NAICS 541512 | Size Small Business | HQ Huntsville, AL | Clearance Active
SAM.gov registered · UEI active
RMF · ATO · IATT · Continuous Monitoring

Your system needs an ATO. We get it authorized.

Meridian Cyber is a Huntsville-based consulting practice helping Defense Industrial Base contractors get their systems through the Risk Management Framework — from categorization to Authorizing Official signature. ATO packages built defensibly. IATTs delivered on accelerated timelines. Stalled efforts unstuck. Senior-level attention on every engagement, no exceptions.

UEI ETRQWA9SFKJ5 SAM.gov active
Primary NAICS 541512 Computer Systems Design

Capabilities Statement

One-page PDF for primes, contracting officers, and small business liaisons evaluating Meridian Cyber for ATO and IATT consulting work.

Download PDF

Getting a system authorized rewards precision, discipline, and institutional memory. Most small and mid-sized defense contractors don’t have the bandwidth to build those muscles in-house — and the cost of getting RMF wrong is a delayed program, a stalled package, or a denied authorization. That’s where we operate.

Founder Background

Familiarity with the Redstone and Huntsville defense ecosystem from prior roles.

Redstone Arsenal Army
MDA Missile Defense
SMDC Space & Missile
Army Aviation AMCOM
DISA Networks
Prime Subs Tier 1 & 2

These represent program environments the founders have worked in during prior employment — not engagements delivered by Meridian Cyber LLC. The firm is newly established and actively pursuing its first client contracts.

Consulting Services

We help DIB contractors get their systems authorized.

Six engagement types covering the path from "we need an ATO" to "we have one and need to keep it." Each engagement has defined scope, fixed deliverables, and clear success criteria — your authorization decision, not open-ended hours. Engagements are sold individually or bundled as needed for your system.

01 / Readiness

ATO Readiness Assessment

Before you commit to a full RMF push, know where you actually stand. Comprehensive gap analysis of your system against applicable NIST 800-53 controls, with a defensible roadmap, realistic timeline, and honest assessment of whether your AO will sign.

Duration4–8 weeks FormatFixed-fee
02 / Full Package

ATO Package Development

Your system, through the full Risk Management Framework, to authorization. Categorization, control selection, SSP authoring, evidence collection, eMASS submission, AO engagement. We drive the package; your team contributes technical content as needed.

Duration6–18 months FormatFixed or T&M
03 / Interim

IATT Support

You need to test on a connected network before full ATO is realistic. Accelerated IATT package development with a clean transition path to full authorization — so the IATT work isn't thrown away later. Common for test-range integration and prototype connections.

Duration2–4 months FormatFixed-fee
04 / Documentation

SSP & Artifact Authoring

Your team has the technical knowledge but doesn't have time to write. Stand-alone authoring of System Security Plans, control implementation narratives, POA&Ms, and supporting artifacts — built to withstand assessor scrutiny on first review.

ScopePer document set FormatFixed-fee
05 / Sustainment

Continuous Monitoring

ATO granted is not ATO kept. Post-authorization sustainment: POA&M management, annual security reviews, configuration change assessments, and re-authorization preparation. Monthly retainer keeps your authorization defensible.

CadenceMonthly retainer FormatSubscription
06 / Advisory

eMASS & Stalled Package Rescue

For client teams running their own RMF effort that has stalled — assessor findings piling up, prior consultant gone, schedule slipping. Specialized advisory and package hygiene work to diagnose what broke and get authorization back on track.

EngagementHourly or fixed FormatAdvisory
Why Now

A new firm. A familiar practitioner.

Meridian Cyber is a newly established consulting practice. We believe in being direct about that — because the founders’ track records in prior roles, not a pretend corporate history, are what earn a first conversation. This section exists to make the distinction clear.

The Firm Newly Launched

Meridian Cyber LLC

A newly formed Alabama LLC dedicated to RMF and authorization services. SAM.gov registered and active. The firm has no completed client engagements yet — and is open about that.

Status
Pre-Revenue
Pursuing
First Contracts
The Founders Experienced

Practitioner + Assessor

The co-founders bring complementary RMF backgrounds: one has shepherded ATO packages through the full process as a practitioner; the other has assessed packages and audited eMASS in prior roles. The combination — not a pretend firm history — is the foundation of Meridian Cyber’s value.

Practitioner
RMF / eMASS
Assessor
SCA / Audit
The Offer Advantage of New

Senior Attention on Every Engagement

New firms bring something established consultancies cannot: the founders are the practitioners. Every engagement gets principal attention from both perspectives — practitioner and assessor. No junior analysts learning on your package. Lean structure, competitive rates, direct accountability.

On Your Package
The Founders
Rate Model
Market-Lean
As Meridian Cyber completes its first client engagements, verified past performance references will be added here. In the meantime, the founders are happy to discuss prior work in detail under appropriate NDA and to provide professional references from earlier roles.
Methodology

A deliberate four-phase approach.

How a typical engagement actually unfolds. Every consulting relationship begins with scoping discipline and ends with defensible documentation in front of the AO. We don’t improvise — we apply a methodology the founders have executed in prior RMF work, with measurable gates at each phase so you always know where your authorization stands.

i.

Scope & Categorize

System boundary definition, FIPS 199 categorization, overlay identification, authorization pathway decisions. The work that prevents rework.

Gate: Package Plan Approved
ii.

Design & Implement

Control selection aligned to categorization, implementation guidance for your engineering team, and early evidence collection planning.

Gate: Controls Selected
iii.

Document & Submit

SSP authoring, POA&M development, evidence package assembly, and eMASS submission ready for independent Security Control Assessment.

Gate: eMASS Submitted
iv.

Authorize & Sustain

Assessor support through the SCA, AO engagement, and transition into continuous monitoring cadence after authorization is granted.

Gate: ATO Granted
Why Meridian

Specific problems we solve.

Defense contractors don’t hire RMF consultants in the abstract — they hire them to solve specific, expensive problems. These are the ones we handle.

01

Subs who have never done RMF

A prime puts a CUI-handling requirement in your statement of work and you have no idea where to start. We take you from zero to submitted package without making you learn the framework yourself.

02

Stalled packages that won’t close

Assessor findings keep piling up, your prior consultant is out of ideas, and the schedule is slipping. Package rescue is work the founders have done before — diagnosing what broke and restructuring what remains is well within scope for us.

03

eMASS that doesn’t speak English

The tool is unforgiving, and most cybersecurity consultants have never actually used it. We’re eMASS-fluent — comfortable with workflows, package hygiene, and the quirks assessors flag.

04

Big-firm overhead on small-firm budgets

Tier-1 consultancies charge $400–$600/hour and bury you in process. We deliver senior-level execution at defensible rates — no layered hierarchies, no junior analysts on your package.

05

ATO during a production schedule

Your engineering team is delivering capability; you can’t ask them to stop and write control narratives. We shield your technical staff from compliance paperwork while still capturing what the package needs.

06

Proximity when it matters

Huntsville-based, clearance-active, on-site-capable. We show up when the work benefits from in-person engagement — working sessions, AO briefings, prime coordination meetings.

The Founders

Who does the work.

In federal contracting, clients want to know exactly who will be on their package. Meridian Cyber is a co-founded practice with two principals — the people you meet are the people who execute. Together, we cover both sides of the RMF table: the practitioner who builds the package and the assessor who reviews it.

T
Co-Founder
Tyler
RMF Practitioner
RMF
Hands-On Delivery
eMASS
Operational Fluency

Cybersecurity engineer with hands-on experience shepherding ATO packages through the full Risk Management Framework lifecycle in prior roles. Has responded to eMASS findings, sat through SCA interviews, and watched AOs make risk decisions firsthand.

J
Co-Founder
Jadyn
ATO Assessor & eMASS Auditor
SCA
Assessor Experience
eMASS
Audit Background

Brings the assessor’s perspective to every Meridian Cyber engagement. Experience as an ATO assessor and eMASS auditor in prior roles means packages are built with the questions assessors actually ask — not the questions consultants assume.

Meridian Cyber is intentionally co-founded to combine both sides of the RMF process: the practitioner who builds the package and the assessor who reviews it. Most RMF consultancies offer one perspective or the other. We bring both, on every engagement.

The firm itself is new. We have no delivered Meridian Cyber engagements yet, and we believe in being direct about that. What we offer is two senior practitioners with complementary backgrounds, applied directly to your package, at rates a small firm structure makes possible. Your engagement is principal-led work — not a junior analyst’s learning curve.

We’re actively pursuing first client engagements and open to subcontract roles, teaming arrangements, and direct small-business contracts. Detailed professional references from prior roles are available on request.

Shared Credentials & Posture
  • CISSP — ISC2
  • CAP / CGRC — RMF Authorization
  • Security+ — DoD 8140 IAT II
  • eMASS — Operational & Audit Experience
  • NIST 800-37/53 — Deep Working Knowledge
  • Clearance — Active
Data Handling

Built to handle CUI correctly.

A consultant who mishandles your CUI is a liability, not an asset. Meridian Cyber operates with the same data handling standards we advise clients to implement — the posture that allows us to work with sensitive material safely and credibly.

NIST

NIST 800-171 Self-Compliance

Internal security posture aligned to the same 800-171 controls we’ll advise clients to implement. We run the program we help others build. CUI-specific handling is structured per engagement — we work within client-furnished compliant environments or stand up engagement-specific controls as needed.

Corporate Identifiers

Registered & teaming-ready.

Meridian Cyber is registered in federal contracting systems and carries the designations required for immediate engagement on DoD work, either directly or as a subcontractor.

UEI ETRQWA9SFKJ5 SAM.gov active
Primary NAICS 541512 Computer Systems Design Services
Secondary NAICS 541519 · 541611 · 541690 Related IT & consulting services
Business Size Small Business Additional certifications in progress
Partnership Posture

Open to teaming and subcontracting.

Meridian Cyber actively pursues prime subcontractor roles, teaming arrangements, and joint ventures where our RMF capabilities strengthen a broader offering. Direct outreach from prime small business liaisons, capture managers, and teaming partners is welcomed.

Prime subcontracts — overflow RMF work on existing contracts
Teaming agreements — joint pursuits on task orders and IDIQs
Mentor-protégé — open to small business mentor-protégé arrangements
Capabilities exchange — bilateral capability swaps with aligned small businesses
Engage

Let’s discuss your authorization path.

Whether you need a readiness assessment, a full package, help with a stalled effort, or a subcontractor on a capture — start with a conversation. Most initial discussions take thirty minutes and result in a clear scope before any commitment.

Phone
Location
Huntsville, Alabama