Cybersecurity Services Worldwide

MAG Cyber Security/Information Assurance (CS/IA) Engineering encompasses multiple security disciplines, including security architecture engineering, security assessment and authorization (A&A) support, system vulnerability identification and remediation, security artifact and supporting document production, lifecycle Information Assurance Vulnerability Management (IAVM), penetration testing and ethical hacking, and maintenance of Federal Information System Management Act (FISMA) compliance.

Why Choose MAG

Our highly trained, certified and cleared Cybersecurity team provides our DoD, Federal and private sector customers with cutting edge expertise and unsurpassed experience securing information systems, networks and enterprise systems from a continuously evolving threat environment.


MAG is driven and guided by our core values of Serve. Win. Perform.™


MAG utilizes automated scan tools against the network, operating systems and compatible applications, conducting additional manual assessments as necessary, using approved DoD and Army solutions

The key to successful ISR activities is an ISR plan that is developed based on well reasoned analysis, driven by your requirements, focused on your directed tasks, and tied to your anticipated decisions or intended actions.

We are fundamentally about ensuring the right sensors are positioned at the right place at the right time to provide the right feedback about activities within your area of operations.

We work to shorten the collection cycle on board the aircraft and with mission analysts on the ground. This enables us to improve performance and dictate favorable outcomes for you.

High resolution imagery is only the beginning. Instead of focusing entirely on advanced sensors and integrating new phenomenology, which can actually impede dynamic operations, we look at how we treat information once we have it.

We analyze collected information and present products, conclusions, or projections regarding the operational environment in a format the enables you to achieve situational understanding.


MAG ensures that our customer’s information systems maintain a post-deployed security posture in compliance with requirements of the Federal Information Security Management Act (FISMA)


Providing transformational technology solutions and services to small, medium, and large customers for over 15 years


Security scan results are delivered via a Security Assessment Report (similar artifact per customer requirements), identifying and summarizing potential vulnerabilities, threats, risks and mitigation strategies for customer review. We confer with the customer and implement mitigation or remediation measures at the customer’s direction.


MAG IA staff possesses the DoD 8570.01-M mandated Information Systems security certifications (IAT/IAM level II and III) required for supporting DoD IA programs and projects, to include certifications for CISSP, CISM, CEH and Security +.


MAG learns and understands its customers’ mission first, then develops solutions


Members of the technical staff possess a Top Secret (TS) security clearance, with no team member having less than a Secret clearance


MAG’s research, test, and development expertise provides visibility of new cybersecurity technology


MAG has developed standardized actions and procedures to support time critical reporting and activities without delay


MAG has lawfully exported defense articles and services in compliance with US export statutes and regulations


MAG’s highest priority is keeping our people and partners safe—a priority enshrined in our systems, procedures, and culture


MAG’s collaborative approach and strong partner relationships allow us to respond quickly to changing environments and needs


MAG’s service is responsive and on-demand — performed efficiently with the flexibility to scale up if needed


MAG does what we say — as evidenced by our 95%+ mission achievement rate



MAG provides cutting edge expertise securing information systems, networks, and enterprise systems from continuously evolving threats.

View Use Cases and Success Stories

Manned ISR Ops (LiDAR)

Central/South America PROBLEM: US Government required contractor support for operations, maintenance, and analysis of a multi-sensor aircraft installed with a Foliage Penetrating (FOPEN) Light Detection…...

Read More

Manned ISR Ops (Sensor Systems)

Southwest Asia PROBLEM: The U.S. Army required contractor support to provide sensor operator training, operations, support, and sustainment on aerial surveillance sensor systems worldwide, including…...

Read More

RDT&E Support (LiDAR)

USA PROBLEM: MIT Lincoln Labs needed an operational partner to assist in the development and testing of a DHC-8 aircraft integrated with next generation LIDAR…...

Read More

Special Mission Training

USA PROBLEM: US Special Operation Forces require ISR Support during stateside training exercises. MAG SOLUTION: MAG provided a self-deployed contractor owned contractor operated ISR platform…...

Read More

See More Success Stories


AASKI Technology Logo

MAG Aerospace Acquires AASKI Technology

Fairfax, Virginia - April 1, 2020 - MAG Aerospace ("MAG"), an industry leader in providing and enabling real-time situational awareness, acquired AASKI Technology ("AASKI"). The…...

Read More

New Hire, Robert Carpenter - Army Account Executive

Robert C. Carpenter Joins MAG Aerospace as Army Account Executive

Fairfax, Virginia - January 13, 2020 - Joe Fluet, MAG CEO, has announced the addition of Robert C. Carpenter to the MAG team. Mr. Carpenter…...

Read More

Mag Aerospace AUSA cover

MAG Aerospace Attends AUSA 2019

Fairfax, Virginia - September 18, 2019 - MAG Aerospace is attending the Association of the United States Army (AUSA) 2019 Annual Meeting & Exposition, taking…...

Read More

Joseph Reale

Joseph Reale Joins MAG Aerospace as Chief of Staff

Fairfax, Virginia – August 8, 2019 – Joe Fluet, MAG CEO, has announced the addition of Joseph Reale to the MAG team as Chief of…...

Read More


Contact us to learn more about how our trained and certified team provides our DoD, Federal, and private sector customers with cutting edge cybersecurity services