Cipher Tech Solutions Competitors, Revenue, Alternatives and Pricing

Claim your profile


Upper Nyack, NY USA
Total Funding:N/A
Industry:Tech Services
Lead Investor(s):N/A

Estimated Revenue & Financials

  • Cipher Tech Solutions's estimated annual revenue is currently $4.8M per year.(?)
  • Cipher Tech Solutions's estimated revenue per employee is $145,000

Employee Data

  • Cipher Tech Solutions has 33 Employees.(?)
  • Cipher Tech Solutions grew their employee count by 10% last year.
  • Cipher Tech Solutions currently has 7 job openings.

Cipher Tech Solutions, Inc. was founded in 2006 by two engineering students from Northeastern University who were passionate about national security, software development, and entrepreneurship. Alongside classwork, Cipher Tech began to bridge the gap between the nation's best academics and students, and the defense community. Just a few years later, in true David and Goliath fashion, Cipher Tech became known as a fierce competitor by defense and intelligence firms many times our size. Today we, as a company, take great pride in supporting many of the most mission critical projects within the Department of Defense and the Intelligence Community. The majority of the company is comprised of extremely talented software developers who write production tools that directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the application of computer science and investigative procedures involving the examination of digital evidence. This includes extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counter-intelligence, and counter-terrorist activities. Malware reverse engineering is the practice of analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the malicious code is working and determine things like: how it infected the victim's computer; what kind of information is it seeking to steal; how is it communicating with the actor; and who that actor might be. Our rigorous hiring processes and extremely flat organizational chart have been critical to the company's success. We ensure that those core elements are preserved in our company's culture as we continue to grow year after year. Accordingly, we firmly believe in maintaining an extremely high bar when it comes to bringing on new talent.

keywords:Data Storage,Information Security,Physical Security,Security,Storage