Information Sciences & Security Systems
The ISSS Division provides advanced hardware and software development capabilities based on customer provided system requirements. This includes analysis, design, development, manufacturing, integration, testing, and if required Department of Defense (DoD) driven validation and verification (V&V) of hardware and software. The ISSS Division provides subject matter expertise and capabilities to Federal, State, and Local Government agencies, as well as private industry partners, through contracts geared towards systems development and integration, modeling, simulation and visualization. The ISSS Division maintains expertise in electronic warfare (EW), particularly full-spectrum electronic countermeasures, as well as cyber and infrastructure security.
- Customer base includes Military, NASA, and Private Industry
- Subject matter expertise in RF system design and integration, ground based and airborne system design and test, timing and radio frequency systems, and meteorological effects
- Experimental and Testing Support (Laboratory, Controlled Environment, Open Air, Ground Based, Airborne)
- Weapons Systems Development
- Soldier Protection Systems
- Fixed and Rotary Wing Aircraft
- Unmanned Aerial Systems (UAS)
- Sensor and Payload Integration
- Modeling and Simulation
Electronic Warfare
Research, design, development, fabrication, and operation of electromagnetic warfare systems to include electronic attack and electronic support devices
- Ground Based EW Systems
- Rapidly fieldable systems adapted to meet emerging threats
- Ground Based EW Systems
- Low Power Jammer
- Jericho
- Optimized Modular EW Network
- Adaptable Ruggedized Single node EW Network Lightweight System
- Airborne EW Systems
- Full Scale Aircraft Mounted Devicer
- Chaff pods
- QRC-335 series pods
- Barrage
- Transponder
- Repeater
- Subscale Aircraft Mounted Devices
- Subscale Target Jammer
- Subscale Aircraft Integrated Devices
- BABEL
- Full Scale Aircraft Mounted Devicer
- RF Environment Monitoring Systems
- Field Mobile Measurement System
- Electronic Attack Verification System
- Software development for analysis of ECM and ECCM testing and analysis
- Operations and maintenance of test systems and facilities
Cybersecurity
- Cybersecurity analysts perform assessments of systems
- Penetration Testing
- Vulnerability Assessments
- Cybersecurity certifications include but not limited to
- Certified Information System Security Professional (CISSP)
- Certified Ethical Hacker (CEH)
- CompTIA Security+
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- Certified Cloud Security Professional (CCSP)
- Computer Hacking Forensic Investigator (CHFI)
- Cisco Certified Network Associate (CCNA) Security
Learn More