Cybersecurity Listings

The cybersecurity service sector spans thousands of licensed firms, certified practitioners, compliance consultants, managed security service providers, and specialized vendors operating under a fragmented but structured regulatory environment. This directory catalogs service providers and professionals within that landscape, organized by service category, qualification standard, and operational scope. The listings reflect the structure of the sector as shaped by federal frameworks including NIST, FISMA, HIPAA, and state-level mandates — not commercial rankings or sponsored placement. For background on how this directory is organized and what it covers, see the Cyber Safety Directory Purpose and Scope.


What listings include and exclude

Listings in this directory cover organizations and individuals that provide identifiable cybersecurity services as a primary or documented secondary function. Inclusion criteria are structural, not evaluative — a listing records that an entity operates in a defined service category, not that the entity has been assessed for quality or performance.

Included listing types:

  1. Managed Security Service Providers (MSSPs) operating under contractual service-level agreements
  2. Independent cybersecurity consultants and advisory firms holding documented professional certifications (CISSP, CISM, CEH, CISA, or equivalent)
  3. Penetration testing firms and red-team operators with disclosed scope and methodology frameworks
  4. Incident response firms with documented retainer or on-demand service models
  5. Compliance and audit specialists operating against named frameworks — NIST SP 800-53, ISO/IEC 27001, SOC 2 Type II, CMMC, or sector-specific standards such as HIPAA Security Rule (45 CFR Part 164) or PCI DSS
  6. Security awareness training providers delivering programs aligned with NIST SP 800-50 or equivalent federal training guidance
  7. Digital forensics firms registered in at least one US jurisdiction with documented chain-of-custody procedures

Excluded from listings:

The distinction between an MSSP and a general IT managed services provider is a classification boundary the directory enforces actively. An MSSP must offer 24/7 security monitoring, threat detection, and incident escalation as documented service components — not merely firewall management bundled into a broader IT contract.


Verification status

Listings carry one of three verification statuses that reflect the depth of documentation reviewed at the time of indexing.

Confirmed — The listing entity's stated credentials, certifications, and service scope have been cross-referenced against named issuing bodies such as (ISC)², ISACA, EC-Council, or the CMMC Accreditation Body (Cyber-AB). State business registration has been verified against public secretary of state records.

Pending — Credential or registration documentation has been submitted but not yet cross-referenced. Listings at this status are displayed with explicit notation.

Unverified — The listing is drawn from public sources (state licensing databases, GSA vendor registries, DUNS/SAM.gov records) but no direct credential cross-reference has been completed. These listings appear in the Cyber Safety Listings index with a clear status indicator.

Verification does not constitute an endorsement or performance rating. It records only that stated qualifications correspond to documented issuances from recognized bodies. The NIST National Cybersecurity Center of Excellence (NCCoE) and CISA's Cybersecurity Performance Goals (CISA CPGs) provide the baseline framework against which service category claims are assessed for plausibility, though neither agency certifies individual service providers listed here.


Coverage gaps

The directory does not achieve uniform coverage across all cybersecurity service categories or geographies. Identified gaps include:

For guidance on navigating around these gaps, the How to Use This Cyber Safety Resource page details alternative lookup approaches.


Listing categories

Listings are organized into 8 primary service categories that reflect the functional divisions of the cybersecurity sector:

  1. Managed Detection and Response (MDR) / MSSP — Continuous monitoring, threat detection, and incident escalation under formal SLAs
  2. Penetration Testing and Red Team Operations — Authorized adversarial testing against defined scopes; providers classified by methodology (black-box, gray-box, white-box)
  3. Compliance and Risk Advisory — Framework-specific consulting against NIST CSF, ISO/IEC 27001, CMMC Level 1–3, SOC 2, HIPAA, or FedRAMP
  4. Incident Response and Digital Forensics — Breach containment, evidence preservation, and post-incident analysis; distinguished from general IT support by documented IR plan and chain-of-custody procedures
  5. Security Awareness and Training — Employee and organizational training programs; providers distinguished by alignment to NIST SP 800-50 vs. proprietary curriculum models
  6. Identity and Access Management (IAM) Services — Privileged access management, zero-trust architecture implementation, and identity governance consulting
  7. Cloud Security Services — Security architecture and assessment specific to AWS, Azure, or GCP environments; FedRAMP-authorized providers listed separately within this category
  8. OT/ICS and Critical Infrastructure Security — Providers operating under NIST SP 800-82 and CISA sector-specific guidance for energy, water, transportation, and manufacturing environments

Each category page carries a description of the qualification standards typically associated with providers in that category, the regulatory frameworks most relevant to client-provider relationships within it, and — where applicable — the licensing or registration requirements that apply in specific US jurisdictions.