Cyber Operations

Group of cyber engineers examing a project.

Jacobs offers the most advanced, integrated approach to cybersecurity:

  • Offensive cyberspace operations that deliver capabilities research and development, operations support and intel analysis
  • Defensive cyberspace operations and training focused on capabilities development, secure mobile communication and software and hardware security engineering

Offensive cyberspace operations designed to work in tandem with your defensive strategy

Just like on the playing field, you need an offensive line that stays out in front to proactively block a potential score. This same philosophy holds true for the cyber world. That’s why offensive cyberspace operations (OCO) are a significant part of our integrated cyber approach. Our OCO capabilities include the three main components below.

Cyberspace capabilities research and development

Cyberspace capabilities research and development delivers advanced research and prototyping, reverse engineering and software development for networked and embedded systems in support of cyberspace operations. We provide technical expertise from planning, design, development and coordination of cyberspace capabilities in the cyberspace domain for OCO/DCO missions.

Cyberspace operations support

Cyberspace operations support provides OCO and DCO tools, tactics, techniques and best practices while covering full range comprehensive cyber operation planning, cyber operation execution, cyber security concepts, modeling and simulation of sustained global cyber network threats.

Cyber intel analysis

Cyber intel analysis from knowledgeable analysts whose expertise spans the entire intelligence process. Specifically, our cyber intelligence analysts are delivering solutions to customers in the following areas:

  • Cyber intelligence analysis
  • Threat intelligence analysis
  • Intelligence analysis/reporting, network exploitation analysis
  • Target digital network analysis
  • Geospatial analysis
  • Malware analysis

Defensive cyberspace operations to proactively secure your greatest assets

Defending the home base through defensive cyberspace operations (DCO) is equally important as offensive cyberspace operations. Together, they create an integrated approach for proactively securing your greatest assets. Our DCO capabilities include the three main components below.

Cyber capabilities development

Cyber capabilities development secures product development and assurance assessments to harden assets used across government enterprises. You’ll gain the tools, partner and experience needed to both re-purpose existing tools and to develop new ones for threat emulation.

Secure mobile communication

Secure mobile communication secures mobile communications for iOS and Android devices. We are FIPS certified and we provide seamless integration into BlackBerry infrastructure—along with mobile device security hardening, systems engineering/analysis and biometric evaluations.

Software/hardware security engineering

Software/hardware security engineering delivers security assessments and engineering support for Government Off-the-Shelf (GOTS) Cryptographic Modules and Network Encryptors, as well as Commercial Off-the-Shelf (COTS) Secure Mobile Communications and Active Cyber Defense (ACD) solutions. Jacobs engineers, tests and deploys ACD solutions that monitor, detect, prevent, track and report as well as provides automated remediation of malicious computer-related activities and incidents.

Discover more about our cyber solutions

Jacobs Cyber Capability

(PDF, 435 KB)

external Download the cyber capability brochure