MAG Cybersecurity offerings encompass a risk based approach in multiple security disciplines emphasizing the tenants of the NIST Risk Management Framework (RMF), including security systems engineering, security architecture engineering, security assessment and authorization (A&A) support, security artifact and supporting documentation production, lifecycle Information Assurance Vulnerability Management (IAVM) which includes vulnerability identification and remediation, penetration testing and forensics, and sustainment of Federal Information System Management Act (FISMA) compliance.
Why Choose MAG
We provide our customers a workforce of mission focused and results driven cybersecurity professionals who are highly trained, certified, and cleared. Our Team provides our DoD, Federal and private sector customers with cutting edge expertise and unsurpassed experience securing information systems, network and enterprise systems from an ever-evolving threat environment across the globe.
MAG is driven and guided by our core values of Serve. Win. Perform.™
MAG utilizes automated scan tools against the network, operating systems and compatible applications, conducting additional manual assessments as necessary, using approved DoD and Army solutions
TASKING The key to successful ISR activities is an ISR plan that is developed based on well reasoned analysis, driven by your requirements, focused on your directed tasks, and tied to your anticipated decisions or intended actions.
OPERATIONS We are fundamentally about ensuring the right sensors are positioned at the right place at the right time to provide the right feedback about activities within your area of operations.
PROCESSING We work to shorten the collection cycle on board the aircraft and with mission analysts on the ground. This enables us to improve performance and dictate favorable outcomes for you.
EXPLOITATION High resolution imagery is only the beginning. Instead of focusing entirely on advanced sensors and integrating new phenomenology, which can actually impede dynamic operations, we look at how we treat information once we have it.
DISSEMINATION We analyze collected information and present products, conclusions, or projections regarding the operational environment in a format the enables you to achieve situational understanding.
MAG ensures that our customer’s information systems maintain a post-deployed security posture in compliance with requirements of the Federal Information Security Management Act (FISMA)
Providing transformational technology solutions and services to small, medium, and large customers for over 22 years
Security scan results are delivered via a Security Assessment Report (similar artifact per customer requirements), identifying and summarizing potential vulnerabilities, threats, risks and mitigation strategies for customer review. We confer with the customer and implement mitigation or remediation measures at the customer’s direction.
MAG Cybersecurity professionals possesses the DoD 8570.01-M mandated Information Systems security certifications (IAT/IAM level II and III) required for supporting DoD programs to include certifications for CISSP, CISM, CEH and Security +
MAG provides premier cybersecurity solutions and services in support of mission-critical work to military and commercial customers that include USSOCOM, PEO IEW&S, PEO EIS, PEO C3T PM Tactical Networks
STATE OF THE ART
MAG’s research, test, and development expertise provides visibility of new cybersecurity technology
MAG has developed standardized actions and procedures to support time critical reporting and activities without delay
MAG has lawfully exported defense articles and services in compliance with US export statutes and regulations
MAG’s highest priority is keeping our people and partners safe—a priority enshrined in our systems, procedures, and culture
MAG’s collaborative approach and strong partner relationships allow us to respond quickly to changing environments and needs
MAG’s service is responsive and on-demand — performed efficiently with the flexibility to scale up if needed
MAG does what we say — as evidenced by our 95%+ mission achievement rate
MAG provides cutting edge expertise securing information systems, networks, and enterprise systems from continuously evolving threats.
CISSP | Security+ | CMMIDEV/3 | ISO 9001:2015 | IAT / IAM Level II & III
Central/South America PROBLEM: US Government required contractor support for operations, maintenance, and analysis of a multi-sensor aircraft installed with a Foliage Penetrating (FOPEN) Light Detection…...
Southwest Asia PROBLEM: The U.S. Army required contractor support to provide sensor operator training, operations, support, and sustainment on aerial surveillance sensor systems worldwide, including…...