Don’t Settle For Less
We Provide FSO Services
We help defense contractors through the security clearance process.
It’s not easy to understand the requirements for becoming a cleared defense contractor or for newly cleared companies to navigate security clearance requirements. Guidance is disparate and sometimes conflicting. At Thrive Analysis Group, we know NISPOM and we know FSOs. Our employees are FSOs with decades of experience with NISPOM requirments and engagement with DCSA. Whether you need hourly consultation or a more long term solution, we can help.
For some, the FSO designation is a career track with potential growth. For others, it’s an undesired appointment, part of doing business and just another additional duty.
However, this responsibility should be taken very seriously as classified contracts depend on success. Regardless of whether desired or appointed, the FSO is key to managing classified contracts.
Why not let Thrive Analysis Group Inc manage your FSO requirements while you focus on your core capabilities. We are uniquely positioned to equip your organization with FSO solutions and services.
While you may be appointed as FSO, you should delegate FSO responsibilities to us. We provide a wide range of managed solutions starting at $550 per month, depending on the number of cleared employees. Leave FSO tasks to a trusted partner.
Our strength is compliance solutions and the following are just part of what we provide:
- Entity Eligibility Determination Processing (FCL)
- Personnel Eligibility Determination Processing
- Reviewing and submitting security clearance information into the National Industrial Security System (NISS) / NBIS and Defense Information System for Security (DISS)
- Appoint Key Management Personnel (KMP)
- Liaison between cleared facility, FSO and DCSA
- Consult the Senior Management Official, FSO and ITPSO on roles, responsibilities and required training
- Establish and post required FCL forms and documentation
- Develop and issue procedures:
- SEAD-3 Reporting
- Insider Threat Reporting
- Security Processes and Procedures
- Cleared employee briefs and training
- Self-Inspections
We provide subscription based and hourly based consultion. Subscription is a monthly rate depending on the size of the organization. Hourly rates are for special projects that require analysis and process development. See the charts below for more information.
Standard Services
Subscription- This service is for cleared defense contractors who need assistance with managing security clearance tasks. Just like outsourcing HR or accounting, you can outsource FSO services. That’s what we do Outsourced FSO Solutions. Our subscription is based on number of cleared employees and provides standard tasks
- Standardized service includes much of the following:
- Maintain personnel security clearances
- Perform cleared employee tasks in DISS and NBIS
- Maintain NBIS and DISS
- Provide NISPOM required cleared employee training
- Visit requests
- Travel reports
- Update NISS requirements
- KMP appointment memorandums
- Provide or update Insider Threat Program Policy
- Provide or update SEAD 3 Policy
Non standard services
Non Subscription Consulting- This is a special projects option that assists FSOs with special tasks like building and developing programs, policies, training and other solutions. We can do the following and more:
- Assist with security clearances
- Facility Security clearance consultation
- Facility clearance forms and requirements
- KMP appointment memos and requirements
- Facility security clearance maintenance
- CUI program development and training
- OPSEC program development and training
- Insider threat program development and training
- KMP training
- Self-inspection program
FOCI Working Group
For situations where FOCI actions are complete. We facilitate FOCI meetings for existing FOCI mitigations and agreements- This is for situations where the company would like to outsource FOCI mitigation assistance. We would facilitate and advice your montly or quarterly FOCI mitigation meetings. Our tasks include:
- Facilitate Government Security Committee meetings
- Review and enforse Government Security Agreements
- Facilitate tasks based on agreement type
- Review and enforce requirements under:
ECP
TCP
AOP
C-QMP
and more
- Write meeting reports
Lead Insider Threat Working Group
For situations where Insider Threat Programs are in place. We facilitate the insider threat working group meetings for you.- This option is for FSOs, ITPSOs and SMOs who would like someone to develop and facilitate their Insider Threat Program Working Group. We would lead monthly or quarterly meetings and:
- Develop agenda
- Review ITP tasks
- Identify sensitive information and assess risk
- Determine where sensitive information resides
- Assign, document and limit personnel access
- Identify vulnerabilities and threats
- Prepare, maintain, and update the ITP risk assessments
- Identify and implementing mitigations using appropriate disciplines to mitigate vulnerabilities Develop employee guidance for implementing countermeasures
- Continually evaluate the application of countermeasures and their effectiveness
- Write meeting reports and document actions
- Provide insider threat working group training
- Provide insider threat employee training
Security Compliance
We provide tailored solutions to help defense contractors meet compliance requirements under:
- FOCI Mitigation
- ITAR / EAR
- NISPOM
- National Security Presidential Memorandum (NSPM-33)
Outsourced FSO Solutions
It’s not easy to understand the requirements for becoming a cleared defense contractor or for newly cleared companies to navigate security clearance requirements.
Security Policy Analysis
It’s not enough to be NIST or CMMC compliant or certify information systems for processing CUI and classified information. We will review your corporate policies, make recommendation, write new policies or develop programs to ensure your organization is compliant.
Contact us @ jb@thriveanalysis.com
Jeff Bennett, ISOC, ISP, SAPPC, SFPC
President and CEO
Jeff started Thrive Analysis Group to solve difficult protection problems. His vision is to provide a capability to protect sensitive information so that produts have a chance to be fielded before they can be stolen, countered or copied. Under his leadership Thrive Analysis Group has worked with government and contractors to develop and implement compliance programs to protect sensitive information. He has been effective with manufactured products, process development, healthcare, research and development and defense industries.
Jeff is a security and risk management consultant who provides NISP books, training and products. Jeff has worked as both a government civilian and a defense contractor in the information protection space. He’s been assisting program managers, FSOs and small companies solve hard problems while working on classified, CUI, insider threat and controlled information projects. He’s also worked as an expert witness on security clearance issues.
Jeff is the owner of NISPOM Central and Thrive Analysis Group Inc
David Gregory
Director of Operations and Business
Todd Mangold
Director of Outsourced FSO Solutions
Protective Security Officer with the Department of Homeland Security, Management Analyst FBI Redstone, DCSA Special Investigator, Corporate FSO and ITPSO.
Graduate from NASA Federal Law Enforcement, American Institute of Applied Science, Brevard Community College.
Member International Association for Identification, InfraGard, Space Force Association, NCMS.
Services
What We Can Do For You
Our specialty is our capability to interpret requirements and how they should be implemented for your unique situation. We apply program protection, write and tailor processes, procedures and policies so that they will fit within the constraints of your enterprise.
Your enterprise is made up of many moving parts and business units, but none should stand alone. We believe each requirement should be part of the corporate body and not a stove piped solution. We conduct analyses for entity wide application so that burden and opportunities are shared:
- Corporate Policy
- Program Protection Planning
- Supply Chain Risk Management
- Criticality Analysis
- OPSEC Analysis
- Security Classification Guidance
- NISPOM Compliance
Program Protection Planning
Supply Chain Risk Management (SCRM)
Criticality Analyses
NISPOM Compliance
Processes and Procedures
Cyber-SCRM