Veteran owned
Defense-grade security for smaller teams

Defense-grade cybersecurity
for DoD contractors and regulated businesses.

Integrated Cyber Defense Solutions (ICDS) designs and operates secure environments aligned to CMMC and NIST 800-171 so you can win and keep federal work without guessing at the requirements.

Focus: CMMC Level 1 & 2 readiness, secure Microsoft 365 enclaves, and security-first managed services.

Core services

ICDS is built to help you understand, implement, and operate the controls you’re being asked about in contracts, audits, and security questionnaires.

Compliance

CMMC & NIST 800-171 readiness

Gap assessments, prioritized POA&Ms, and practical guidance for meeting federal cybersecurity requirements without drowning your team in theory.

Architecture

Secure Microsoft 365 & cloud enclaves

Design and implementation of secure enclaves for FCI and CUI, including identity, device hardening, logging, and access controls tailored to CMMC expectations.

Operations

Security-first managed services

Ongoing patching, hardening, endpoint protection, and monitoring delivered with a security-first mindset so IT operations support your compliance story instead of fighting it.

Advisory

Virtual CISO & security leadership

Strategy, roadmaps, and executive-level briefings built around your environment, budget, and contract landscape—without a full-time security executive.

Third-party

Vendor and subcontractor risk

Help evaluating subcontractors, managed service providers, and cloud vendors against contract requirements so you can flow down controls with confidence.

Response

Incident readiness & playbooks

Practical incident response plans and tabletop exercises focused on the scenarios that actually matter for DoD contractors and public sector organizations.

Advanced defense

Drone analysis & defense

Threat modeling, telemetry analysis, and defensive planning for commercial and tactical drone activity around your facilities, projects, and critical assets.

Example outcomes

Every organization is different, but the patterns repeat: legacy IT, unclear ownership, and rising expectations from customers and contracting officers.

DoD contractor
Construction & engineering
Public sector & education
Private business
Outcomes based on your industry & selected service

What you get when you work with ICDS

We don’t just hand you a checklist. We design, build, and help operate a defendable environment—and the paperwork that goes with it—so your security story holds up under questions from primes, assessors, and customers.

  • Designed and built enclaves for FCI/CUI in Microsoft 365 and the cloud, mapped to CMMC and NIST 800-171 expectations.
  • Policies, diagrams, and runbooks that actually match how your environment is configured and how your people work.
  • Evidence packages—boundary diagrams, POA&M inputs, logs, and reports—ready for primes, assessors, and customers.
  • Ongoing operational support so patching, backups, and monitoring support your security story instead of fighting it.

Most clients see a clear, defendable story in the first 60–90 days: where sensitive data lives, how it’s protected, and what’s left to do. You still own the business. We help you own the security and compliance story that comes with it—without needing a full-time security department.

How we work together

A simple, three-step flow so you always know what’s happening, when value arrives, and what comes next.

Step 1 • Baseline & intake
Understand your reality

Short discovery sessions, environment review, and contract analysis. We clarify what data you hold, how it moves, and which requirements actually apply.

Step 2 • Build your security story
Design, document, and defend

Enclave design, control mapping, policies, diagrams, and a living POA&M. We turn requirements into concrete artifacts and architecture.

Step 3 • Operate & improve
Keep it running under pressure

Ongoing operational support, leadership briefings, and roadmap updates so your posture evolves with contracts, threats, and growth.

Protecting mission-critical organizations across the country

ICDS supports DoD contractors, construction firms, schools, and private businesses who need defensible cybersecurity aligned to CMMC, NIST 800-171, and real-world operational demands.

82%
readiness in first 90 days
40+
systems secured
100%
veteran-owned

Starting points

Every environment is different, but most projects land near these ranges. Exact pricing depends on scope, complexity, and timelines.

Readiness
CMMC Level 1
Starting at $3,500

Focused assessment, targeted POA&M, and right-sized policies for smaller environments handling FCI.

Readiness
CMMC Level 2
Starting at $12,000

Gap analysis, enclave strategy, and documentation for organizations processing CUI across multiple systems.

Architecture
Secure M365 enclave
Starting at $6,000

Tenant design, identity and device baselines, and logging patterns aligned to CMMC & NIST 800-171 expectations.

Leadership
Virtual CISO
Starting at $1,500/mo

Recurring strategy, risk, and readiness briefings with roadmap ownership and support for leadership decisions.

These are typical entry points, not hard quotes. We’ll scope your environment, contracts, and goals before finalizing anything.

Why clients choose ICDS

Built at the intersection of hands-on security engineering, DoD mission experience, and the realities of smaller IT teams.

We build, not just advise

Unlike slide-deck consultants, we design and help operate the tenants, policies, and runbooks that form your security story.

Security-first managed services

Operations, monitoring, and support are aligned to evidence and controls from day one—not bolted on after the fact.

Clarity for executives and boards

We translate threats, gaps, and roadmap into business language, so leadership can make decisions without getting lost in jargon.

For DoD contractors and primes:
ICDS does not turn your environment into a black box. We help you design and operate a defendable, documented enclave so you own the compliance story—and can explain it under scrutiny.
Trusted by teams working in: DoD contracting Construction & engineering K-12 & public sector Professional services Critical infrastructure
Securing organizations like yours
DOD
Defense & DoD contractors
Primes and subs aligning to CMMC and DFARS.
BUILD
Construction & engineering
Contractors modernizing security for projects and bids.
EDU
K-12 & public sector
Schools and agencies raising their cyber baseline.
PRO
Professional services
Firms answering security questionnaires from larger clients.
OT
Manufacturing & critical infra
Operators tightening controls without stopping production.
SAAS
Technology & SaaS
Teams turning security and compliance into a sales asset.

Security & compliance, without the theater

No vague promises. No template binders nobody can maintain. Just a defendable story that matches your reality.

What we stand behind

We don’t guarantee that nothing bad will ever happen—no one can. What we do guarantee is clarity, honest communication, and a security story you can explain to auditors, primes, boards, and customers without flinching.

  • Evidence-backed documentation: diagrams, policies, POA&Ms, and logs that reflect how your environment actually runs.
  • Architectures and baselines built for scrutiny from primes, assessors, and regulators.
  • Leadership-ready briefings focused on risk, contracts, and next steps—not fear, uncertainty, and doubt.

Request a free readiness snapshot

In a short conversation, we’ll walk through five core areas—data, identity, devices, cloud, and vendors—and give you a plain-language snapshot of where you stand and what’s next.

  • Do you process FCI or CUI today, or expect to in the next 12–18 months?
  • What does your Microsoft 365 or cloud footprint look like?
  • How are endpoints, backups, and remote access handled today?
  • Do you have written policies and any prior assessments or questionnaires?
  • Do subcontractors or vendors touch your sensitive data or systems?

You’ll leave with a simple readiness score, key risks, and options—not a hard sell.

Before ICDS vs. after ICDS

Most clients start with a mix of tribal knowledge, informal IT, and rising pressure from customers. Here’s what changes.

Area Before ICDS After ICDS
Scope & boundaries Unclear which systems handle FCI/CUI or sensitive data. Documented enclave boundaries and data flows, easy to explain.
Policies & evidence Generic templates, outdated, or missing entirely. Policies, diagrams, and records mapped to real configurations.
Operations Patching, backups, and monitoring done ad hoc when there’s time. Routine, documented tasks tied directly to your control set.
Questionnaires & audits Stressful, slow responses, often guessing at the right answers. Evidence-backed responses and artifacts ready before questions arrive.
Leadership visibility Cyber treated as a technical problem, hard to prioritize. Roadmaps and briefings that connect risk to contracts and cash flow.

Your first 30 days with ICDS

We move quickly without breaking things. The goal is early clarity, visible progress, and a shared understanding of what “good” looks like for your size and mission.

  • Week 1 Discovery, environment review, and initial risk conversation with leadership.
  • Week 2 Draft data flows, enclave boundaries, and prioritized list of immediate gaps.
  • Week 3 Initial policy and runbook alignment to how your team actually works.
  • Week 4 Leadership-ready snapshot: where you are, where you’re going, and what it will take.
Veteran-owned
Security engineering

Veteran-led, mission-focused, built for the realities of smaller teams.

Integrated Cyber Defense Solutions was founded by an Air National Guard cyber professional with hands-on experience in enterprise security, incident response, and compliance work for regulated organizations. ICDS exists to bring defense-grade thinking to organizations that can’t afford their own security department—but still carry the same risk and contractual obligations as much larger players.

  • 100% veteran-owned business focused on DoD contractors and public sector organizations.
  • Experience with vulnerability management, incident response, and real-world cyber operations—not just slide decks.
  • Security-first philosophy: IT, cloud, and operations are designed to support your security story from day one.
  • Currently pursuing formal SBA Veteran-Owned Small Business certification to support federal contracting opportunities.

Meet the founder

Security isn’t abstract here. ICDS is built by someone who has lived the operational side of cyber in both civilian and military environments.

JB
Jered Bare
Founder & Principal, Integrated Cyber Defense Solutions

Jered is an Air National Guard cyber professional and seasoned security engineer with experience supporting incident response, vulnerability management, and compliance programs for regulated organizations.

He has helped design and operate security programs for DoD contractors, public sector entities, and private businesses that carry federal risk without federal-scale budgets. That experience shapes how ICDS approaches every engagement: practical, mission-focused, and built for the way smaller teams really work.

Get started

Whether you are responding to a security questionnaire, staring at CMMC contract language, or simply trying to get ahead of risk, ICDS can help you understand your options and prioritize what to do next.

Request a 30-minute discovery call.

No pressure, no sales script. We’ll talk about your environment, the contracts you care about, and what “good” realistically looks like for an organization your size.

For now, reach out directly:

  • Email: info@icds.us
  • Include: your organization, rough size, and what you need help with.
  • If you’d like a contact form here later, we can add one without changing the static nature of the site.