News

Media Inquiries please contact Allison Voight at:

Valiant Continues to Serve GSA with Corporate IT Services BPA Win

(October 20, 2021) – Valiant Solutions, LLC (Valiant) proudly announces the award of the U.S. General Services Administration (GSA) Corporate IT Services Blanket Purchase Agreement (BPA). Through our long-standing partnership with GSA, Valiant brings proven performance and experience to execute tasks on this BPA. Matt Raydo, Valiant President and CEO, shares, “At Valiant, we are proud of our long-standing commitment and successful support to GSA. This award affirms both our capabilities and potential for future work with this agency.”

Under this BPA, which has a ceiling of $250 million, Valiant will provide program management support, strategies for system concepts and design, implementation of software and other technologies, systems administration, and information systems security. Use of Agile techniques and other advanced methodologies will enhance efficiency and effectiveness while freeing up GSA to focus on its core mission.

VP of Operations, Geoff Gregory, explains, "The IC BPA gives us the opportunity to expand our existing security and development services. With a total of four programs at GSA, Valiant brings expertise on the GSA IT toolset and technology strategy to each BPA Task Order."




Valiant Adds Second Prime Contract at Education Performing Highly Adaptive Cyber Augmentation Services

(June 22, 2021) Valiant Solutions, LLC (Valiant) has been awarded its second prime contract at the U.S. Department of Education (ED) performing Highly Adaptive Cyber Augmentation Services (HACAS). The ED HACAS contract spans three years with a ceiling of over $14 million and supports the four branches that make up the Information Assurance Services Directorate: 1) Security Engineering and Architecture; 2) Cyber Operations; 3) Governance, Risk, and Policy; and 4) Information Systems Security.

President and CEO, Matt Raydo, says, “Once again, we are privileged to be selected to perform vital data and system protection services for the Department of Education.” He goes on to say, “We are proud of the work we’ve done for the Department in the past, and our team is eager to bring our expertise to this project as well.”

Valiant will oversee cybersecurity program management for ED. This includes:

  • Operating the ED Security Operations Center
  • Conducting advanced research and analysis to generate intelligence with high confidence and plans on how to manage threats 
  • Performing forensics and malware analysis
  • Providing major incident management and support

Last year, Valiant was awarded a five-year, $8 million award from the Department for Information Security Continuous Monitoring support. This month’s announcement affirms Valiant’s superior work and commitment on previous and ongoing ED projects.


About Valiant

Founded in 2005, Valiant Solutions, LLC is a HUBZone small business working with the Federal Government to overcome complex cybersecurity challenges. Our comprehensive management approach offers customers real-time, actionable data for budget, operations, and security teams. With core capabilities including Security Engineering and Operations, Risk Management Framework Services, and IT Enterprise Operations, Valiant excels in Agile Development, SecDevOps, and Automation both on-premises and in the cloud. Our proven security experts develop, implement, and manage IT security solutions to protect the integrity, confidentiality, and availability of data, reducing the impact of threats on productivity and profitability for our customers. Valiant is headquartered in North Carolina with offices in the DC Metro area, Kansas City, Fort Worth, and Denver.

Valiant Awarded $300 Million U.S. Department of Education Cyber BPA

(May 18, 2021) Valiant Solutions, LLC (Valiant), has been awarded a five-year, $300 million Blanket Purchase Agreement (BPA) by the U.S. Department of Education (DoED) to provide Cybersecurity and Privacy Support Services (CPSS) for Federal Student Aid (FSA) and the Office of the Chief Information Officer (OCIO). The award continues the successful partnership between the DoED and Valiant. The company currently provides Information Security Continuous Monitoring (ISCM) Program support for the OCIO as a prime contractor.

“We are honored to receive this award and look forward to strengthening our partnership with the Department of Education,” says CEO, Matt Raydo. He continues, “Cybersecurity remains one of the most important issues facing the federal government and we look forward to playing this vital role in protecting the Department’s systems and information.” 

The DoED CPSS BPA will be used to provide Cybersecurity Risk Management and Compliance, Information Systems Security Services, Cybersecurity Operations, Software Capability Development, Security Architecture Support, Security Engineering and Continuous Diagnostics and Mitigation.

Vice President of Operations, Geoff Gregory, says, "With the BPA available for use Department-wide, Valiant will help new Program Office clients draw greater value out of their existing toolset as they pivot to data-centric and risk-focused approaches that balance compliance, security and cost. Valiant's incumbency at the OCIO level helps ensure interoperable technology and process alignment for the Program Offices."  

About Valiant

Founded in 2005, Valiant Solutions, LLC is a HUBZone small business working with the Federal Government to overcome complex cybersecurity challenges. Our comprehensive management approach offers customers real-time, actionable data for budget, operations, and security teams. With core capabilities including Security Engineering and Operations, Risk Management Framework Services, and IT Enterprise Operations, Valiant excels in Agile Development, SecDevOps, and Automation both on-premises and in the cloud. Our proven security experts develop, implement, and manage IT security solutions to protect the integrity, confidentiality, and availability of data, reducing the impact of threats on productivity and profitability for our customers. Valiant is headquartered in North Carolina with offices in the DC Metro area, Kansas City, Fort Worth, and Denver.



Valiant Solutions Awarded NOAA BPA

(April 20, 2021) Valiant Solutions, LLC (Valiant) was awarded the National Oceanic and Atmospheric Administration (NOAA) Mission Information Technology Services (NMITS) Blanket Purchase Agreement (BPA) as a prime contractor. The 5-year BPA (with 5-year option) has a ceiling of approximately $2.1 billion. It provides agency-wide coverage for IT core management components and service areas. It also includes cross-cutting services for system design development, fielding, and sustainment of global IT needs vital to the oceanic and atmospheric observing needs of the nation. 

“We are committed to providing NOAA the best of Valiant’s advanced technologies, services, and talent,” says Valiant CEO Matt Raydo. He goes on to say, “Valiant looks forward to forging a strong partnership with this vital agency for years to come.”

Valiant is joined under a Contractor Teaming Agreement by Fusion Technology and Signal Mountain Networks, to provide innovative and secure IT solutions including DevSecOps, automation, and cybersecurity services.

Heather Caudle, Director of Government Solutions, says, "Valiant is honored to be an awardee on the NMITS contract vehicle, and we are excited to help enable NOAA's mission through our cybersecurity support services."


Valiant Recognized As One of the “Best Places to Work” for the Seventh Straight Year

(April 15, 2021) For seven years running, Valiant Solutions (Valiant) has earned the vote of its employees as one of the Best Places to Work in the Washington, DC area. The annual Washington Business Journal award recognizes capital region companies that go beyond the norm to foster an enjoyable and meaningful work environment for their staff.

Employees cite Valiant’s superior corporate culture as a primary reason for job satisfaction.

As Valiant President and CEO, Matt Raydo, explains, “At Valiant, we make our people a priority. We hire the best and we show that we care about our employees and their families in everything we do. We take particular pride in creating opportunities for professional growth while ensuring that Valiant remains near the top of our field in certifications earned.”

Raydo goes on to say, “Being proud of this achievement, however, does not mean we are satisfied. We will strive to continue improving each year.”

Companies who earn the Best Places to Work award demonstrate consistent dedication to creating a positive and fulfilling employment environment. Valiant employees note that the company offers numerous opportunities for educational and professional growth while maintaining a strong sense of camaraderie through games, celebrations, and corporate awards for work excellence.

Employees also expressed appreciation for Valiant’s commitment to open communication as part of an overall effort to establish positive team dynamics, as well as effective collaboration.

“At Valiant Solutions, we are driven to ensure every employee has a top-notch employment experience and feels valued for their ideas and contributions,” says Sara Wenke, Human Resources and Recruiting Generalist. She adds, “We have an amazing team of brilliant cybersecurity professionals that have a passion and pride in creating innovative security solutions. My personal favorite offerings include: working autonomously, a flexible schedule, kind and funny teammates, career growth, a fitness reimbursement program, and competitive games and social events offered year round.”

Valiant Celebrates Its Women In Science

(February 11, 2021) Today on International Women and Girls in Science Day, the world champions women who have met and overcome challenges in contributing to science and technology. We recognize and remember the superlative achievements of women in these fields over thousands of years in history.

We celebrate the women of Valiant who strive daily to defend our Federal Government’s vital systems and data from constant and ever changing threats. We are proud to share their stories with you.

As an Information System Security Officer (ISSO), Valiant’s Kesy Amana links the Chief Information Officer with, as the National Institute of Standards and Technology (NIST) describes it, “an agency’s authorizing officials, information system owners, and information systems security officers.”

Kesy leads by providing organization-wide procedures and templates, ensuring her agency has proper technical staff for security impact analyses, and managing the board responsible for major system security decisions.

Kesy explains she is inspired by both her important role in cybersecurity and as a role model for women and girls. A “strong believer in the education and empowerment of the girl child and women in science and IT,” she strives to serve as a role model to inspire the next generation of women to enter the field.

Young women and girls considering careers in science, technology, and mathematics benefit from strong role models who have advanced in these fields. Kesy’s career and its powerful impact demonstrates the need for dedicated and capable women to work in and lead the cybersecurity industry. In the 21st century, attacks in cyberspace have grown all too common. Cyber criminal activity costs in dollars worldwide would add up to the third largest economy in the word behind the U.S. and China. Beyond criminal enterprises, terror groups and rogue nations constantly probe the defenses of the Federal Government hoping to inflict damage.

Akisha Campbell serves as one of the sentinels on the wall using both plans and people to help to defend the U.S. General Services Administration (GSA).

One of her most essential tasks is using  “GSA’s vulnerability, configuration, and monitoring tools to verify system inventory, perform log reviews, and ensure systems are configured in accordance with GSA security benchmarks.” Akisha also coordinates the efforts of 14 local and regional ISSOs while supporting managers who defend data in both cloud and other networks.

Working at the “forefront of the cybersecurity industry” does not merely involve managing plans set in place. Akisha has to exercise leadership, decisiveness, and attention to detail in ensuring those working with her have the tools and information needed to carry out their tasks in defending GSA from attack.

At Valiant, Lynne Duncan works to safeguard those who work to protect America’s workforce. Just as our coal miners, service-sector employees, manufacturing workers, and millions of others rely on the National Institute of Environmental Health Sciences (NIEHS), they rely on Lynne’s work to ensure security of both investigations and investigators in cyberspace.


With the onset of COVID-19 as an additional biological threat, the work of NIEHS grows even more vital. Lynne states, “I have been privileged to contribute to the scientific goals of NIEHS by providing a secure environment for the investigators.”

Her work, however, does not end there. Lynne’s responsibilities cover a broad spectrum of needs for Valiant’s work in supporting the mission of NIEHS. She also provides vital support for security applications and appliances to prevent unwanted malware traffic from criminal or terrorist organizations trying to corrupt NIEHS functions. When needed, she also applies years of experience and skill toward investigating cybersecurity threats and incidents.

Lynne makes herself available to pass on knowledge to fellow cybersecurity professionals at Valiant to ensure continuity of standards and excellence over the long term.



In the world of cybersecurity, nothing remains certain except for the expectation of unpredictability. The U.S. Department of Energy (DOE) Cybersecurity Branch depends on Valiant’s Desislava Ehrlich to defend against threats emerging from online.  In her role as ScrumMaster, Desislava has “the opportunity to facilitate an array of projects and product implementations that have national security implications.”

Desislava’s work helps to protect national secrets guarded by DOE against identified threats, but also against what former Secretary of Defense Donald Rumsfeld referred to as “unknown unknowns.”

Her work instills agility into the cybersecurity process, ensuring DOE can effectively respond to the current threats through compliance by using the latest best practices. Desislava identifies vulnerabilities in both new and existing systems and works with systems and personnel to prevent cyberattacks, if possible, while mitigating damage of those that occur.Taking pride in her work to protect vital data and systems, Desislava says, “This position is one of the most rewarding and challenging I have faced in my career and I look forward to everyday knowing that I'm making a difference!”


Lynnette Jackson’s work as an ISSO helps ensure GSA maintains what NIST calls “the appropriate operational security posture for an information system or program.” This includes monitoring general support systems, major applications, custom built applications, or all of the above.


While risk cannot be entirely eliminated, Lynette’s work reduces the potential for harm from daily threats aimed at GSA. She also works with colleagues and team members to ensure all have the proper information, training, and other resources to help to successfully defend Federal Government assets.

Teamwork is part of the critical foundation of the work Valiant performs, and Lynette ensures planning, processes, and reporting are efficient and effective to keep the team running at peak performance.



As technology advances, the ability of systems to react quickens. Making sure that GSA systems under her purview react promptly enough to fend off damage is Octavia Larentis’ contribution to the Valiant team.

Octavia accomplishes faster and more effective responses by introducing automation to the process. “This automated approach reduces the burden on security administrators,” she explains. Automation results in “leaving more time for GSA to focus on their security posture and tailoring their defenses to the GSA environment.”

Her work ensures the most advanced alerting mechanisms and configurations shield systems from harm. Cybersecurity need not wait on human operators to respond to threats and incidents as Octiva uses her expertise and experience to protect one of the Federal Government’s most vital civilian agencies.

Her hard work and dedication recently earned her the honor of being Valiant’s Employee of the Quarter.



Cynthia Most helps to man cyber barricades that protect GSA’s information systems, infrastructures, and applications. GSA provides vital support to every branch of the Federal Government, making protection of their data, devices, and employees an urgent and important priority.

Cynthia explains how she earned success the old fashioned way, with hard work. She says, “I climbed the ladder one step at a time to arrive at my current position, starting out in a keypunch department as my first IT official role. From there I moved into operations and spent many years as an operator and operations supervisor.”

In every position held, Cynthia has worked to inspire and educate staff rising in the field.  As she explains, “I trained others, wrote training manuals, developed mini programs to run backups, created standard operating procedures, built a tape library and backup procedures, and eventually ran IT operations.”

Each of these tasks helped to establish a foundation of capability and leadership. From there, Cynthia took on the challenges of disaster recovery planning and conducting security audits. These roles required the attention to detail she cultivated since her first day in the field. Identifying and solving problems gives her the most pride when it comes to her work. As she explains, I find satisfaction when identified security gaps are closed and knowing this can prevent security breaches.”

Throughout her career, Cynthia has proven hard work and attention to detail bring superior results in both planning for and responding to cybersecurity challenges.


Thousands work daily to build and monitor the Federal Government’s cyber defenses. Through software, hardware, and planning they seek to keep malefactors from maiming systems and exposing vital data.

Cybersecurity experts, however, do not simply create the defenses. Some professionals, called penetration testers, subject systems to an onslaught of tests that include scanning for vulnerabilities, gathering intelligence about cybersecurity threats, and subjecting systems to incessant false attacks.  

Valiant’s Sharmistha Pal applies years of skill and knowledge in her role of ensuring that federal cyberdefenses remain stout enough to protect both systems and data. Working with intricate precision, she conducts tests, validates findings, and submits reports on potential problems and their solutions. She also must continually research and study the field to stay ahead of emerging threats no matter the source.

Probing cyber defenses serves as one of the most crucial tasks in the industry. Without simulated attacks, such as military war games, experts may miss weaknesses and gaps through which threats can enter.

If an attack anywhere is successful, Sharmistha and other penetration testers can evaluate the problem and make recommendations on how to mitigate future risks. Because cyber attackers always continue to evolve, the Federal Government fortunately can depend on  skilled experts like Sharmistha to ensure networks remain as safe as possible.


In the digital age, devastating attacks can come from cyber sources as well as from missiles, tanks, and bombers. Protecting America’s vital government infrastructure means employing the most proficient and professional individuals in vital positions such as ISSOs.

Valiant’s Jaqui Moore Sherrill serves as a Senior ISSO for GSA. Cybersecurity measures protect GSA operations ensuring it can perform all of its critical services without interruption from attacks.

As an ISSO, Jaqui makes sure software used by GSA remains safe from installation to deactivation. Not only does she work with GSA itself, but also oversees compliance by contractors and other vendors who might otherwise provide malefactors with a backdoor into systems.

Her responsibilities include researching and responding to IT security issues and incidents and remediating any detected vulnerabilities. She conducts Performance Metric Reviews which “are performed biannually to make sure systems are functioning at the most secure levels as possible.”


In an unpredictable world, the Federal Government’s computer systems and networks require constant monitoring and assessment. Rules and guidelines require regular examination of systems undergoing a new or ongoing authorization.

Valiant’s Tameka Yzquierdo makes sure that Federal Government systems under her care meet the highest standards to secure authorization. This involves generating a Security Assessment Plan, conducting walkthroughs to ensure compliance with the plan, and delivering reports on findings.

As Tameka describes, “Overall, my job requires me to assess security controls to ensure they are implemented correctly, operating as intended, and producing desired outcomes with respect to meeting security requirements for the information system.”

She goes on to say that, “The assessment process will ensure the confidentiality, integrity, and availability of the information processed by the information system is protected.”

Both cloud and on-premises systems need regular assessment, because they hold important data from national secrets to private information. The attention to detail and skill demonstrated by Tameka and her colleagues substantially reduce the risk of system damage or loss of data in a cyber attack.

Valiant recently honored Tameka as Employee of the Quarter for her numerous contributions to company success.


Recognizing Women’s Science and Technology Achievements From the Past

We must recognize, however, that our team and women in STEM worldwide stand on the shoulders of giants going back to ancient and classical times.

From Hippocrates to Hawking, history has heartily celebrated men who study, teach, and practice science. Schoolbooks remind students of their contributions to everything including the study of the stars to solving the mysteries of the human body and mind.

All too often, unfortunately, the history of men advancing scientific knowledge shines more brightly from those pages than women.

Certainly their lives and work deserve celebration, but without the inclusion of women the story of science remains woefully incomplete.

More importantly, girls growing up struggling to decide how to contribute to the world miss out on important role models working in science from this century back to antiquity.

For this reason, the United Nations declared February 11th the International Day of Women and Girls in Science. The day highlights not only the women whose contributions make the world a better place, but also the struggles they endured simply to work in science and technology.

Agnodice of Athens

The story of women in science dates back almost 5,000 years to Merit-Ptah, official physician to the Pharaoh's court around 2700 BC.

From that time, women trying to break into the field ran against barriers. Male domination of science fostered beliefs that women either could not, or should not, work in fields such as medicine.

Gaius Julius Hyginus, Emperor Augustus’s appointed head of the Roman Palatine library, wrote in his Fabulae about a famous (or infamous!) Athenian physician named Agnodice who lived in the 4th Century BC. In a section entitled, “Who Discovered Or Invented What,” he briefly describes her fight to practice medicine.

Even in democratic Athens, the law prevented women from practicing medicine. To get around the ban, Agnodice turned to the famed anatomist Herophilus as a mentor, cut her hair short, and donned male clothing.

She applied her skill to the treatment of a woman who had “long languished under private diseases,” but whose modesty prevented her from seeking help. Agnodice revealed her own gender, won the patient’s confidence, and cured her ailments. Her patient shared Agnodice’s secret with others suffering from the same or similar ailments.

Soon after, Athenian authorities discovered the ruse. Male physicians noticed that patronage from women patients had dropped off considerably. When discovered, she was indicted by the Athenian version of a grand jury.  

Hopes for justice were restrained by the fact that Athenian justice had just recently ordered the death penalty for even the great Socrates.

Agnodice won reprieve in a moment worthy of Hollywood. Her patients came to the court and accused the accusers, saying, “You are not husbands, but enemies, for you condemn she who discovered health for us.”

Hyginus, whose accuracy on this tale is sometimes questioned, relates that the Athenians relented, changing the law to allow women to practice medicine.

Agnodice remains a powerful symbol for women around the world struggling simply to achieve their dreams of working in science.

Mary Anning, Banned From Polite Scientific Society

Almost 2,000 years later, Western Civilization still took a dim view of women seeking to study science.

Despite the walls constructed to block women from the field, pioneers such as Mary Anning continued to hammer away at the notion that women lacked the skills to contribute to science.

Anning was born in 1799, the daughter of a fossil collecting hobbyist. She grew up in a world still dominated by Enlightenment ideas that helped to give birth to modern science. Anning took the knowledge handed down by her father and applied systematic study.

This paleontological pioneer scoured the cliffs near her home on the cliffs dotting the shores of southern Great Britain. She identified and categorized her finds, then sold them to researchers to support her impoverished mother and siblings after her father’s death. At only 12 years old, she helped to discover the ancient sea predator Ichthyosaur. Later, Anning found the first fossil of another prehistoric marine creature, the long necked plesiosaur.

Those who knew her agreed that Mary Anning was “the greatest fossilist the world ever knew.” The scientific study societies that proliferated in the British Empire at the time, however, refused admission to any woman for any reason.

Marie Curie Joins the Elite of the Scientific World

Only a few generations after Anning, the research and academic community’s acceptance of women drastically changed.

Marie Curie, born in 1867 as Marie Sklodowska in Russian ruled Poland, left her home country to study at the Sorbonne in Paris at the age of 24.

Alongside her husband as an equal partner in both work and fame, Curie rose to eventually direct the Curie Laboratory in the Radium Institute of the elite University of Paris. They earned their position and fame as pioneers, joining the first studies of radiation after its discovery in 1896.

Curie and her husband’s work led to the discovery of both polonium, named in honor of her native land, and radium. Work with radium revealed its potential for therapeutic treatments. In 1921, U.S. President Warren G. Harding presented her with an award containing a gram of radium on behalf of the women of the United States. Eight years later, President Herbert Hoover also presented her an award that included a $50,000 grant for further research into radium.

Gertrude Elion Drives Advances in Drug Development at Duke University

Pharmacology pioneer Gertrude Elion’s life sounds like countless other all-American immigrant success stories. Her father arrived in New York City at the turn of the century, coming from the Lithuanian section of the Russian Empire.  

By 1914, he had earned a degree in dentistry. Four years later, daughter Gertrude Elion was born.

Elion recalled that as a child, she enjoyed “an insatiable thirst for knowledge.” At the age of 15, her family lost her grandfather to cancer. This provided direction to her journey toward her developing into one of the nation’s premier researchers into treatments for that horrific disease.

When she graduated from college, Elion found most professional paths closed to her. Women could teach, but not lead research or development. Undeterred, she found a job as an assistant, the highest level that most women could expect to attain.

As World War II emptied private sector laboratories of male professionals, opportunities beckoned. Her thirst for knowledge impressed colleagues and mentors and she finally earned increasingly demanding opportunities.

During the 1950s, forced to choose between laboratory research and pursuit of a Ph.D., Elion opted to end her education and continue work. Advancements that she pioneered in microbiology and chemistry contributed to a new generation of more effective drugs to treat a number of conditions.

Her life’s work earned her a Nobel Prize for Medicine in 1988.

At the end of her career, she served numerous research organizations and received appointment as a research professor of medicine and pharmacology at Duke University.

Chieng Shiung Wu Performs Groundbreaking Work In Radiation

12 years after an American president recognized a woman in science, another stepped forward to study radiation, but not for the purpose of saving lives so much as saving the world.

At the end of 1941, National Socialist Germany dominated the continent of Europe and threatened to seize more. Their Japanese allies had decimated the U.S. Pacific Fleet at Pearl Harbor, seized much of Southeast Asia, and subjected the east coast of the Republic of China to the horrors of occupation.

Shanghai, one of the cities savaged by the war, had already produced a figure known later as “the First Lady of Physics,” Chieng Shiung Wu. Wu would later contribute mightily to developing the weapons ultimately used in Japan’s defeat.

Despite China’s deeply traditional society, her parents encouraged her to study science and mathematics. Inspired by Marie Curie, Wu studied physics when she attended college near her home. By 1936, her studies took her to the University of California at Berkeley where she earned a Ph.D. in 1940.

By 1944, Wu joined the elite team of scientists working on the secret Manhattan Project. From their research came the creation of the atomic bomb that defeated Japan and helped to rescue her homeland. Wu discovered the process by which uranium ore enrichment could produce sufficient material to use in the weapon.

After World War II, Wu emerged as the world’s most eminent expert in beta decay and weak interaction physics. She earned international respect, prominence, and had played a key role in helping to defeat Japan.

Despite this, she still encountered the discouragement of discrimination. Wu had teamed with two male physicists to disprove a previously accepted law of quantum mechanics. Her male counterparts won the Nobel Prize while she saw her contributions ignored by the committee.

This and other slights by the male dominated scientific community led her to muse in 1964, “I wonder whether the tiny atoms and nuclei, or the mathematical symbols, or the DNA molecules, have any preference for masculine or feminine treatment.”

The Truly “Amazing” Rear Admiral Grace Hopper, USN

The winning of World War II would have come with more difficulty if it had not relied on the then record number of scientific doctoral degrees earned by women in the 1920s and 30s. The war created unparallelled opportunities for researchers such as Wu to contribute.

Another leading light of that great generation of women in science, “Amazing” Grace Hopper, laid the foundation for computing while serving her country during World War II and after.

In 1943, Hopper joined the U.S. Naval Reserve. Quickly, her country put her to work with the Bureau of Ships Computation Project based at Harvard University. There, she teamed with Aiken on the project that created the Mark I. This machine was the first to automatically compute arithmetical problems, which helped anti-aircraft guns, rockets, and minesweeper work more effectively.

As programmer, Hopper made a vital contribution to the project’s success. She also created calculations essential for calibrating weapons functions.

After the war, Hopper encountered the same silent systematic barriers against women advancing in science. When Harvard refused to grant her tenure, she moved to the private sector. Corporations recognized her value more than academics, placing her in charge of programming the first generation of actual computers.

She also worked to create user friendly programming languages, advanced their coordination, and even pioneered the use of the term “bug” to describe problems with computer operation (this happened when she literally discovered a moth living inside hardware.)  

Subordinates at the time gave the quick-witted Hopper the nickname “Amazing” Grace.

By 1985, she received promotion to Rear Admiral in the United States Navy and received the Defense Distinguished Service Medal, the most outstanding award for those in service who did not face combat.

In 2016, President Barack Obama posthumously recognized her work through the awarding of the Presidential Medal of Freedom.  


Katherine Johnson’s Hidden Figure At NASA

While Hopper’s work first benefited the military’s efforts to defeat the Axis powers, it also laid the groundwork for another massive national venture, the space program.

Even more so than groundbreakers such as Admiral Hopper and Mary Anning, Katherine Johnson and women like her faced serious barriers to working in science and technology. Difficulties confronted by any woman trying to break into STEM at the time were compounded when that woman happened to be a person of color like NASA’s Katherine Johnson

Born only a few months before the end of World War I in White Sulphur Springs, West Virginia, Johnson, like most children at the time and all children of color, could only advance to the eighth grade in state public schools. To support her gifted intellect, Johnson’s family moved to Institute, just outside the state capital of Charleston. There, she attended the Historically Black College, West Virginia State, and graduated at the age of 18.

Shortly thereafter, in 1939, she accepted admission as the first black woman to attend West Virginia University, pursuing a graduate degree in mathematics.

Johnson launched her career with the National Advisory Committee for Aeronautics, later NASA. She applied her love of, and fascination with, geometry to calculate the trajectories of spacecraft.

She reportedly told officials, "You tell me when you want it and where you want it to land, and I'll do it backwards and tell you when to take off."

Remarkably, just as computers started to apply the potential envisioned by Grace Hopper and others, Johnson remained in demand. After successfully calculating Alan Shepherd’s historic spaceflight, John Glenn requested that Johnson double check the computer’s work on his own.

Glenn remarked, “If she says they’re good, then I’m ready to go.”

When the U.S. took the next step to break out of Earth’s orbit and travel to the Moon, they required Johnson’s help. She ensured that Apollo 11’s visit encountered no major problems. Even more importantly, Johnson played an invaluable part in ensuring that the mechanical disasters of Apollo 13 did not result in a human tragedy.

Even though not overtly mentioned in the film chronicling the Apollo 13 disaster, Hollywood produced a 2016 movie, Hidden Figures, that portrayed her achievements in science and the social challenges that she had to overcome.

Only a year prior, Johnson received the Presidential Medal of Freedom from Barack Obama and was honored with the renaming of NASA’s computation research laboratory in her honor.

After ending her active service for the United States government, Johnson shared her other passion. She traveled the country encouraging students to pursue study and careers in science and technology, reminding them that “everything is physics and math.”

Her secret to success? Johnson always strove to go beyond what engineers and others asked of her to provide the full picture of what they needed to get the job done. Even more importantly, she served as a role model to young women everywhere, especially of color.

Johnson said, “I just ignored the social customs that told me to stay in my place.”

She and countless other women for thousands of years refused “to stay in my place,” and thankfully so. They not only drove human understanding farther and faster as a result, these incredible individuals inspire the present and future generations of women flooding into the fields of mathematics, science, and technology.

Because They Deserve More Than Just a Day . . .

We do not see a mere day as sufficient to honor these contributions. Instead, we have taken a week to celebrate the women on our staff, without whom we could not do our job of protecting federal agencies from cyber threats.  

Tireless and dedicated, they and the women on our Valiant team also shine as powerful examples of what women in STEM careers can do for themselves, their communities, and, in the case of our team, their country.

Valiant Earns Certification in ISO 20000 and ISO 27001 for Superior Service Management and Information Security

(January 29, 2021) Valiant Solutions, LLC (Valiant), proudly announces it has earned certifications in both ISO/IEC 20000-1:2018 and ISO/IEC 27001:2013. These certifications demonstrate Valiant’s continued commitment to superior service management and high standards of information security to clients and build upon Valiant’s recent track record of excellence. Within the past nine months, Valiant has also earned CMMI Level 3 status for both Development and Services.

“Getting these certifications shows our customers that we do things the right way in processes and best practices,” President and CEO, Matt Raydo, explains.  

He went on to say that, “It is very unique that a company of our size has all of these corporate certifications. This differentiates Valiant from our competitors.”

Only companies that meet strict industry standards and adhere faithfully to best practices earn this level of certification. Valiant strives to prove every day that it sets the benchmark for providing outstanding service and protection to our clients.

About Valiant

Founded in 2005, Valiant is a certified HUBZone small business providing comprehensive cybersecurity solutions to government customers nationwide. Our highly-skilled engineers and analysts provide actionable, intelligent data empowering customers to manage risk with confidence. Using our security program maturity model, we work closely with customers to identify weaknesses and develop strategies to achieve improved situational awareness, security and compliance. Valiant strives to keep its customers ahead of information security issues as the current pace of society and technology demands. Valiant is headquartered in North Carolina with offices in the DC Metro area, Kansas City, Fort Worth, and Denver.

Media Contact: Brittany Gload – 443-857-4426 or BGload@valiantsolutions.com



Valiant Secures $8M U.S. Department of Education Contract for Information Systems Continuous Monitoring

October 26, 2020 – Valiant Solutions, LLC (Valiant) is pleased to announce its award of the U.S. Department of Education (ED) Information Security Continuous Monitoring (ISCM) Program Support contract. Valiant was awarded the 5-year, $8M contract to provide support for the continuous monitoring of ED FISMA systems, to include ISCM program maturation through security tools integration. The award was a HUBZone set-aside action competed on the GSA Multiple Award Schedule, specifically for Highly Adaptive Cybersecurity Services (HACS) providers. The program is funded by the ED Office of the Chief Information Officer.

Valiant will support teams within the Security Engineering and Architecture branch of the Information Assurance Services (IAS) Directorate. ISCM Program goals include:

  • Near real-time awareness of security control implementation status across the Department’s IT Enterprise
  • Detection of anomalies and changes in the Department’s environments of operation and information systems
  • Visibility into assets, awareness or vulnerabilities, knowledge of threats, security control effectiveness, and security status including compliance
  • Availability of metrics at Department-defined frequencies to enable risk to be managed within the Department’s risk tolerance

Geoff Gregory, Valiant’s Vice President, Operations commented, “We are thrilled to begin performance for the Department of Education, applying both technical approaches and personnel that have proven successful in supporting and maturing ISCM programs for other civilian agencies. This ISCM award is a complement to Valiant’s 2019 award for the Department of Education’s Cybersecurity and Privacy Support Services BPA, and it continues our market position as a trusted small business cybersecurity services provider for federal clients.”

About Valiant
Founded in 2005, Valiant is a certified small, HUBZone business providing comprehensive cybersecurity solutions to government customers nationwide. Our highly-skilled engineers and analysts provide actionable, intelligent data empowering customers to manage risk with
confidence. Using our security program maturity model, we work closely with customers to identify weaknesses and develop strategies to achieve improved situational awareness, security and compliance. Valiant strives to keep its customers ahead of information security issues as the current pace of society and technology demands. Valiant is headquartered in North Carolina with offices in the DC Metro area, Missouri, Texas, and Colorado.

Department of Education Disclaimer
This project has been funded at least in part with Federal funds from the U.S. Department of Education under contract number 91990020F0062. The content of this publication does not necessarily reflect the views or policies of the U.S. Department of Education nor does mention of
trade names, commercial products, or organizations imply endorsement by the U.S. Government.

Valiant Achieves CMMI Maturity Level 3 for Services and Development

September 9, 2020 – Valiant Solutions, LLC (Valiant) is excited to announce it has been successfully appraised at Maturity Level 3 of Capability Maturity Model Integration (CMMI®) Level 3 for both Development (CMMI®-DEV) and Services (CMMI®-SVC) by the CMMI® Institute. The appraisal was performed by Maverick Quality Advisory Services”

President and CEO Matt Raydo explains, “Going through this process reassures me that Valiant as a whole is not only following repeatable, proven processes but looking for ways to continue improving. I am very excited for our organization to be appraised at CMMI Level 3®.”

CMMI® is a proven set of global best practices that focus on performance improvement, operational efficiency, and aligning operations with business goals. This achievement confirms Valiant has mature and standardized processes in place resulting in predictable and consistent results for our customers.

About Valiant
Founded in 2005, Valiant is a certified small, HUBZone business providing comprehensive cybersecurity solutions to government customers nationwide. Our highly-skilled engineers and analysts provide actionable, intelligent data empowering customers to manage risk with confidence. Using our security program maturity model, we work closely with customers to identify weaknesses and develop strategies to achieve improved situational awareness, security and compliance. Valiant strives to keep its customers ahead of information security issues as the current pace of society and technology demands. Valiant is headquartered in North Carolina with offices in the DC Metro area, Missouri, Texas, and Colorado.