Systems and Software Engineering Worldwide

Systems/Software Engineering Services provide planning, design, development, testing and maintenance of systems and software. MAG applies CMMI® Level 3 engineering practices with subject matter expertise, PMP® project management skills, and system integration capabilities to provide timely solutions that exceed requirements and meet schedule and budget – all while managing the reality of today’s fast-paced changing requirements and platforms that can impact projects.

Our Process

We use a proven CMMI-DEV L3 system and software engineering process that is requirements driven and integrates test planning and execution with the analysis, development and integration processes.  The analysis process is led by our engineers who ensure requirements and functional analysis are clearly understood by the engineering team, development, testing and quality assurance staff.  Our engineers take the lead during the design phase, considering software language(s), architecture, interface(s), complexity, and code baseline changes required.  They ensure the team members understand the analysis and design requirements for coding, testing, and the tools used as part of the software engineering environment are well defined.  These tools and build systems range from software developed Integrated Development Environments (IDE), Application Lifecycle Management (ALM) systems, simulators, test harnesses, and delivery systems.

Fully Reviewed

What we strive to accomplish is to inject security-based requirements directly into our initial requirements gathering process to help identify what the applicable security reviews, tests, and implementations requirements are for any given release.  Not only are we concerned with operational security requirements but also development and test-based security requirements.  This provides the most secure path and inherently increases security posture as the lifecycle progresses.  We utilize the latest standards of security tools to include IAST, DAST, SAST, and RASP tools to continually evaluate the security of our programs.  Where applicable, we also include, DoD specific reviews to include SRGs, STIGs, and MAC-specific accreditations.

Security Concious

Our Software Development Lifecycle (SDLC) is security conscious.  We have molded our standard CMMI Level 3 Rated processes to include the best industry cybersecurity practices from the start.  We call our modified SDLC our Secure-SDLC (S-SDLC).  Typically, for most people, security is an afterthought, something they usually go through in order to obtain/maintain an accreditation.  However, if security implementations are left until the end of a lifecycle they become even more cumbersome and expensive to implement and sometimes even less secure due to inability to conform to security requirements so late in the process.  That’s why we’ve imbedded security requirements, reviews, and development practices in the beginning phases of our S-SDLC.


As with any process, there is additional overhead. AASKI utilizes automation tools in order to scale processes without the need to also scale headcount.  We have experience with tools such as ACAS, HBSS, Nessus, HP Fortify, SCAP, and several others.  However, automated tools generate a significant amount of content which can be a scalability issue.  AASKI has experience in converting automated tool results into actionable documentation for use in accreditation packages with tools such as the Vulnerator.  We also employ cybersecurity experts to help members of the team weave the maze of obscure security definitions to properly asses open issues and effectively remediate findings to ensure successful accreditations.


Why Choose MAG

Our highly trained and certified engineering team provides cutting edge expertise and unsurpassed experience planning, designing, developing, testing and maintaining systems and software for our DoD, Federal, and private sector customers.


MAG is driven and guided by our core values of Serve. Win. Perform.™


MAG utilizes automated scan tools against the network, operating systems and compatible applications, conducting additional manual assessments as necessary, using approved DoD and Army solutions

The key to successful ISR activities is an ISR plan that is developed based on well reasoned analysis, driven by your requirements, focused on your directed tasks, and tied to your anticipated decisions or intended actions.

We are fundamentally about ensuring the right sensors are positioned at the right place at the right time to provide the right feedback about activities within your area of operations.

We work to shorten the collection cycle on board the aircraft and with mission analysts on the ground. This enables us to improve performance and dictate favorable outcomes for you.

High resolution imagery is only the beginning. Instead of focusing entirely on advanced sensors and integrating new phenomenology, which can actually impede dynamic operations, we look at how we treat information once we have it.

We analyze collected information and present products, conclusions, or projections regarding the operational environment in a format the enables you to achieve situational understanding.


MAG ensures that our customer’s information systems maintain a post-deployed security posture in compliance with requirements of the Federal Information Security Management Act (FISMA)


Providing transformational technology solutions and services to small, medium, and large customers for over 15 years


Security scan results are delivered via a Security Assessment Report (similar artifact per customer requirements), identifying and summarizing potential vulnerabilities, threats, risks and mitigation strategies for customer review. We confer with the customer and implement mitigation or remediation measures at the customer’s direction.


MAG IA staff possesses the DoD 8570.01-M mandated Information Systems security certifications (IAT/IAM level II and III) required for supporting DoD IA programs and projects, to include certifications for CISSP, CISM, CEH and Security +.


MAG learns and understands its customers’ mission first, then develops solutions


MAG’s research, test, and development expertise provides visibility of new cybersecurity technology


MAG has developed standardized actions and procedures to support time critical reporting and activities without delay


MAG has lawfully exported defense articles and services in compliance with US export statutes and regulations


MAG’s highest priority is keeping our people and partners safe—a priority enshrined in our systems, procedures, and culture


MAG’s collaborative approach and strong partner relationships allow us to respond quickly to changing environments and needs


MAG’s service is responsive and on-demand — performed efficiently with the flexibility to scale up if needed


MAG does what we say — as evidenced by our 95%+ mission achievement rate


Systems/Software Engineering

MAG provides planning, design, development, testing and maintenance of systems and software.
Core Competencies
Advanced Networking | Design | Virtualizations | System Administration | RF Engineering | Electronics Engineering | Project Management | System Documentation

View Use Cases and Success Stories

Plane sitting on runway

Manned ISR Ops (LiDAR)

Central/South America PROBLEM: US Government required contractor support for operations, maintenance, and analysis of a multi-sensor aircraft installed with a Foliage Penetrating (FOPEN) Light Detection…...

Read More

Manned ISR Ops (Sensor Systems)

Southwest Asia PROBLEM: The U.S. Army required contractor support to provide sensor operator training, operations, support, and sustainment on aerial surveillance sensor systems worldwide, including…...

Read More

RDT&E Support (LiDAR)

USA PROBLEM: MIT Lincoln Labs needed an operational partner to assist in the development and testing of a DHC-8 aircraft integrated with next generation LIDAR…...

Read More

Special Mission Training

USA PROBLEM: US Special Operation Forces require ISR Support during stateside training exercises. MAG SOLUTION: MAG provided a self-deployed contractor owned contractor operated ISR platform…...

Read More

See More Success Stories


MAG Aerospace’s MC-208 Guardian Down Selected for Phase 3 of USSOCOM Armed Overwatch Program

Fairfax, Virginia – June 7, 2021 - MAG Aerospace announced today that its MC-208 Guardian multi-role aircraft has been selected as one of only 5 remaining competitors…...

Read More

AASKI Technology

MAG Aerospace Acquires AASKI Technology

Fairfax, Virginia - April 1, 2020 - MAG Aerospace ("MAG"), an industry leader in providing and enabling real-time situational awareness, acquired AASKI Technology ("AASKI"). The…...

Read More

New Hire, Robert Carpenter - Army Account Executive

Robert C. Carpenter Joins MAG Aerospace as Army Account Executive

Fairfax, Virginia - January 13, 2020 - Joe Fluet, MAG CEO, has announced the addition of Robert C. Carpenter to the MAG team. Mr. Carpenter…...

Read More

Mag Aerospace AUSA cover

MAG Aerospace Attends AUSA 2019

Fairfax, Virginia - September 18, 2019 - MAG Aerospace is attending the Association of the United States Army (AUSA) 2019 Annual Meeting & Exposition, taking…...

Read More

Manned ISR Operations FEDERAL Manual Cover

Manned Operations

Learn more about how MAG operates and maintains multi-mission manned airborne ISR platforms with complex mission systems