SlideShare une entreprise Scribd logo
1  sur  7
PreviousNext
1
01. 15 Years of Cyber
Security & IT Experience
02. Top Secret Facility
Clearance
03. Federal, State and
Local Government Focus
www.magnusmanagement.com DUNS: 611063400. CAGE CODE: 59QZ7
PreviousNext
2
Training
Cyber Security Training,
Continuing Education, Phishing
Testing.
T5%
Cyber Security
Full Lifecycle Cyber Defensive
Services – Architecture, C&A,
Engineering, Forensics, Mobility,
Continuous Monitoring, Audit
Support, CISO Services, SOC
Services
S 70%
Information Technology
Solutions
Cloud Solutions, IT Staffing, Program Support,
Enterprise Information Management
I
T5%
Management & Financial
Consulting
Program Management, Technical Writing, Business
Process Improvement, Business Analyst, Process
Improvement Analyst Services, ECM SME Support,
Document Management Workflow Analyst, ECM
Process Improvement, Data Capture Analytics.
M 20%
Practice Areas
GSA IT 70 Schedule: GS-35F-0103Y
SIN: 54151S IT Services
SIN: 54151 HACS
SIN: 541611
© 2020 Magnus Management Group LLC. All Rights Reserved.
NAICS Codes: 541511, 541512, 541513, 541519, 541611, 541690, 541990
PreviousNext
3
CYBER SECURITY PRACTICE
Your Cyber Security partner – on-premise, cloud and mobile.
CERTIFICATION &
ACCREDIDATION
SECURITY ENGINEERING SECURITY OPERATIONS DIGITAL FORENSICS
CISO ADVISORY &
AUDIT SUPPORT
MOBILE SECURITY
© 2020 Magnus Management Group LLC. All Rights Reserved.
PreviousNext
4
Other Practice Areas
Information Technology Solutions
Personnel with over 25 Years of experience across multiple
technologies and key partnerships.
Management and Financial Consulting
Experience over multiple industry domains – Federal, State
Government and Commercial
Proven Experience in:
• Program Management
• IT Consulting and Staffing Services
• Enterprise Information Management
• Data Management
• Cloud Solutions
• Program Support Services
• Training
Case Studies in:
• Cyber Security
• Document Management
• Operations Analysis
• Program Analysis
• Business process Improvement
• Management Consulting
• Training and Education
• Financial Management Consulting
PreviousNext
5
Our top five customers
Delivering Cyber Security Services to US Federal Government since 2005 and providing Mission Critical IT Support Services including
security policy development, security technical assessment, insider threat assessment, security architecture development, security
engineering, certification and accreditation, security compliance, risk management framework, assessment and accreditation (A&A) ,
continuous monitoring , security incident visibility and resolution, intrusion testing. Mobile security, digital forensics, application security
and active monitoring
Department of Justice
Providing Cyber Security
Services since 2005
US Trade &
Development
Providing IT Consulting Services
since 2015
NOAA
Providing Cyber Security
Services since 2018.
State of Delaware
Providing IT Consulting Services
since 2015
US Marshals Service
Providing Cyber Security
Services since 2009
© 2020 Magnus Management Group LLC. All Rights Reserved.
PreviousNext
6
Innovation through Partnerships
Large Industry
Partners
© 2020 Magnus Management Group LLC. All Rights Reserved.
PreviousNext
7
PreviousNext
7
Q u a l i f i e d P e r s o n n e l & P r o v e n E x p e r i e n c e
Qualified Personnel
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
CompTIA A+ / CompTIA Sec+
CISCO Certified Network Professional (CCNP)
Information Technology Infrastructure Library (ITIL v3)
Microsoft Certified Systems Engineer (MCSE)
Project Management Professional (PMP)
AWS Cloud Practitioner
Splunk Certified Engineer
Proven Experience
Agile Development practices
IT Consulting and Staffing Services
Enterprise Information Management
Data Management
Cloud Solutions
Certification & Accreditation
Digital Forensics
IT / Security Program Management
System Auditing, Security Control Assessment
Program Support Services
Incident Response / Vulnerability
Management
Information Systems / Technology
/ Security Training
Mobile Security and Governance
Policy and Administration
Secure Cloud Computing
Security Architecture
Security Policy and Processes
© 2020 Magnus Management Group LLC. All Rights Reserved.
Contact
Shivaji Sengupta
ssengupta@nxtkey.com
307 333 0711

Contenu connexe

Tendances

Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Symantec
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security OperationsPriyanka Aash
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionCyber Infrastructure INC
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...SBWebinars
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forwardNils Thulin
 
Tech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocksTech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocksHigh Return Investments
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence MarketDatsun Arnold
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake sheaColloqueRISQ
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangColloqueRISQ
 

Tendances (20)

State of Security
State of SecurityState of Security
State of Security
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Infographic dsci 2016
Infographic dsci 2016Infographic dsci 2016
Infographic dsci 2016
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forward
 
Tech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocksTech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocks
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Emerging Trends in Application Security
Emerging Trends in Application Security Emerging Trends in Application Security
Emerging Trends in Application Security
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 

Similaire à Magnus Management Group Capability Presentation 2020

CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageExponential_e
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj Kumar
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMarkSudan1
 

Similaire à Magnus Management Group Capability Presentation 2020 (20)

CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital age
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team Capabilities
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security Professional
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum Vitae
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Digital Assurance - Today & Tomorrow
Digital Assurance - Today & TomorrowDigital Assurance - Today & Tomorrow
Digital Assurance - Today & Tomorrow
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 

Plus de NXTKey Corporation

Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014NXTKey Corporation
 
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?NXTKey Corporation
 
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012NXTKey Corporation
 
Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]NXTKey Corporation
 
Outsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji SenguptaOutsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji SenguptaNXTKey Corporation
 

Plus de NXTKey Corporation (6)

Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014
 
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
 
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
 
Automated Content Workflow
Automated Content WorkflowAutomated Content Workflow
Automated Content Workflow
 
Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]
 
Outsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji SenguptaOutsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
 

Dernier

Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Dernier (20)

Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Magnus Management Group Capability Presentation 2020

  • 1. PreviousNext 1 01. 15 Years of Cyber Security & IT Experience 02. Top Secret Facility Clearance 03. Federal, State and Local Government Focus www.magnusmanagement.com DUNS: 611063400. CAGE CODE: 59QZ7
  • 2. PreviousNext 2 Training Cyber Security Training, Continuing Education, Phishing Testing. T5% Cyber Security Full Lifecycle Cyber Defensive Services – Architecture, C&A, Engineering, Forensics, Mobility, Continuous Monitoring, Audit Support, CISO Services, SOC Services S 70% Information Technology Solutions Cloud Solutions, IT Staffing, Program Support, Enterprise Information Management I T5% Management & Financial Consulting Program Management, Technical Writing, Business Process Improvement, Business Analyst, Process Improvement Analyst Services, ECM SME Support, Document Management Workflow Analyst, ECM Process Improvement, Data Capture Analytics. M 20% Practice Areas GSA IT 70 Schedule: GS-35F-0103Y SIN: 54151S IT Services SIN: 54151 HACS SIN: 541611 © 2020 Magnus Management Group LLC. All Rights Reserved. NAICS Codes: 541511, 541512, 541513, 541519, 541611, 541690, 541990
  • 3. PreviousNext 3 CYBER SECURITY PRACTICE Your Cyber Security partner – on-premise, cloud and mobile. CERTIFICATION & ACCREDIDATION SECURITY ENGINEERING SECURITY OPERATIONS DIGITAL FORENSICS CISO ADVISORY & AUDIT SUPPORT MOBILE SECURITY © 2020 Magnus Management Group LLC. All Rights Reserved.
  • 4. PreviousNext 4 Other Practice Areas Information Technology Solutions Personnel with over 25 Years of experience across multiple technologies and key partnerships. Management and Financial Consulting Experience over multiple industry domains – Federal, State Government and Commercial Proven Experience in: • Program Management • IT Consulting and Staffing Services • Enterprise Information Management • Data Management • Cloud Solutions • Program Support Services • Training Case Studies in: • Cyber Security • Document Management • Operations Analysis • Program Analysis • Business process Improvement • Management Consulting • Training and Education • Financial Management Consulting
  • 5. PreviousNext 5 Our top five customers Delivering Cyber Security Services to US Federal Government since 2005 and providing Mission Critical IT Support Services including security policy development, security technical assessment, insider threat assessment, security architecture development, security engineering, certification and accreditation, security compliance, risk management framework, assessment and accreditation (A&A) , continuous monitoring , security incident visibility and resolution, intrusion testing. Mobile security, digital forensics, application security and active monitoring Department of Justice Providing Cyber Security Services since 2005 US Trade & Development Providing IT Consulting Services since 2015 NOAA Providing Cyber Security Services since 2018. State of Delaware Providing IT Consulting Services since 2015 US Marshals Service Providing Cyber Security Services since 2009 © 2020 Magnus Management Group LLC. All Rights Reserved.
  • 6. PreviousNext 6 Innovation through Partnerships Large Industry Partners © 2020 Magnus Management Group LLC. All Rights Reserved.
  • 7. PreviousNext 7 PreviousNext 7 Q u a l i f i e d P e r s o n n e l & P r o v e n E x p e r i e n c e Qualified Personnel Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) CompTIA A+ / CompTIA Sec+ CISCO Certified Network Professional (CCNP) Information Technology Infrastructure Library (ITIL v3) Microsoft Certified Systems Engineer (MCSE) Project Management Professional (PMP) AWS Cloud Practitioner Splunk Certified Engineer Proven Experience Agile Development practices IT Consulting and Staffing Services Enterprise Information Management Data Management Cloud Solutions Certification & Accreditation Digital Forensics IT / Security Program Management System Auditing, Security Control Assessment Program Support Services Incident Response / Vulnerability Management Information Systems / Technology / Security Training Mobile Security and Governance Policy and Administration Secure Cloud Computing Security Architecture Security Policy and Processes © 2020 Magnus Management Group LLC. All Rights Reserved. Contact Shivaji Sengupta ssengupta@nxtkey.com 307 333 0711