Formed in 2005 as a preferred supplier to UK Ministry of Defence and Government.
Saving your time
Our long-standing experience means that we can provide each customer, whatever their size, with pragmatic solutions exactly tailored to suit their specific requirements.
Skilled and Experienced Team
Mobile and highly experienced team consists of senior professionals who are all passionate about IT security
Warrior Networks have worked on numerous projects with the MOD. This section details only a very small amount of projects, one example is that we have provided a Senior Consultant as the Security Assurance Coordinator (SAC) to a Defence innovation project. This delivered innovative, cloud-based, capabilities that are employed in the Firm Base, Overseas, and on Operation.
For all the project systems, our consultant is responsible for:
Acting as the single point of contact for all security and assurance
Accreditation evidence set generation
Technical risk assessments (IS1&2, NIST plus other methodologies)
ISO27001 audits of suppliers and systems
Accreditor, service provider and project stakeholder liaison and management
Warrior Networks was contracted to review and develop an industry set of security controls that all operators should have in place to be considered secure.
The company’s Cyber Security team tasked Warrior Networks to review and develop a Permanent Reference Document (PRD) for its membership to review and publish. The company wanted their membership to comply with the CIS Controls; a prioritized set of actions that collectively form a defence-in-depth set of best practices that mitigate the most common attacks against systems and networks, NIST Cybersecurity Framework and Secure Controls Framework™.
The PRD document was designed to be consistent with its approach to the security controls and covered the following subcategories:
Radio Access Network (RAN)
Network Operations including Operational Suppler Service/Business Support Services.
Security projects, ranging from system accreditations, through to providing guidance on embedding security into new corporate governance structures.
Warrior Networks have worked with a Defence contractor to support security projects ranging from system accreditations, obtaining List X approval for pre-production and development environments, project security advice, and guidance on embedding security into new corporate governance structures.
The systems and environments under accreditation cover OFFICIAL to above SECRET and must host complex working arrangements for a mixture of UK and international personnel.
Warrior Networks provided a team of consultants to support a Government Dept Security team. Collectively we delivered risk analysis, technical security architecture, and supplier assurance support to the Department.
Consultants had a minimum of SC clearance to work with the team, allowing them to work on OFFICIAL and OFFICIAL SENSITIVE projects and programmes.
Our team worked seamlessly with the client, other suppliers, and key stakeholders including other Government departments and Accreditors, to ensure internal and pan-government programmes were supported effectively.
Our Consultants used their experience and professional expertise to advise on ways to improve the risk management process in order to deliver a sustainable, effective, and streamlined risk management system.
Information Security Management Systems (ISMS), Business Continuity, and Disaster Recovery (BCDR) plans.
We have provided cyber security support to a large Communications Programme. Our team led the initial client phases of establishing both Information Security Management Systems (ISMS) and Business Continuity and Disaster Recovery (BCDR) plans with the main suppliers providing the telecoms network, users services, and handsets.
Our team acted as the focal point for articulating the client requirements for both cyber security and BCDR, and assessing the suppliers’ responses in design and implementation to these requirements. We represented the client, as the Programme BCDR lead, at the joint BCDR and Security Working Groups, chairing these meetings when appropriate.