SECURE IT SYSTEMS, LLC
SAM.gov Registered  ·  UEI: DYN4RGH9D893  ·  vincent@sislocal.com

Cybersecurity Risk, Compliance & Advisory Services

Senior, framework-driven security work for federal, healthcare, manufacturing, and professional services clients. Florida-based with established service presence in the Northeast and tri-state region.

UEI: DYN4RGH9D893
Primary NAICS: 541512
Small Business
SAM.gov Registered
UEI
DYN4RGH9D893
Primary NAICS
541512
Computer Systems Design Services
Classification
Small Business
SAM.gov Registered
ADDITIONAL NAICS: 541690 Other Scientific & Technical Consulting  •  541611 Administrative Management Consulting  •  611430 Professional & Management Training

Core Competencies

Cybersecurity Risk Assessments

NIST SP 800-30 methodology, asset and threat modeling, control evaluation, formal risk register and remediation roadmap.

NIST SP 800-171 Compliance Support

Self-assessment against the 110 controls, System Security Plan (SSP) and POA&M development, SPRS scoring support for defense contractors.

CMMC Level 1 Readiness

Gap assessment, evidence collection, FCI scoping, and self-attestation preparation aligned with current CMMC program guidance.

Information Security Policy Development

Authoring and modernization of policies, standards, and procedures aligned to NIST CSF, HIPAA, CJIS, and customer-specific frameworks.

Incident Response Tabletop Exercises

Custom scenario design, executive and technical facilitation, and after-action reporting tied to NIST SP 800-61 lifecycle.

Vendor & Third-Party Risk Programs

Questionnaire design, risk scoring frameworks, and program documentation for organizations standing up TPRM functions.

External Vulnerability Assessments

Authenticated and unauthenticated scanning of external attack surface, validation of findings, and prioritized remediation reporting.

Security Awareness & Phishing Programs

Curriculum design, simulated phishing campaigns, metrics dashboards, and program governance.

Fractional / Advisory CISO

Recurring security advisory engagements supporting leadership, board, and audit committees on strategy, governance, and risk.

Differentiators

Engagements are led by senior subject matter experts (SMEs) with direct project lifecycle involvement.

Deep cross-sector experience spanning healthcare, manufacturing, professional services, and small business environments.

Established network of specialized subcontractors and delivery partners available to scale engagement teams to scope.

Low-overhead, high-impact delivery — agile engagement model with defined scope, timeline, and reporting cadence.

Framework-driven, deliverable-focused work product designed to satisfy both technical and audit / contracting officer review.

Florida-based with established service presence in the Northeast, including the New York City and tri-state region.

Operational Capacity & Scale

Engagements are staffed with appropriately qualified personnel, drawing on in-house resources, vetted subcontractors, and trusted delivery partners matched to the scope of work.

Quality assurance and project governance are maintained at the Principal level, with a single point of accountability for the contracting officer or prime.

Representative Past Performance

Healthcare
Acute Care Hospital (200+ beds)

Scope: Ongoing security operations and incident response support, HIPAA-aligned policy development, and infrastructure hardening across a regional acute care environment.

Outcome: Sustained security operations program over multiple years; delivered incident containment and after-action documentation across multiple events.

Manufacturing
Multi-Site Industrial Manufacturer

Scope: Security architecture review, infrastructure scoping across multiple sites, and design of a phased managed security service program covering endpoint, network, and identity controls.

Outcome: Delivered written program proposal and supported full security stack transition from incumbent provider across multiple facilities.

Professional Services
Regional Services Firm

Scope: End-to-end security onboarding including identity and access management, MFA enforcement, endpoint protection, backup architecture, and email authentication (SPF, DKIM, DMARC).

Outcome: Established baseline security program from greenfield state; documented controls and policies aligned to a defined framework.

Point of contact for proposals & solicitations: Vincent Primiani, Founder & Principalvincent@sislocal.com  ·  (831) 854-8709