Jacobs offers the most advanced, integrated approach to cybersecurity:
- Offensive cyberspace operations that deliver capabilities research and development, operations support and intel analysis
- Defensive cyberspace operations and training focused on capabilities development, secure mobile communication and software and hardware security engineering
Offensive cyberspace operations designed to work in tandem with your defensive strategy
Just like on the playing field, you need an offensive line that stays out in front to proactively block a potential score. This same philosophy holds true for the cyber world. That’s why offensive cyberspace operations (OCO) are a significant part of our integrated cyber approach. Our OCO capabilities include the three main components below.
Cyberspace capabilities research and development
Cyberspace capabilities research and development delivers advanced research and prototyping, reverse engineering and software development for networked and embedded systems in support of cyberspace operations. We provide technical expertise from planning, design, development and coordination of cyberspace capabilities in the cyberspace domain for OCO/DCO missions.
Cyberspace operations support
Cyberspace operations support provides OCO and DCO tools, tactics, techniques and best practices while covering full range comprehensive cyber operation planning, cyber operation execution, cyber security concepts, modeling and simulation of sustained global cyber network threats.
Cyber intel analysis
Cyber intel analysis from knowledgeable analysts whose expertise spans the entire intelligence process. Specifically, our cyber intelligence analysts are delivering solutions to customers in the following areas:
- Cyber intelligence analysis
- Threat intelligence analysis
- Intelligence analysis/reporting, network exploitation analysis
- Target digital network analysis
- Geospatial analysis
- Malware analysis
Defensive cyberspace operations to proactively secure your greatest assets
Defending the home base through defensive cyberspace operations (DCO) is equally important as offensive cyberspace operations. Together, they create an integrated approach for proactively securing your greatest assets. Our DCO capabilities include the three main components below.
Cyber capabilities development
Cyber capabilities development secures product development and assurance assessments to harden assets used across government enterprises. You’ll gain the tools, partner and experience needed to both re-purpose existing tools and to develop new ones for threat emulation.
Secure mobile communication
Secure mobile communication secures mobile communications for iOS and Android devices. We are FIPS certified and we provide seamless integration into BlackBerry infrastructure—along with mobile device security hardening, systems engineering/analysis and biometric evaluations.
Software/hardware security engineering
Software/hardware security engineering delivers security assessments and engineering support for Government Off-the-Shelf (GOTS) Cryptographic Modules and Network Encryptors, as well as Commercial Off-the-Shelf (COTS) Secure Mobile Communications and Active Cyber Defense (ACD) solutions. Jacobs engineers, tests and deploys ACD solutions that monitor, detect, prevent, track and report as well as provides automated remediation of malicious computer-related activities and incidents.