Cybersecurity Listings
The cybersecurity service sector in the United States encompasses hundreds of distinct provider types, credential frameworks, and regulatory classifications — from managed detection and response firms operating under NIST frameworks to penetration testing practices credentialed through CREST or GIAC. This listings reference covers the structure of the directory, how individual entries are formatted, what categories of information are and are not included, and where coverage gaps currently exist. The Security Services Directory Purpose and Scope page provides the broader organizational context for how this directory is structured.
How to read an entry
Each listing in this directory follows a standardized field schema designed to support professional comparison across providers, not promotional ranking. Entries are organized by service category first, then by geographic coverage (national, regional, or state-specific), and finally by regulatory alignment.
A standard listing entry contains the following fields in this order:
- Provider name — Legal business name, not a trade brand alias
- Service category — Primary classification drawn from the taxonomy described below
- Geographic coverage — National, multi-state, or single-state designation
- Credential and framework alignment — Named certifications (e.g., ISO/IEC 27001, SOC 2 Type II, FedRAMP Authorization, CMMC level designation)
- Regulatory focus — Applicable frameworks such as HIPAA, PCI DSS, FISMA, or NERC CIP, where publicly disclosed
- Contact and verification status — Whether entry data has been independently cross-referenced against public records
Entries do not contain editorial ratings, client reviews, service levels, or comparative scoring. The distinction between a basic listing and a verified listing is addressed in the Verification Status section below. Readers using this directory for procurement research should cross-reference listings against the How to Use This Security Services Resource page before engaging any listed provider.
Service categories used in this directory align with the NIST Cybersecurity Framework 2.0 functional domains — Govern, Identify, Protect, Detect, Respond, and Recover — as the primary classification axis. Secondary classification uses CISA's defined cybersecurity service sectors, which group providers by delivery model: managed services, advisory and assessment, implementation, and incident response.
What listings include and exclude
Included:
- Managed Security Service Providers (MSSPs) operating with a verifiable US business presence
- Penetration testing firms with at least 1 named staff credential from a recognized body (OSCP, GPEN, CEH, CREST CRT, or equivalent)
- Cybersecurity consulting and advisory practices with documented framework specialization
- Incident response retainer providers credentialed or aligned with CISA's Joint Cyber Defense Collaborative (JCDC) or equivalent federal engagement
- OT/ICS security specialists operating under NERC CIP or NIST SP 800-82 Rev. 3 frameworks
- Cloud security providers with documented FedRAMP, CSA STAR, or ISO/IEC 27017 alignment
Excluded:
- General IT managed service providers that list "cybersecurity" as a peripheral offering without dedicated practice documentation
- Vendors selling cybersecurity products only (hardware appliances, software platforms) without a service delivery component
- Training and certification providers — educational entities are covered in a separate segment
- Providers operating exclusively outside the United States, except where US-regulated work is the documented service scope
- Solo practitioners without a verifiable business registration, unless operating under a credentialed parent firm
The exclusion of product-only vendors is a deliberate structural boundary. The FTC and CISA distinguish between cybersecurity product vendors and service providers in regulatory guidance; this directory reflects that distinction by covering only entities whose primary commercial activity involves delivering services to client organizations.
Verification status
Listings in this directory carry one of three verification designations:
- Unverified — Entry data was submitted or sourced from public records but has not been cross-checked against independent sources. Field accuracy cannot be guaranteed.
- Partially verified — Business registration and at least 1 credential claim have been confirmed against a named public source (e.g., state business registry, ISC² certificate lookup, CompTIA verification portal).
- Verified — All primary fields — business name, service category, geographic coverage, and credential alignment — have been confirmed against named public sources.
Credential verification draws on publicly accessible lookups maintained by ISC², ISACA, CompTIA, EC-Council, CREST, and GIAC. FedRAMP authorization status is cross-referenced against the FedRAMP Marketplace, which lists authorized cloud service offerings by provider. CMMC certification status, where claimed, is cross-referenced against the CMMC Accreditation Body's publicly maintained assessor registry.
Verification status does not constitute an endorsement. A verified listing confirms only that the stated credentials or registrations existed at the time of verification. Credential expiration, revocation, or scope changes after verification are not reflected in real-time. The full Security Services Listings index displays verification badges adjacent to each entry.
Coverage gaps
This directory does not achieve uniform coverage across all cybersecurity service categories or geographies. Documented gaps include:
By category:
- Cyber insurance advisory services — a growing practice area lacking standardized credential frameworks, making classification boundary enforcement inconsistent
- Digital forensics and legal support firms — overlap with legal professional directories creates incomplete coverage; fewer than 40% of known US digital forensics firms have submitted or been sourced for listing
- Emerging AI security practices — providers specializing in adversarial machine learning, model integrity testing, and LLM security are underrepresented because no governing body has yet established a recognized credential framework for this subspecialty as of 2024
By geography:
- Rural and mid-market regional providers in states outside California, Texas, Virginia, New York, and Florida are underrepresented relative to their estimated market presence
- Tribal nation and US territory providers — entities operating in Puerto Rico, Guam, and on federally recognized tribal lands face inconsistent business registration structures that complicate standard verification workflows
Gaps are not treated as permanent. Providers meeting the inclusion criteria above may be submitted for review through the contact pathway. Coverage expansion is prioritized by service category demand and verifiability of credential documentation, not by geographic proximity or provider size.