CLOs on the Move

FWG Solutions

www.fwgsolutions.com

 
FWG Solutions is an Award Winning firm certified by the SBA as 8(a) and HUBZone. We are a trusted provider of cyber security capabilities, advanced engineering solutions and operational support services to the United States Department of Defense (DoD), Intelligence Community and Federal Civilian agencies. In Fiscal Year 2015 FWG was the winner of DoD`s prestigious Nunn-Perry Award as a Top Performing Mentor-Protege Mission Partner to DoD.
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details

Jobs

CTO-VP

FWG Solutions Washington, DC
Description Are you a “hands-on” Chief Technology Officer, Director of Cybersecurity or perhaps a Director/VP of Engineering ready to take-on an exciting role as a CTO and Technical Strategy Leader for a growing Cybersecurity and Engineering firm? Do you have a track record of building, growing and maturing a security ...

Similar Companies

Health Data Analytics Institute

The healthcare industry has been digitizing data for over a decade. Problem is, nobody knows what to do with it. Until now.

Mccaffrey Consulting Inc

Mccaffrey Consulting Inc is a San Diego, CA-based company in the Computers and Electronics sector.

BlueCurl

BlueCurl is a Langley, BC-based company in the Computers & Electronics sector.

BCS Solutions

BCS Solutions, Inc. is a Garden Grove, CA-based company in the Computers & Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.