Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.


Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.


Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

Cyber Threat Hunting

Proactive hunting for Indications of Compromise (IoCs) or Indicators of Attack (IoA) on an ongoing basis or by client request.

parallax image

What Is Cyber Threat Hunting?

Automated tools such as AV and XDR are able to stop most malware incidents most of the time. However, what you cannot prevent you must be able to detect. Threat hunting is a proactive approach where threat hunters search for IoCs that may have escaped detection by the initial layers of your security defenses.


Your Cyber Threat Intelligence (CTI) Team

The Ingalls Cyber Threat Intelligence (CTI) Team actively performs threat hunts on an ongoing basis in all client environments or by client request.

Ingalls MXDR Cyber Threat hunting efforts broadly fit into one of two categories: Hypothesis-Led Threat hunts and Threat Intelligence-Led Threat hunts.



Hypothesis-Led Threat Hunt

Hypothesis-Led Threat Hunt

Hypothesis-led Threat hunts begin with a hypothesis based on known Tactics, Techniques, and Procedures (TTPs) for particular threat groups, malware behavior, or attacks targeting a specific application, platform, or industry.

Threat Intelligence-Led Threat Hunts

Threat Intelligence-Led Threat Hunts

Threat Intelligence-Led Threat hunts begin with specific IoCs or Indicators of Attack, especially for new and emerging threats. These IoCs and IoAs are sourced from industry partners, threat sharing platforms, open-source threat intelligence, and internally sourced threat intelligence (based on Ingalls Incident Response engagements).


MXDR Solutions Overview

The Ingalls Security Operations Center (SOC) provides 100% US-based, 24/7/365 coverage for comprehensive alerting, monitoring, analysis, detection, and response capabilities to Ingalls MXDR Clients.

Download the PDF brochure to learn more.



Cybersecurity Blog

18 min read

SOC Intern Yearbook

Meet Ingalls Information Security Interns! We thank each of them for all their hard work and dedication. Our interns...
3 min read

How TABA Funds Can Strengthen Your SBIR/STTR Proposal

The Technical and Business Assistance (TABA) program is a way for small businesses to get funding over and above their...
2 min read

Ingalls Spring 2024 Intern Review: Cierra Moret

In this Intern Review, we hear from Cierra Moret about what it's like working at Ingalls and what's next in her...

Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.


Subscribe To NetSec New

Learn More About MXDR Solutions

Fill out a few details and someone from our MXDR team will be in touch soon!