Skip to main content

Delivering Solutions at the Edge

Securing Our Freedoms

Making an Impact

Our Core Values


  • A NICE Way to Find and Keep Cybersecurity Workers

    Join G2 staff, Tom Conkle and Greg Witte as they explore ways to identify and keep cybersecurity employees using the NICE model.
  • Payday Breakfast

    Enjoy a freshly cooked breakfast by G2 employees each and every payday Friday. We encourage every employees to start out payday Fridays at HQ with food and camaraderie.
  • Manage the Risk

    Manage the Risk is the commercial arm of G2 and has helped secure and protect organizations across multiple sectors including financial services, healthcare, and transportation. Learn more by visiting
  • The Technical Specification for the Security Content Automation Protocol (SCAP)

    This publication defines the technical aspects of SCAP v. 1.3 in terms of its component specifications, their interrelationships and interoperation, and the requirements for SCAP content.
  • HopHacks 2018

    This spring, several G2 mentors and employees will attend the Johns Hopkins 36-hour hacking challenge, HopHacks. Our mentors will be on-site to assist students with the challenge and other cybersecurity puzzles.
  • Risk Assessments

    G2 has a commercial team dedicated to helping our clients secure what matters through comprehensive security and risk assessments.
  • Our Culture

    G2 provides its employees with a unique and rewarding culture that is rooted in providing the best to its employees, including work, benefits, office environment, events, and engagement.
  • Improving Cybersecurity for Critical Infrastructure

    G2 employees helped write this article found in the UTC Journal. This article steps readers through the CSF and what it means for critical infrastructure.
  • Strength in Community: Sharing experiences with the Cybersecurity Framework

    Join Tom Conkle from our Commercial Team on his RSAC session discussing how organizations have used the Framework to identify deficiencies in their cybersecurity program and identify risk-informed strategies.
  • National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework

    This publication describes the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework.
  • Tackling Risk and Compliance in a Global Context

    GDPR has garnered many headlines but each region and sector has specific security and privacy considerations. G2 will moderate a CSX 2018 session sharing lessons from leaders' experiences managing global risk.
  • G2 Helps Advance OpenC2 Standard

    G2 is thrilled OpenC2 is gaining more traction in the OASIS community. The wide adoption of OpenC2 will make it significantly easier for defensive systems to orchestrate their activities to address cyber threats in real time.
  • Philanthropy

    G2 and its employees take great pride in supporting our community. We not only provide financial resources, but also give our time to organizations such as House of Ruth, Rebuilding Together, Power Hawks Robotics Team, Operation Welcome Home, Baltimore Station, and many others.
  • Prevalent

    Prevalent provides a complete management platform for Trusted Cyber Sensors, Snort, and Suricata. Manage your IDS/IPS sensors from a single pane of glass and get immediate context on your alerts.
  • Cybersecurity and Cyber Governance: Understanding and Implementing the NIST Cybersecurity Framework

    Tom Conkle of G2,Inc. takes a detailed look at the NIST Framework and explains why the Framework is so important for companies and for their boards of directors.
  • CMMI Cybermaturity Platform Assessments

    G2 cybersecurity experts collaborated with the CMMI Institute to develop the industry standard for measuring cybersecurity maturity through the Cybermaturity Platform.
  • G2 Culture

    G2 provides its employees with a unique and rewarding culture that is rooted in providing the best to its employees including: work, benefits, office environment, events and engagement.
  • MD Tech Council Nominates Paul Green for CEO of the Year

    Congratulations to our CEO and founder, Paul Green, for being nominated as Chief Executive Officer of the year by the Maryland Tech Council.
  • OpenC2 Comment Period

    G2 continues its participation and advancement of OpenC2 by participating in the open comment period of three command and control specifications.
  • Technical Brown Bags

    G2 believes in a culture where we share information with one another to enable innovation and help our clients move their mission forward.
  • Huntington Ingalls Industries Acquires G2, Inc.

    Together, we're doing hard stuff, right! G2 has been acquired by Huntington Ingalls Industries. We're excited to add immediate value to HII through our cybersecurity solutions and services.
  • Security Assessments

    The Commercial Team at G2 helped write the NIST Cybersecurity Framework and can help you identify and assess your organization’s cyber threats and recommend mitigation strategies.
  • Enterprise IdAM

    Seamless and quiet security controls make for a better user experience across an enterprise. G2 provides efficient and secure measures to give clients access, control, and flexibility for their network.
  • HII-MDIS Career Opportunities

    G2 makes employee satisfaction a priority recognizing that the happy, fulfilled team members succeed more often. We would be happy if you joined us and became part of the Innovation Revolution.
  • Our Impact

    G2 employees are consistently and passionately providing mission impact to our customers. We pride ourselves in not just being great technically, but working hand-in-hand with our clients to provide them with the best outcomes.
  • Fog Computing Conceptual Model

    Dr. Larry Feldman co-authored this NIST SP 500-325, which further characterizes important properties and aspects of fog computing, including service models, deployment strategies, and provides a baseline of what fog computing is.
  • Tech Talk | JHipster

    G2 is hosting a Tech Talk on how companies, including G2, are rapidly building and deploying prototype web applications using JHipster.
  • Beat the Boss at Autobahn

    Beat the Boss is an event where employees race to beat our CEO, Paul Green. Racers who participate should plan for a battle to the top.
  • OpenC2

    As one of the creators of OpenC2, G2 continues its role in maturing and developing the OpenC2 protocol for command and control of cyber defense technologies.
  • Data Science and Analtyics

    Collecting mounds of data is no longer enough, G2 uses data science methodologies to help our clients gain insights into their data to enable better decision making.
  • The NIST Cybersecurity Framework: Building on Success

    Join Kelly Hood from our Commercial Team for a panel discussion on the adoption of the Cybersecurity Framework around the world and share experiences and lessons learned from implementing the CSF.
  • 2018 Summer Interns

    Our 2018 group of summer interns are here and we're excited! This group of talented individuals has a variety of talents and skills; we can't wait to see what they can do in 10 weeks.
  • NIST Definition of Fog Computing

    This document characterizes important properties and aspects of fog computing, including service models, deployment strategies, and how fog computing may be used.
  • G2 Helps CMMI Update its Cybermaturity Platform

    The G2 Commercial Cyber Services team is at work updating the CMMI Cybermaturity Platform, which is a comprehensive enterprise cybersecurity capability and risk assessment solution.
  • Security Automation Essentials

    Read this book, written by G2 employees, to achieve a unified view of security across your IT infrastructure using the techniques contained in this authoritative volume.
  • Isolation
Help Protect Data in Public Cloud

    SIGNAL Magazine interviewed Dr. Pat Muoio in 2014 to further explore cybersecurity in a virtual environment.
  • G2 Philanthropy

    G2 and its employees take great pride in supporting our community. We not only provide financial resources, but also give our time to organizations such as House of Ruth, Rebuilding Together, Power Hawks Robotics Team, Operation Welcome Home, Baltimore Station, and many others.
  • Our Mission

    Our mission and vision align with our core values. We take our work and our clients seriously while maintaining a strong work-life integration.
  • Happy 17th Birthday, G2!

    Today, March 19th, marks the 17th brithday of the founding of G2, Inc. We're all very proud to be a part of this great company and its journey. Happy 17th, G2, Inc.!
  • Getting Your Hands Dirty with the NIST Cybersecurity Framework

    G2 is presenting at CSX 2018. Learn about the NIST Cybersecurity Framework and how to use it! Walk through an exercise describing how to assess risks and implement the Framework.
  • Summer Interns 2018

    Our 2018 group of summer interns are here and we're excited! This group of talented individuals has a variety of talents and skills; we can't wait to see what they can do in 10 weeks.
  • Enhanced OpenAM

    G2 uses the ForgeRock Identity Platform™ as a basis to further develop and enhance Identity and Access Management (IdAM) for DoD/IC clients. This enhanced version enables these clients more seamless and integrated access.
  • Leadership

    G2 leadership values team members as co-workers – not just hired staff. Our leadership is committed to enabling growth with our clients and employees, while discovering new areas of innovation.
  • Framework for Improving Critical Infrastructure Cybersecurity v1.1

    Cybersecurity Framework Version 1.1 refines, clarifies and enhances Version 1.0. Version 1.1 is a significant advance that truly reflects the success of the public-private model for addressing cybersecurity challenges.
  • ShmooCon 2019

    Join us at ShmooCon 2019, which is an annual east coast hacker convention offering three days of interesting exploitation, inventive software and hardware solutions, and open discussions of critical infosec issues.
  • ITSP Magazine Interview Samantha Mosley

    We were thrilled to help our youngest intern, Samantha, reach her goal of attending DEF CON. Check out what she said to ITSP Magazine about “how do we get more girls and women – not to mention young people in general – into cybersecurity and tech?”
  • Edge Computing

    We help our clients by bringing storage, processing, analysis, and compute to the point of collection.
  • Contact Us

    We would love to hear from you. Talk to us about what we do and what we offer, and let us know if you’re looking for a change in jobs or just want to talk.
  • An Analytic Architecture for Machine Speed Network Operations

    White paper describing an analytic architecture for machine learning using a three-zone approach, which consists of cloud, fog and edge elements.
  • OpenSCAP

    As one of the creators of OpenSCAP, G2 is proud to continue our partnership and improve the OpenSCAP ecosystem, which provides a collection of open source tools for implementing and enforcing the NIST SCAP standard.
  • Barbecue at G2

    Today, we enjoyed delicious barbecue from one of our employees, who just so happens to be a connoisseur of slow and low cooking.
  • Computer Network Exploitation (CNE)

    G2 provides support to the offensive cyber operations (OCO) mission of our clients by developing tools, tactics, and techniques for an integrated offensive/defensive cyber approach.
  • National Cybersecurity Guidance

    G2 provides expert national cybersecurity guidance to NIST and other government customers to assist them in protecting the nation and better understanding emerging cybersecurity risks.
  • Framework for Improving Critical Infrastructure Cybersecurity

    This outlines the Cybersecurity Framework and how it enables organizations to apply the principles and best practices of risk management to improve the security and resilience of critical infrastructure.
  • The NIST Cybersecurity Framework: What’s next!

    Join G2 staff, Tom Conkle, Kelly Hood and Greg Witte with Matt Barrett, the NIST PM for the Cybersecurity Framework, as they discuss the upcoming plans for the CSF.
  • AFCEA Defensive Cyber Operations Symposium 2018

    G2 attended the AFCEA Defensive Cyber Operations Symposium at the Baltimore Convention Center and demonstrated ROW6 and our services on CSAAC.
  • Operationalizing Cybersecurity

    RSA blog post on operationalizing, or implementing, cybersecurity is an ongoing effort that continually evolves and grows. Just like organizations can’t achieve safety; they cannot achieve cybersecurity.
  • RSAC Virtual Session: NIST Cybersecurity Framework Explained

    G2's Tom Conkle and Kelly Hood are delivering a virtual presentation through RSAConference on the enhancements and clarifications that have been incorporated into CSF v1.1 release.
  • eSCAPe Content Editor

    G2’s eSCAPe application provides a friendly interface for creating and editing SCAP documents.
  • Cybersecurity Implementation

    G2’s Cybersecurity Subject Matter Experts (SMEs) work with organizations to define a tailored actionable approach for improving the cybersecurity posture an organization.
  • NIST Cybersecurity Risk Management Conference

    G2 is speaking at this conference, which builds on previous NIST workshops, the conference aims to share and explore best practices and receive and discuss stakeholder input on key cybersecurity and privacy risk management topics.
  • A Brief Look into the Cybersecurity Framework

    Matthew Smith, a G2 Security Engineer, was asked by AFCEA Signal Magazine to write a guest blog on the NIST Cybersecurity Framework. This article provides the highlights of the Framework.
  • InfoSecWorld Conference and Expo 2018

    Join Tom Conkle, March 21st, at this year's InfoSecWorld where he is leading a half day workshop titled, Applying the Cybersecurity Framework to Organizations
  • Understanding and Implementing the NIST Cybersecurity Framework

    Harvard Law wrote this article in conjunction with Tom Conkle to further readers' understanding and implementation of the NIST Cybersecurity Framework.
  • Employee Benefits

    Our G2 family is of the upmost importance to us! We strive to help you succeed, maintain a healthy work-life integration, and catapult you toward your ultimate goal, whether that’s in a technical or a business area.
  • Implementing the NIST Cybersecurity Framework

    Members of our team not only helped to develop the NIST Cybersecurity Framework (CSF), but are active members of the ISACA and helped to create this publication, which includes tools
  • Core Values

    G2 operates with a core set of values. We seek others who have these same values, which are at the center of our success.
  • Glassdoor Reviews

    Don't just take our word for it; read what our employees are saying about how exceptional our leadership, culture, and benefits are.
  • Why G2?

    G2 helps our clients defend the nation by offering some of the most challenging and rewarding work. At G2 you’re valued and inspired.
  • Innovation

    As an idea-driven company, G2 fosters both research into new capabilities and innovation to improve the current state of practice. This culture is most evident through our employee-initiated innovation program – Ignite.
  • RSA Conference USA 2018

    G2 is very proud to present two talks at RSA this year. Come to hear Greg Witte, Kelly Hood and Tom Conkle deliver one of the following talks: The NIST Cybersecurity Framework: What’s next! and A NICE Way to Find and Keep Cybersecurity Workers.
  • G2 Softball

    We're not all work and no play. G2 employees have had a softball team for the past 3 seasons and continue to improve on their season wins. Keep up the great job!
  • Operation Welcome Home

    We support Operation Welcome Home, which is a non-profit organization that welcomes home troops returning from overseas. They provide the venue to allow us to show our appreciation for the sacrifices made by these men and women in uniform.