities, and stop adversaries before they impact government networks.Read More
CENTERPOINT holds a multi-disciplinary IT Services Schedule 70 contract under SIN 132-51. Under this vehicle, government agencies have access to CENTERPOINT’s quality, effective and cost competitive IT Services -- specifically data analytics, systems architecture, software engineering, network engineering, mobile solutions, and cybersecurity services not covered under SINs 132-45A through 45D.Read More
The GSA One Acquisition Solution for Integrated Services (OASIS) Small Business (SB) contract is the only government-wide contract for complex professional services. Crafted to provide all Federal agencies with streamlined access to a broad spectrum of complex professional services for both commercial and non-commercial needs, it includes program management services; management consulting; logistics, engineering, scientific, financial services; and ancillary IT services.Read More
CIO-SP3 provides IT solutions and services, including health and biomedical-related IT services to meet scientific, health, administrative, operational, managerial, and information management requirements. The contract also contains general IT services, since medical systems are increasingly integrated within a broader IT architecture and therefore require a systems approach to their implementation and a sound infrastructure for their operation.Read More
The National Geospatial-Intelligence Agency (NGA) Cybersecurity Risk Management and Assessment (CRMA) contract provides NGA with cybersecurity services to protect and defend information and information systems (IS) by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.Read More
CENTERPOINT is a certified Woman-Owned Small Business (WOSB). This program enables agencies to gain access to top cybersecurity talent, and move closer to achieving their WOSB goals. Contracting can be accomplished via sole source, or through restricted competition amongst WOSBs.
CENTERPOINT has demonstrated its ability to consistently provide services that meet customer and regulatory requirements.
CENTERPOINT’s information security management system enables the company to manage the security of clients, corporate, and partners assets.
CENTERPOINT’s mission is to Protect Our Nation and Our Way of Life by engineering and delivering effective and innovative cybersecurity solutions for our clients.
Chairwoman & co-CEO
President & co-CEO
Chief Operating Officer
Director of Business Operations
Senior Director of Cybersecurity
Vice President of HR & FSO
Chief Financial Officer
Chief Cybersecurity Advisor
CENTERPOINT was founded as a cybersecurity firm by a team of technologists and entrepreneurs averaging over 25 years of experience in Federal information technology. This experience serves as the company’s foundation as we focus on supporting clients’ mission in defense, intelligence, and civilian agencies. The company’s work is centered on cybersecurity support and engineering services that enable secure operation of and access to enterprise services and information.
Since its inception, CENTERPOINT has been engaging with clients and industry partners in meaningful projects to secure our nation’s digital assets and infrastructure.
CENTERPOINT’s team of experts continues to provide mission-driven cybersecurity solutions to address modern threats and challenges. We remain laser-focused on our mission to Protect Our Nation and Our Way of Life.
When you join CENTERPOINT, you become part of a team whose work positively impacts our nation, our people and the world. Your efforts make a significant contribution to our national defense, while you achieve personal and professional growth.
CENTERPOINT Inc. Awarded $116M Contract to Provide Cybersecurity Support Services to the US Department of Health and Human Services (HHS). For details - click here.