Cyber security and defensive operations for government and commercial clients
IPSecure is a defense-focused security firm running SIEM deployments (Splunk, ArcSight, Elasticsearch) and incident response operations for government and commercial sectors. The tech stack reflects deep expertise in log analysis, network defense (Cisco, Juniper, SD-WAN, IPsec), and vulnerability testing (Burp Suite, Kali, Metasploit, ACAS). Hiring is concentrated in security roles (7 open positions across mid and senior levels) with active projects spanning SIEM implementation, adversarial dashboards, and operational cyber-weapon testing—indicating a shift toward real-time threat visibility and formalized incident response workflows.
IPSecure delivers cyber security, risk management, and defensive operations to U.S. government and commercial enterprises. Founded in 2000 in San Antonio, Texas, the company operates as a small disadvantaged business (8(a) certified) with core capabilities in information assurance, vulnerability testing, network security, cryptologic analysis, and incident response. The technical footprint includes SIEM platforms (Splunk, ArcSight, Elasticsearch), network infrastructure (Cisco, Juniper, SD-WAN), and offensive/defensive security tools (Metasploit, Burp Suite, Kali). Current project work centers on SIEM use-case implementation, incident response deployments, and operational evaluation of cyber systems, with stated pain points around reducing false positives, identifying intruder activity, and maintaining mission-critical system availability.
Primary SIEM platforms are Splunk, ArcSight, and Elasticsearch. Network monitoring and defense rely on Cisco (ASA, Catalyst, IOS, Wireless Controller), Juniper, and SD-WAN/IPsec infrastructure. Vulnerability scanning uses ACAS, Nexpose, Burp Suite, and Metasploit.
Active projects include SIEM implementation and resource maintenance, incident response deployments, adversarial activity dashboards, operational testing of cyber systems, and incident report and mission completion workflows. Core pain points are identifying intrusion activity, reducing false positives, and optimizing SIEM performance.
Other companies in the same industry, closest in size