MAG Cybersecurity offerings encompass a risk based approach in multiple security disciplines emphasizing the tenants of the NIST Risk Management Framework (RMF), including security systems engineering, security architecture engineering, security assessment and authorization (A&A) support, security artifact and supporting documentation production, lifecycle Information Assurance Vulnerability Management (IAVM) which includes vulnerability identification and remediation, penetration testing and forensics, and sustainment of Federal Information System Management Act (FISMA) compliance.
Cybersecurity
Why Choose MAG
We provide our customers a workforce of mission focused and results driven cybersecurity professionals who are highly trained, certified, and cleared. Our Team provides our DoD, Federal and private sector customers with cutting edge expertise and unsurpassed experience securing information systems, network and enterprise systems from an ever-evolving threat environment across the globe.
VALUES
MAG is driven and guided by our core values of Serve. Win. Perform.™
AUTOMATED
MAG utilizes automated scan tools against the network, operating systems and compatible applications, conducting additional manual assessments as necessary, using approved DoD and Army solutions
TASKING The key to successful ISR activities is an ISR plan that is developed based on well reasoned analysis, driven by your requirements, focused on your directed tasks, and tied to your anticipated decisions or intended actions.
OPERATIONS We are fundamentally about ensuring the right sensors are positioned at the right place at the right time to provide the right feedback about activities within your area of operations.
PROCESSING We work to shorten the collection cycle on board the aircraft and with mission analysts on the ground. This enables us to improve performance and dictate favorable outcomes for you.
EXPLOITATION High resolution imagery is only the beginning. Instead of focusing entirely on advanced sensors and integrating new phenomenology, which can actually impede dynamic operations, we look at how we treat information once we have it.
DISSEMINATION We analyze collected information and present products, conclusions, or projections regarding the operational environment in a format the enables you to achieve situational understanding.
COMPLIANT
MAG ensures that our customer’s information systems maintain a post-deployed security posture in compliance with requirements of the Federal Information Security Management Act (FISMA)
EXPERIENCED
Providing transformational technology solutions and services to small, medium, and large customers for over 22 years
REVIEWABLE
Security scan results are delivered via a Security Assessment Report (similar artifact per customer requirements), identifying and summarizing potential vulnerabilities, threats, risks and mitigation strategies for customer review. We confer with the customer and implement mitigation or remediation measures at the customer’s direction.
CERTIFIED
MAG Cybersecurity professionals possesses the DoD 8570.01-M mandated Information Systems security certifications (IAT/IAM level II and III) required for supporting DoD programs to include certifications for CISSP, CISM, CEH and Security +
Mission FOCUSED
MAG provides premier cybersecurity solutions and services in support of mission-critical work to military and commercial customers that include USSOCOM, PEO IEW&S, PEO EIS, PEO C3T PM Tactical Networks
STATE OF THE ART
MAG’s research, test, and development expertise provides visibility of new cybersecurity technology
REAL TIME
MAG has developed standardized actions and procedures to support time critical reporting and activities without delay
EXPORTABLE
MAG has lawfully exported defense articles and services in compliance with US export statutes and regulations
SAFE
MAG’s highest priority is keeping our people and partners safe—a priority enshrined in our systems, procedures, and culture
ADAPTABLE
MAG’s collaborative approach and strong partner relationships allow us to respond quickly to changing environments and needs
SCALABLE
MAG’s service is responsive and on-demand — performed efficiently with the flexibility to scale up if needed
RELIABLE
MAG does what we say — as evidenced by our 95%+ mission achievement rate
MAG
Cybersecurity
MAG provides cutting edge expertise securing information systems, networks, and enterprise systems from continuously evolving threats.
Certifications
CISSP | Security+ | CMMIDEV/3 | ISO 9001:2015 | IAT / IAM Level II & III
Central/South America PROBLEM: US Government required contractor support for operations, maintenance, and analysis of a multi-sensor aircraft installed with a Foliage Penetrating (FOPEN) Light Detection…...
Southwest Asia PROBLEM: The U.S. Army required contractor support to provide sensor operator training, operations, support, and sustainment on aerial surveillance sensor systems worldwide, including…...
USA PROBLEM: MIT Lincoln Labs needed an operational partner to assist in the development and testing of a DHC-8 aircraft integrated with next generation LIDAR…...
USA PROBLEM: US Special Operation Forces require ISR Support during stateside training exercises. MAG SOLUTION: MAG provided a self-deployed contractor owned contractor operated ISR platform…...
Fairfax, Virginia – June 7, 2021 - MAG Aerospace announced today that its MC-208 Guardian multi-role aircraft has been selected as one of only 5 remaining competitors…...
Fairfax, Virginia - April 1, 2020 - MAG Aerospace ("MAG"), an industry leader in providing and enabling real-time situational awareness, acquired AASKI Technology ("AASKI"). The…...
Fairfax, Virginia - September 18, 2019 - MAG Aerospace is attending the Association of the United States Army (AUSA) 2019 Annual Meeting & Exposition, taking…...
Contact us to learn more about how our trained and certified team provides our DoD, Federal, and private sector customers with cutting edge cybersecurity services
Our Offices
Corporate
12730 Fair Lakes Circle, Suite 600
Fairfax, VA 22033
(703) 376-8993 [email protected]