SlideShare a Scribd company logo
PreviousNext
1
01. 15 Years of Cyber
Security & IT Experience
02. Top Secret Facility
Clearance
03. Federal, State and
Local Government Focus
www.magnusmanagement.com DUNS: 611063400. CAGE CODE: 59QZ7
PreviousNext
2
Training
Cyber Security Training,
Continuing Education, Phishing
Testing.
T5%
Cyber Security
Full Lifecycle Cyber Defensive
Services – Architecture, C&A,
Engineering, Forensics, Mobility,
Continuous Monitoring, Audit
Support, CISO Services, SOC
Services
S 70%
Information Technology
Solutions
Cloud Solutions, IT Staffing, Program Support,
Enterprise Information Management
I
T5%
Management & Financial
Consulting
Program Management, Technical Writing, Business
Process Improvement, Business Analyst, Process
Improvement Analyst Services, ECM SME Support,
Document Management Workflow Analyst, ECM
Process Improvement, Data Capture Analytics.
M 20%
Practice Areas
GSA IT 70 Schedule: GS-35F-0103Y
SIN: 54151S IT Services
SIN: 54151 HACS
SIN: 541611
© 2020 Magnus Management Group LLC. All Rights Reserved.
NAICS Codes: 541511, 541512, 541513, 541519, 541611, 541690, 541990
PreviousNext
3
CYBER SECURITY PRACTICE
Your Cyber Security partner – on-premise, cloud and mobile.
CERTIFICATION &
ACCREDIDATION
SECURITY ENGINEERING SECURITY OPERATIONS DIGITAL FORENSICS
CISO ADVISORY &
AUDIT SUPPORT
MOBILE SECURITY
© 2020 Magnus Management Group LLC. All Rights Reserved.
PreviousNext
4
Other Practice Areas
Information Technology Solutions
Personnel with over 25 Years of experience across multiple
technologies and key partnerships.
Management and Financial Consulting
Experience over multiple industry domains – Federal, State
Government and Commercial
Proven Experience in:
• Program Management
• IT Consulting and Staffing Services
• Enterprise Information Management
• Data Management
• Cloud Solutions
• Program Support Services
• Training
Case Studies in:
• Cyber Security
• Document Management
• Operations Analysis
• Program Analysis
• Business process Improvement
• Management Consulting
• Training and Education
• Financial Management Consulting
PreviousNext
5
Our top five customers
Delivering Cyber Security Services to US Federal Government since 2005 and providing Mission Critical IT Support Services including
security policy development, security technical assessment, insider threat assessment, security architecture development, security
engineering, certification and accreditation, security compliance, risk management framework, assessment and accreditation (A&A) ,
continuous monitoring , security incident visibility and resolution, intrusion testing. Mobile security, digital forensics, application security
and active monitoring
Department of Justice
Providing Cyber Security
Services since 2005
US Trade &
Development
Providing IT Consulting Services
since 2015
NOAA
Providing Cyber Security
Services since 2018.
State of Delaware
Providing IT Consulting Services
since 2015
US Marshals Service
Providing Cyber Security
Services since 2009
© 2020 Magnus Management Group LLC. All Rights Reserved.
PreviousNext
6
Innovation through Partnerships
Large Industry
Partners
© 2020 Magnus Management Group LLC. All Rights Reserved.
PreviousNext
7
PreviousNext
7
Q u a l i f i e d P e r s o n n e l & P r o v e n E x p e r i e n c e
Qualified Personnel
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
CompTIA A+ / CompTIA Sec+
CISCO Certified Network Professional (CCNP)
Information Technology Infrastructure Library (ITIL v3)
Microsoft Certified Systems Engineer (MCSE)
Project Management Professional (PMP)
AWS Cloud Practitioner
Splunk Certified Engineer
Proven Experience
Agile Development practices
IT Consulting and Staffing Services
Enterprise Information Management
Data Management
Cloud Solutions
Certification & Accreditation
Digital Forensics
IT / Security Program Management
System Auditing, Security Control Assessment
Program Support Services
Incident Response / Vulnerability
Management
Information Systems / Technology
/ Security Training
Mobile Security and Governance
Policy and Administration
Secure Cloud Computing
Security Architecture
Security Policy and Processes
© 2020 Magnus Management Group LLC. All Rights Reserved.
Contact
Shivaji Sengupta
ssengupta@nxtkey.com
307 333 0711

More Related Content

What's hot

Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Symantec
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security OperationsPriyanka Aash
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionCyber Infrastructure INC
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...SBWebinars
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forwardNils Thulin
 
Tech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocksTech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocksHigh Return Investments
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence MarketDatsun Arnold
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake sheaColloqueRISQ
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacylgcdcpas
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangColloqueRISQ
 

What's hot (20)

State of Security
State of SecurityState of Security
State of Security
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
Advantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security SolutionAdvantages Of Using Cyber Security Solution
Advantages Of Using Cyber Security Solution
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Infographic dsci 2016
Infographic dsci 2016Infographic dsci 2016
Infographic dsci 2016
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forward
 
Tech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocksTech stocks to buy - Top small cap tech stocks
Tech stocks to buy - Top small cap tech stocks
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Emerging Trends in Application Security
Emerging Trends in Application Security Emerging Trends in Application Security
Emerging Trends in Application Security
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 

Similar to Magnus Management Group Capability Presentation 2020

CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageExponential_e
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj Kumar
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMarkSudan1
 

Similar to Magnus Management Group Capability Presentation 2020 (20)

CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital age
 
VetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica Vets GWAC Team Capabilities
VetsAmerica Vets GWAC Team Capabilities
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security Professional
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020ZIGRAM Introduction September 2020
ZIGRAM Introduction September 2020
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum Vitae
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Digital Assurance - Today & Tomorrow
Digital Assurance - Today & TomorrowDigital Assurance - Today & Tomorrow
Digital Assurance - Today & Tomorrow
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 

More from NXTKey Corporation

Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014NXTKey Corporation
 
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?NXTKey Corporation
 
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012NXTKey Corporation
 
Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]NXTKey Corporation
 
Outsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji SenguptaOutsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji SenguptaNXTKey Corporation
 

More from NXTKey Corporation (6)

Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014Top 6 Immersive / Next Generation Technologies to watch for in 2014
Top 6 Immersive / Next Generation Technologies to watch for in 2014
 
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
Outsourcing Business from USA - Is Viet Nam a sleeping tiger?
 
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
Future of Publishing-Content Workflow-Shivaji Sengupta-London Book Fair 2012
 
Automated Content Workflow
Automated Content WorkflowAutomated Content Workflow
Automated Content Workflow
 
Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]Why Content Management In The Energy Sector [Compatibility Mode]
Why Content Management In The Energy Sector [Compatibility Mode]
 
Outsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji SenguptaOutsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
Outsourcing The Next Frontier In Editorial Workflow Shivaji Sengupta
 

Recently uploaded

chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationAUDIJEAngelo
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.smalmahmud11
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)linciy03
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckHajeJanKamps
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxWorkforce Group
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanasabutalha2013
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBen Wann
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfGutaMengesha1
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134LR1709MUSIC
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxmy Pandit
 
Easy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your ComputerEasy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your ComputerSAG Infotech
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.FelixPerez547899
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfsuperbizness1227
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdfSOFTTECHHUB
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...ssuserf63bd7
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfinsightssuccess2
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastInstBlast Marketing
 

Recently uploaded (20)

chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Evolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdfEvolution and Growth of Supply chain.pdf
Evolution and Growth of Supply chain.pdf
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Easy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your ComputerEasy Way to Download and Set Up Gen TDS Software on Your Computer
Easy Way to Download and Set Up Gen TDS Software on Your Computer
 
HR and Employment law update: May 2024.
HR and Employment law update:  May 2024.HR and Employment law update:  May 2024.
HR and Employment law update: May 2024.
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdf
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
Byrd & Chen’s Canadian Tax Principles 2023-2024 Edition 1st edition Volumes I...
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdf
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 

Magnus Management Group Capability Presentation 2020

  • 1. PreviousNext 1 01. 15 Years of Cyber Security & IT Experience 02. Top Secret Facility Clearance 03. Federal, State and Local Government Focus www.magnusmanagement.com DUNS: 611063400. CAGE CODE: 59QZ7
  • 2. PreviousNext 2 Training Cyber Security Training, Continuing Education, Phishing Testing. T5% Cyber Security Full Lifecycle Cyber Defensive Services – Architecture, C&A, Engineering, Forensics, Mobility, Continuous Monitoring, Audit Support, CISO Services, SOC Services S 70% Information Technology Solutions Cloud Solutions, IT Staffing, Program Support, Enterprise Information Management I T5% Management & Financial Consulting Program Management, Technical Writing, Business Process Improvement, Business Analyst, Process Improvement Analyst Services, ECM SME Support, Document Management Workflow Analyst, ECM Process Improvement, Data Capture Analytics. M 20% Practice Areas GSA IT 70 Schedule: GS-35F-0103Y SIN: 54151S IT Services SIN: 54151 HACS SIN: 541611 © 2020 Magnus Management Group LLC. All Rights Reserved. NAICS Codes: 541511, 541512, 541513, 541519, 541611, 541690, 541990
  • 3. PreviousNext 3 CYBER SECURITY PRACTICE Your Cyber Security partner – on-premise, cloud and mobile. CERTIFICATION & ACCREDIDATION SECURITY ENGINEERING SECURITY OPERATIONS DIGITAL FORENSICS CISO ADVISORY & AUDIT SUPPORT MOBILE SECURITY © 2020 Magnus Management Group LLC. All Rights Reserved.
  • 4. PreviousNext 4 Other Practice Areas Information Technology Solutions Personnel with over 25 Years of experience across multiple technologies and key partnerships. Management and Financial Consulting Experience over multiple industry domains – Federal, State Government and Commercial Proven Experience in: • Program Management • IT Consulting and Staffing Services • Enterprise Information Management • Data Management • Cloud Solutions • Program Support Services • Training Case Studies in: • Cyber Security • Document Management • Operations Analysis • Program Analysis • Business process Improvement • Management Consulting • Training and Education • Financial Management Consulting
  • 5. PreviousNext 5 Our top five customers Delivering Cyber Security Services to US Federal Government since 2005 and providing Mission Critical IT Support Services including security policy development, security technical assessment, insider threat assessment, security architecture development, security engineering, certification and accreditation, security compliance, risk management framework, assessment and accreditation (A&A) , continuous monitoring , security incident visibility and resolution, intrusion testing. Mobile security, digital forensics, application security and active monitoring Department of Justice Providing Cyber Security Services since 2005 US Trade & Development Providing IT Consulting Services since 2015 NOAA Providing Cyber Security Services since 2018. State of Delaware Providing IT Consulting Services since 2015 US Marshals Service Providing Cyber Security Services since 2009 © 2020 Magnus Management Group LLC. All Rights Reserved.
  • 6. PreviousNext 6 Innovation through Partnerships Large Industry Partners © 2020 Magnus Management Group LLC. All Rights Reserved.
  • 7. PreviousNext 7 PreviousNext 7 Q u a l i f i e d P e r s o n n e l & P r o v e n E x p e r i e n c e Qualified Personnel Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) CompTIA A+ / CompTIA Sec+ CISCO Certified Network Professional (CCNP) Information Technology Infrastructure Library (ITIL v3) Microsoft Certified Systems Engineer (MCSE) Project Management Professional (PMP) AWS Cloud Practitioner Splunk Certified Engineer Proven Experience Agile Development practices IT Consulting and Staffing Services Enterprise Information Management Data Management Cloud Solutions Certification & Accreditation Digital Forensics IT / Security Program Management System Auditing, Security Control Assessment Program Support Services Incident Response / Vulnerability Management Information Systems / Technology / Security Training Mobile Security and Governance Policy and Administration Secure Cloud Computing Security Architecture Security Policy and Processes © 2020 Magnus Management Group LLC. All Rights Reserved. Contact Shivaji Sengupta ssengupta@nxtkey.com 307 333 0711