Operations Management

MAGNUS Operations Management offers our clients the full range of consulting services. These services include:

  1. Development of Operations Strategy concepts,
  2. Product and Service Management,
  3. Service Delivery & Support,
  4. Integration Management
  5. IT Management.

Additionally by combining our functional Operations Management competencies with specific industry knowledge we are able to serve our clients with customized approaches responding best to their specific requirements and needs. A great deal of our focus is on efficiency and effectiveness of processes. Therefore, MAGNUS Operations Management consulting often includes substantial measurement and analysis of internal processes.

Program Management

Magnus has a proven record of successful support for CIOs and PM staff through: task area performance monitoring; program analysis and management; implementation of process improvement initiatives; and making information management efficient, uniform, accessible, and secure.

We perform the types of work called for in Performance Work Statements throughout our IT portfolios and provide service management to our clients as they request it – benchmarking our projects from inception to closeout through detailed Project/Task Order Management Plans (PMPs). Project management and technical support for IT application and business systems, software development (including Agile), documentation, and reviews, assessments, and system architecture analysis and make recommendations on enterprise architectures are core specialties. Portfolio Management and IT Governance and objective IT alignment (budgets, objectives, mission, etc.) are conducted in our PMO.

We support our clients in the Investment Review Board and IT Executive Council decision-making process and provide cost and financial analysis to their portfolios, including benefits realization techniques. We provide IT Milestone Reviews and IT Portfolio Management training as well as OMB Budget Submission support, including budget data, earned value and monthly submission data, pass-back, and ad-hoc data requests. All of these services are provided in the federal IT environment.

Our approach to comprehensive and effective project management is described below:

  1. A strong Program Management based on PMBOK best practices that provides an effective way to develop and coordinate requirements, manage the project risks, and manage the resources that ultimately makes the project successful.
  2. A Risk Management Plan (RMP) to identify risks throughout task execution, monitor activities for potential risks, mitigate risks, and develop contingency plans should those risks come to fruition.
  3. A highly skilled, stable, security-conscious, and multi-functional workforce with a strong team ethics to partner with our clients and work towards a shared goal.
  4. A Change Management process that helps the organizations, both Federal and Contractor staff, to embrace change in a positive manner.
  5. Customer Surveys as a tool to provide a method to assess stakeholders views on the parameters of service delivery, including quality, timeliness, and efficiency. The survey’s results are used in the Continual Service Improvement (CSI) which is one of the ITIL processes.
  6. Training program to improve the education and the professionalism of the workforce.
  7. Clear dispute resolution processes and procedures regarding the recording, reporting, scoring, and reviewing of performance.

Cyber Management Services

MAGNUS emphasizes quality, service, and intellect while employing cutting-edge technologies to keep clients ahead of the curve. Its strong business values and tested best practices, coupled with a creative technological edge, ensure that it delivers expert consulting services in the areas of Information Security Management, Project Management, and Operation Management.

Cyber Project Management

MAGNUS Project Management provides expert consulting services in principles described by the Project Management Body of Knowledge (PMBOK).

Hence, applying the five processes (Initiation, Planning, Execution, Controlling, Closing) and the nine knowledge areas (Project Integration Management , Project Scope Management , Project Time Management , Project Cost Management , Project Quality Management , Project Human Resource Management , Project Communications Management , Project Risk Management , Project Procurement Management) to all aspects of each clients needs.

Cyber Operations Management

MAGNUS Operations Management offers our clients the full range of consulting services. These services include the development of Operations Strategy concepts, Product and Service Management, Service Delivery & Support, Integration and IT Management.

Additionally by combining our functional Operations Management competencies with specific industry knowledge we are able to serve our clients with customized approaches responding best to their specific requirements and needs. A great deal of our focus is on efficiency and effectiveness of processes. Therefore, MAGNUS Operations Management consulting often includes substantial measurement and analysis of internal processes.

Security Management

MAGNUS Security Management offers our clients a full range of security consulting services tailored specific to their requirements.

MAGNUS Consultants are considered subject matter experts in the aforementioned functional areas and are actively involved with the design, development, procurement and implementation of Information Security solutions.

These services include:

  • Certification & Accreditation
  • Security Architecture
  • Risk Analysis and Assessments
  • Security Policy and Processes
  • System Auditing
  • Security Testing and Evaluation
  • Disaster Recovery Planning
  • Contingency Planning
  • Vulnerability Assessments
  • Penetration Testing
  • Physical Security Survey
  • Security Program Management

Proactive Cyber Security

Hard problems stay solved with MAGNUS. We work diligently and collaboratively with our customers to provide a variety of proactive security assessments and safeguards.

This is a landscape, like many, that is constantly changing. That’s why it’s absolutely critical to choose a security partner constantly on the leading edge, always a step ahead of our customers and potential threats to their operations. That’s exactly what we do at MAGNUS.

Our team performs the full range of proactive assessments and simulations to keep our customers’ informational assets secure – across cloud, mobile or on-premise. Our team of experts works on behalf of customers in the federal government and in the commercial arena alike. These projects involve, for example, preemptively securing thousands of devices; successfully defending against millions of attacks; performing hundreds of vulnerability assessments.

Additionally, we have developed a compliance assurance model that ensures our customers are safe from not only malicious threats, but threats to their ability to operate due to an unknown or unforeseen compliance issue.

Customers Turn to Us For:

  • Technical Security Assessment
  • Investigations
  • Digital Forensics
  • Application Security
  • Penetration Testing
  • Exploitation Analysis
  • Social Engineering
  • Mobile Device Security

Security Operations Center (SOC)

You’re securely up and running. We keep it that way. The MAGNUS team provides the full suite of security operations center services, drawing on years of experience in high-profile, high-stakes environments.

We offer our customers the full range of security operations center services. Whether we’ve built the system or have been engaged to manage it, we successfully and effectively meet our customers’ needs – and then some.

We ensure their applications, databases, servers, networks and other endpoints are secure. We perform continuous monitoring and assessment. But that’s table stakes. We go beyond the traditional SOC engagement to develop strategies and program management protocols that enhance our customers’ SOC objectives.

We measure and analyze – all the time – to ensure continuous improvement. We combine leading-edge industry knowledge and emerging techniques to keep our customers not only secure but aware and on offense. We customize our approach in line with specific requirements and needs. We’re agile, nimble and flexible; we’re also smart, fast and good.

Customers Turn to Us For:

  •  Security Program Management
  •  Security Awareness & Education
  •  System Authorization
  •  Agile Security Awareness
  •  Cyber Threat Intelligence & Analysis
  •  Defense Posture Assessment
  •  Incident Detection & Response
  •  Insider Threat Prevention & Detection

Digital Forensics

Magnus has had a Digital Forensics Practice since 2017 when we started supporting a premier Federal Law Enforcement Agency with its investigations into mobile devices. Initially this was done under the umbrella of our Cyber Security practice, however it was soon determined that this was a unique area with a need for focused skillsets and knowledge of specific tools.

Our Digital Forensics practice today supports Law Enforcement Agencies with its Collection, Examination, Analysis and Reporting of data for Mobile, Tablet, Vehicle GPS, IOT and Drone Investigations. Our digital forensics practitioners have a wide variety of tools in their kit which gives you a sense of the sorts of tasks they can complete:

  • Disk and data capture tools
  • File viewers
  • File analysis tools
  • Registry analysis tools
  • Internet analysis tools
  • Email analysis tools
  • Mobile devices analysis tools

The process models our digital forensics practitioners use can vary, however below are the four basic steps:

  1. Collection, in which digital evidence is acquired. This often involves seizing physical assets, like computers, phones or hard drives; care must be taken to ensure that no data is damaged or lost. Storage media may be copied or imaged at this stage in order to keep the original in a pristine state for reference.
  2. Examination, in which various methods are used to identify and extract data. This step can be divided into preparation, extraction and identification. Important decisions to make at this stage are whether to deal with a system that’s live or dead.
  3. Analysis, in which the data that’s been gathered is used to prove or disprove the case being built by investigators. For each relevant data item, investigators will answer the basic questions about it — who created it? who edited it? how was it created? when did this all happen? — and attempt to determine how it relates to the case.
  4. Reporting, in which the data and analysis are synthesized into a format that can be understood by stakeholders. Being able to create such reports is an absolutely crucial skill in digital forensics.

CISO Support Services

Over the last 15 years, Magnus has provided CISO Support Services to Department of Justice components including Office of Justice Programs, Office of CIO, Office of CISO, USMS CISO and Bureau of Prisons leadership. Magnus team members have served as a principal cyber security advisors / liaison between DOJ HQ OCIO – Cyber Security Branch and DOJ Components / CISO staff and external auditors on all matters relating to the Annual Financial Statement and FISMA Audits of DOJ Components. Additionally, our teams serve as an internal auditor serving as an independent body performing overall assessment of IT controls for the DOJ systems, and recommend and validate corrective actions for deficiencies.

Some of the deliverables for our executive support to the CISOs include:

  • Prepare, record, and track action items for the Authorizing Official (AO) briefings.
  • Provide support needed for penetration testing.
  • Prepare and disseminate risk slides including updates on behalf of CISO office
  • Provide security program management policies, processes, procedures and standards.
  • Develop and apply security procedures and checklists.
  • Ensure compliance with downward directed enterprise security procedures, checklists, and requirements
  • Support the maintenance of the continuity of operations and disaster recovery plan and procedures.
  • Participate and assist, in the annual execution of a continuity of operations and disaster recovery exercise.
  • Provide Operations Backup Sites support.
  • Ensure backup policies, plans and procedures are in alignment with the Federal Information Security Management Act (FISMA).
  • Produce and deliver training documentation on new security products and/or applications to Government and Contractor employees.
  • Develop, maintain and update Security Education, Training, and Awareness plan.

In addition, Magnus Cyber Security Team provides support services for developing a proactive methodology to assess and strengthen internal IT controls and rapidly and effectively respond to, and resolve findings identified during the FISCAM and FISMA audits of systems and subsystems.

Cyber Security Training

MAGNUS Corporation has had extensive experience creating classroom based, online, video based and scenario / role based cyber security training course and modules.  MAGNUS has developed Cyber Security based coursed for various formats using its pool of cyber security SME’s who have real world experience as Cyber Security Practitioners and have advanced cyber certifications including Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), CompTIA Security+, Certified Information Systems Security Professional (CISSP), NIST Cybersecurity Framework (NCSF – Foundation and Practitioner), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP) amongst others.

Over the years MAGNUS has been involved in developing cutting edge training assets. Some of our training combine content creation, interesting interactivities, animations, assessments, graphics, games, quizzes, sound files, over a host of delivery platforms. MAGNUS has successfully delivered Cyber courses across various Federal, Academic and Commercial organizations.

MAGNUS has designed and delivers a 3 Credit course on “Applied Cyber Security Course” at Delaware State University

One of the programs we are most proud about is the “Applied Cyber Security Course” at Delaware State University where MAGNUS Corporation developed and continues to deliver a 3 credit course (going on our 3rd year).  The vision of the Applied Cyber Security Course is to equip students with the practical knowledge and experience to use various key Cyber Technologies that will help to protect valuable data assets and develop next-generation cyber skills to anticipate, monitor and avoid cyber threats. This course is designed preparing students with cutting-edge knowledge and skills through practical, lab-oriented coursework that is designed by industry experts, obtaining hands-on experience and learning from knowledgeable faculty who practice in their fields.

This course is conducted in a combination of instructor led classroom instruction, instructor led web based instruction and online lab environments. The course covers topics like Security Operations Center (SOC), Security Incident  & Event Management (SIEM), Event and Log Collection, Layered Centric Views & Normalization, Intrusion Detection Systems (IDS), Traffic Analysis, Network Monitoring, Network Traffic Forensics, Security Analytics Tools amongst others.

Enterprise Information Management and Content / Document Management Services

MAGNUS’s ECM consulting services are designed so our clients can make the right decisions with regard to extracting business value from content. It is not about generating and managing content anymore.

The value is in how your customers receive and relate to that content. It is about managing their experience of interactions with your organization. Our strategic evaluation and technical consulting services are all focused on how to continually improve client interactions that then result in more business and loyalty.

Enterprise Content Management Services:

  • ECM Strategy
  • ECM Governance
  • ECM Architecture
  • ECM Functional Expertise and Implementation
  • Migration Strategy and Planning

MAGNUS has provided to Government and Commercial clients solutions related to Document management, Image-processing, Workflow / business process management, Records management, Web content management and Social content.

MAGNUS personnel have worked on EIM projects across Banking, Government, Manufacturing, Telecom, Utilities, Retail and Healthcare.

MAGNUS’s Enterprise Information Management (EIM) services provide a platform to transform raw data into actionable information and insight thereby enabling strategic, tactical and operational decision making for any organization.

With MAGNUS’s EIM solutions, you can:

  • Help ensure that data is complete, accurate, and accessible, to increase the efficiency of business operations and business intelligence.
  • Accelerate access to business information, to optimize performance and decision-making.
  • Manage information throughout its life-cycle, to enhance governance and compliance.

OCIO Support Services

Magnus has been a critical part of the Office of Chief Information Office at the Department of Justice since 2012 serving in various capacities including Business Process Reengineering, Technical Writing, Front Office / Budget Operations Services.

Some of the current activity our team manages include:

    Budget Operations

  • Support development of annual OCIO budget and spending plans.
  • Maintain and report on OCIO and reimbursable spending plans.
  • Support management and reporting of OCIO’s and Reimbursable budgets.
  • Coordinate OCIO deliverables to Budget and Finance Staff.
  • Work with program managers across OCIO to review, manage, and track expenditures and spend plans.
  • Support ad hoc reporting and analysis for executive leadership team

    Front Office Liaison

  • Develop and deliver executive communications.
  • Coordinate, review, and proofread executive presentations to OCIO and external leadership.
  • Support department wide training and other strategic meetings