[et_pb_section fb_built=”1″ background_color=”rgba(42,108,231,0.7)” _builder_version=”3.0.77″ background_image=”https://syscall7.com/wp-content/uploads/2017/09/hero-bg-triangle-pattern.jpg” background_blend=”overlay”][et_pb_row _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_post_title meta=”off” featured_image=”off” text_color=”light” admin_label=”Page Title” _builder_version=”3.0.76″ title_text_align=”center” title_font_size=”38px” background_blend=”overlay” text_orientation=”center”][/et_pb_post_title][et_pb_text background_layout=”dark” _builder_version=”3.0.76″ text_font_size=”24″ text_orientation=”center” module_alignment=”center”]Syscall7 is a software development and security analysis consulting firm located in the greater Baltimore, MD region.  We specialize in firmware development, system-level software development, and software security analysis.
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#182337″ _builder_version=”3.0.80″][et_pb_row _builder_version=”3.0.80″][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text background_layout=”dark” _builder_version=”3.0.76″ text_text_color=”#ffffff” header_text_align=”center” header_text_color=”#ffffff”]

Meet Our Team

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row custom_padding=”27px|0px|0px|0px” _builder_version=”3.0.76″][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_team_member name=”Bill Davis” position=”Director of Engineering” image_url=”https://syscall7.com/wp-content/uploads/2018/01/davis-0318-cropped.png” background_layout=”dark” _builder_version=”3.0.80″ text_orientation=”center” animation=”fade_in”][/et_pb_team_member][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_team_member name=”Dave Shepherd” position=”COO” image_url=”https://syscall7.com/wp-content/uploads/2018/01/shepherd-0288-cropped.png” background_layout=”dark” _builder_version=”3.0.80″ text_orientation=”center” animation=”fade_in”][/et_pb_team_member][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_team_member name=”Anthony DeRosa” position=”CEO” image_url=”https://syscall7.com/wp-content/uploads/2018/01/derosa-cropped.png” background_layout=”dark” _builder_version=”3.0.80″ text_orientation=”center” animation=”fade_in”][/et_pb_team_member][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.0.47″][et_pb_row _builder_version=”3.0.80″][et_pb_column type=”4_4″ _builder_version=”3.0.80″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.80″]

Why we are different

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”Forward Thinking” use_icon=”on” font_icon=”” icon_color=”#7c8d9b” _builder_version=”3.0.76″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width_tablet=”50px”]By thinking ahead not only do we avoid pitfalls and failures, we are also able to accomplish more through continual innovation.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”Problem Solvers” use_icon=”on” font_icon=”” icon_color=”#7c8d9b” _builder_version=”3.0.76″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width_tablet=”50px”]We focus on finding the right solution rather than wanting to prove we are right at all costs.  We are continually open to new ways of thinking.
[/et_pb_blurb][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_blurb title=”Agile Ready” use_icon=”on” font_icon=”” icon_color=”#7c8d9b” _builder_version=”3.0.76″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” max_width_tablet=”50px”]By adopting the agile methodology, we accelerate product delivery while minimizing cost.
[/et_pb_blurb][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ background_color=”#f7f7f7″ inner_shadow=”on” _builder_version=”3.0.47″][et_pb_row _builder_version=”3.0.47″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″ parallax=”off” parallax_method=”on”][et_pb_text _builder_version=”3.0.76″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” module_alignment=”left”]

What We Do

We provide firmware and software development and consulting services at all levels of the software stack, including low level assembly, Linux internals and kernel-level development, custom network protocol development, and system-level C and C++ development on Windows, Linux, FreeBSD, and other proprietary operating systems.

Syscall 7 also has significant experience in software security analysis and vulnerability analysis using tools such as IDA Pro. We have experience analyzing software and systems to identify vulnerabilities and security weaknesses that place the assessed systems at risk for malicious intrusion. This includes both system level software and application software in Windows, Linux, and other proprietary operating systems.

We also have experience in analyzing critical infrastructure devices and industrial control systems such as Supervisory Control and Data Acquisition (SCADA) systems for vulnerabilities and recommending techniques and methods for mitigating the risks posed by the weaknesses uncovered.

Syscall 7’s aim is to provide subject matter experts who know how to design and implement custom and complex software solutions as well as assess the security posture of systems and software designed by others.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]