NAICS 541512 | Size Small Business | HQ Huntsville, AL | Clearance Active
SAM.gov registration in progress
RMF · ATO · IATT · Continuous Monitoring

ATO packages built to pass the first assessment.

Meridian Cyber is a new Huntsville-based consulting firm founded to deliver Risk Management Framework authorization services to the Defense Industrial Base. The practice is built on the founder’s direct, hands-on RMF experience — and on a simple commitment: senior-level attention on every engagement, no exceptions.

UEI Pending SAM.gov activation in progress
CAGE Code Pending Issued through SAM.gov
Primary NAICS 541512 Computer Systems Design
Insurance Gen · Pro · Cyber Certificates on request

Capabilities Statement

One-page PDF · UEI · CAGE · NAICS · core competencies · past performance

Download PDF

The authorization process rewards precision, discipline, and institutional memory. Most small and mid-sized defense contractors don’t have the bandwidth to build those muscles in-house. That’s where we operate.

Founder Background

Familiarity with the Redstone and Huntsville defense ecosystem from prior roles.

Redstone Arsenal Army
MDA Missile Defense
SMDC Space & Missile
Army Aviation AMCOM
DISA Networks
Prime Subs Tier 1 & 2

These represent program environments the founder has worked in during prior employment — not engagements delivered by Meridian Cyber LLC. The firm is newly established and actively pursuing its first client contracts. Edit this list to reflect your actual program familiarity.

Capabilities

Full-lifecycle RMF support.

Six service lines aligned to the Risk Management Framework. Each engagement has defined scope, deliverables, and success criteria — never open-ended hours. Services are sold individually or bundled.

01 / Readiness

ATO Readiness Assessment

Comprehensive gap analysis of current security posture against applicable NIST 800-53 controls. Defensible roadmap and realistic timelines to authorization.

Duration4–8 weeks FormatFixed-fee
02 / Full Package

ATO Package Development

End-to-end Risk Management Framework execution. Categorization, control selection, SSP authoring, evidence collection, eMASS submission, AO engagement.

Duration6–18 months FormatFixed or T&M
03 / Interim

IATT Support

Accelerated package development for Interim Authority to Test. Systems onto connected test environments quickly, with a clean transition path to full ATO.

Duration2–4 months FormatFixed-fee
04 / Documentation

SSP & Artifact Authoring

Stand-alone authoring of System Security Plans, control implementation narratives, POA&Ms, and evidence packages. Built for assessor scrutiny.

ScopePer document set FormatFixed-fee
05 / Sustainment

Continuous Monitoring

Post-ATO sustainment. POA&M management, annual security reviews, configuration change assessments, re-authorization preparation. Monthly retainer.

CadenceMonthly retainer FormatSubscription
06 / Advisory

eMASS & Xacta Support

Specialized consulting for client teams working in DoD systems of record. Package hygiene, workflow coaching, and rescue of stalled efforts.

EngagementHourly FormatAdvisory
Why Now

A new firm. A familiar practitioner.

Meridian Cyber is a newly established consulting practice. We believe in being direct about that — because the founder’s track record in prior roles, not a pretend corporate history, is what earns a first conversation. This section exists to make the distinction clear.

The Firm Newly Launched

Meridian Cyber LLC

A newly formed Alabama LLC dedicated to RMF and authorization services. SAM.gov registration is in progress. The firm has no completed client engagements yet — and is open about that.

Status
Pre-Revenue
Pursuing
First Contracts
The Founder Experienced

Hands-On RMF Background

The founder has shepherded ATO packages through the full Risk Management Framework process in prior roles, with operational experience in eMASS. That individual experience — not a pretend firm history — is the foundation of Meridian Cyber’s value.

Direct RMF
Yes
eMASS
Operational
The Offer Advantage of New

Senior Attention on Every Engagement

New firms bring something established consultancies cannot: the founder is the practitioner. Every engagement gets principal attention. No junior analysts learning on your package. No layered hierarchies. Lean structure, competitive rates, direct accountability.

On Your Package
The Founder
Rate Model
Market-Lean
As Meridian Cyber completes its first client engagements, verified past performance references will be added here. In the meantime, the founder is happy to discuss prior work in detail under appropriate NDA and to provide professional references from earlier roles.
Methodology

A deliberate four-phase approach.

Every engagement begins with scoping discipline and ends with defensible documentation. We don’t improvise — we apply a methodology the founder has executed in prior RMF work, with measurable gates at each phase.

i.

Scope & Categorize

System boundary definition, FIPS 199 categorization, overlay identification, authorization pathway decisions. The work that prevents rework.

Gate: Package Plan Approved
ii.

Design & Implement

Control selection aligned to categorization, implementation guidance for your engineering team, and early evidence collection planning.

Gate: Controls Selected
iii.

Document & Submit

SSP authoring, POA&M development, evidence package assembly, and eMASS submission ready for independent Security Control Assessment.

Gate: eMASS Submitted
iv.

Authorize & Sustain

Assessor support through the SCA, AO engagement, and transition into continuous monitoring cadence after authorization is granted.

Gate: ATO Granted
Why Meridian

Specific problems we solve.

Defense contractors don’t hire RMF consultants in the abstract — they hire them to solve specific, expensive problems. These are the ones we handle.

01

Subs who have never done RMF

A prime puts a CUI-handling requirement in your statement of work and you have no idea where to start. We take you from zero to submitted package without making you learn the framework yourself.

02

Stalled packages that won’t close

Assessor findings keep piling up, your prior consultant is out of ideas, and the schedule is slipping. Package rescue is work the founder has done before — diagnosing what broke and restructuring what remains is well within scope for us.

03

eMASS that doesn’t speak English

The tool is unforgiving, and most cybersecurity consultants have never actually used it. We’re eMASS-fluent — comfortable with workflows, package hygiene, and the quirks assessors flag.

04

Big-firm overhead on small-firm budgets

Tier-1 consultancies charge $400–$600/hour and bury you in process. We deliver senior-level execution at defensible rates — no layered hierarchies, no junior analysts on your package.

05

ATO during a production schedule

Your engineering team is delivering capability; you can’t ask them to stop and write control narratives. We shield your technical staff from compliance paperwork while still capturing what the package needs.

06

Proximity when it matters

Huntsville-based, clearance-active, on-site-capable. We show up when the work benefits from in-person engagement — working sessions, AO briefings, prime coordination meetings.

The Principal

Who does the work.

In federal contracting, clients want to know exactly who will be on their package. Meridian Cyber is a principal-led practice — the person you meet is the person who executes.

M
Founder & Principal
[Your Name]
RMF & ATO Practitioner
RMF
Hands-On Experience
eMASS
Operational Fluency

Meridian Cyber was founded by a cybersecurity practitioner with direct, hands-on experience shepherding ATO packages through the full Risk Management Framework lifecycle in prior roles. That individual experience — responding to eMASS findings, sitting through SCA interviews, watching AOs make risk decisions — is the foundation of the firm.

Meridian Cyber itself is new. The firm has no delivered client engagements yet, and we believe in being direct about that. What we offer is the founder’s practitioner experience, applied directly to your package, at rates a small firm structure makes possible. Your engagement will be the founder’s work — not a junior analyst’s learning curve.

We’re actively pursuing first client engagements and open to subcontract roles, teaming arrangements, and direct small-business contracts. Detailed professional references from prior roles are available on request.

Credentials & Posture
  • CISSP — ISC2
  • CAP / CGRC — RMF Authorization
  • Security+ — DoD 8140 IAT II
  • eMASS — Operational Fluency
  • NIST 800-37/53 — Deep Working Knowledge
  • Clearance — Active
Data Handling

Built to handle CUI correctly.

A consultant who mishandles your CUI is a liability, not an asset. Meridian Cyber operates with the same data handling standards we advise clients to implement — the posture that allows us to work with sensitive material safely and credibly.

M365

Microsoft 365 GCC High

Government Community Cloud High tenant for all client-sensitive work. DFARS 7012 and FedRAMP Moderate Equivalent authorized for CUI handling.

NIST

NIST 800-171 Self-Compliance

Internal security posture aligned to the same 800-171 controls we’ll advise clients to implement. We run the program we help others build.

AI

AI With Proper Boundaries

AI-augmented delivery for efficiency — but only in approved environments. Public LLMs never touch CUI; authorized tooling only for client data.

Corporate Identifiers

Registered & teaming-ready.

Meridian Cyber is registered in federal contracting systems and carries the designations and insurance posture required for immediate engagement on DoD work, either directly or as a subcontractor.

UEI Pending Issued upon SAM.gov activation
CAGE Code Pending Assigned through SAM.gov
Primary NAICS 541512 Computer Systems Design Services
Secondary NAICS 541519 · 541611 · 541690 Related IT & consulting services
Business Size Small Business Additional certifications in progress
Insurance General · Professional · Cyber $1M / $2M coverage · certificates on request
Partnership Posture

Open to teaming and subcontracting.

Meridian Cyber actively pursues prime subcontractor roles, teaming arrangements, and joint ventures where our RMF capabilities strengthen a broader offering. Direct outreach from prime small business liaisons, capture managers, and teaming partners is welcomed.

Prime subcontracts — overflow RMF work on existing contracts
Teaming agreements — joint pursuits on task orders and IDIQs
Mentor-protégé — open to small business mentor-protégé arrangements
Capabilities exchange — bilateral capability swaps with aligned small businesses
Engage

Let’s discuss your authorization path.

Whether you need a readiness assessment, a full package, help with a stalled effort, or a subcontractor on a capture — start with a conversation. Most initial discussions take thirty minutes and result in a clear scope before any commitment.

Phone
[To be assigned]
Location
Huntsville, Alabama