CareersContact
Home

CORPORATE PROFILE

< Cybersecurity for National Security / >

SERVING THE DOD AND FEDERAL CIVILIAN AGENCIES

BreakPoint Labs is an established Government contracting firm with a well-established track record of exceptional prime contractor performance in support of Department of Defense and Federal Government clients.
Corporate Profile

BreakPoint Labs’ Government contracting corporate attributes are as follows:

  • Business Size: Total Small Business
  • SAM UEID: WAU7C2EAKGN9
  • CAGE Code: 7FZP3
  • GSA Schedule: Contract #GS-35F-248GA
  • DUNS: 079914189

Contact Us for additional information, such as DCSA Facility Clearance (FCL) details and/or Past Performance references.

Contracts Point of Contact:
Denise Cole
Contracts Administrator
(703) 495-3559
contracts@breakpoint-labs.com

Corporate Certifications
BreakPoint Labs maintains corporate certifications to independently verify the quality and performance of the cybersecurity services we deliver to clients.

Since 2019, BreakPoint Labs has been appraised at maturity level 3 of the Capability Maturity Model Integration (CMMI)® for Services (CMMI-SVC), including all programmatic support and infrastructure necessary to deliver cybersecurity services to Government and commercial clients.
Since 2018, BreakPoint Labs has maintained a certified Quality Management System (QMS) under ISO 9001:2015 standards, which governs BPL's processes for attracting, hiring, and retaining a technically-proficient cybersecurity workforce.

In both instances, CMMI-SVC and ISO 9001:2015 designations reinforce BreakPoint Labs’ culture of continuous improvement and lessons learned, in order to maximize the quality and value of cybersecurity services delivered to clients.

PAST PERFORMANCE

BreakPoint Labs has had the opportunity and privilege to support impactful cyber missions of National Security importance. Learn more about some of BreakPoint Labs' past projects providing technically-proficient, mission-focused cybersecurity services to clients.

LEARN MORE
NAICS
NAICS Code: Description:
541511 Custom Computer Programming Services
541512 Computer Systems Design Services
541513
Computer Facilities Management Services
541519
Other Computer Related Services (primary)
541330
Engineering Services
541715
Research and Development in the Physical, Engineering, and Life Sciences (except Nanotechnology and Biotechnology)
SIC
SIC Code:Description:
7371Custom Computer Programming Services
7373Computer Integrated Systems Design
7376
Computer Facilities Management
7379
Computer Related Services, Nec*
7379
Computer Related Services, Nec* (primary)
SINS
BreakPoint Labs provides the following Information Technology Services:

54151HACS - Highly Adaptive Cybersecurity Services (HACS)
High Value Asset Assessments
Risk and Vulnerability Assessments
Cyber Hunt
Incident Response
Penetration Testing

PSC
PSC Code:Description:
AC11National Defense R&D Services; Department of Defense - Military; Basic Research
AC12National Defense R&D Services; Department of Defense - Military; Applied Research
AJ11General Science and Technology R&D Services; General science and technology; Basic Research
AJ12General Science and Technology R&D Services; General science and technology; Applied Research
D310IT AND TELECOM - CYBER SECURITY AND DATA BACKUP
DJ01IT and Telecom - Security And Compliance Support Services (Labor) Support services focused on supporting security policies/controls, processes, measuring compliance of relevant legal/compliance requirements, to include Section 508, and responding to security breaches. Also provides support for IT Security systems providing Continuous Diagnostics and Mitigation (CDM) for real-time Cyber Security and protection such as vulnerability scanning, managing firewalls, intrusion prevention systems, and security information and event management (SIEM). Includes Disaster Recovery (DR) services to support DR policy, process and means, dedicated failover facilities and perform DR testing. Excludes: The implementation actions defined by Compliance policy (e.g. implementing controls like multi-factor authentication) are not included in the Compliance sub-tower and are part of the respective towers where the actions take place (e.g. Compute, Storage, Network, Application, End User).

SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION

Contact
chevron-down