Cyber & Intelligence Solutions

Our engineering and intelligence solutions enable our customers to more effectively understand, assess, predict, protect, and counter physical, digital, and geopolitical threats from adversaries at every level. ​

    Our Mission

    As U.S. adversaries become more sophisticated with access to advanced technologies, having intelligence and cyber capabilities that keep our nation ahead of threats is critical.

    Centauri brings a wide range of intelligence expertise to its government customers to address every threat – from signals and geospatial intelligence to HUMINT and target analysis. Centauri’s cyber capabilities are at the forefront of the security landscape, with a level of preventative, forensic and diagnostic skills unmatched in the industry. Our specialized cyber and intelligence solutions deliver enhanced situational awareness and protect our nation’s most vital infrastructure, systems, and assets.​

    Our engineering and applications expertise helps government customers implement solutions that protect our critical infrastructure against threats from adversaries at every level. We go far beyond traditional network defense to build advanced solutions, offensive capabilities, and out-of-the-box approaches that proactively defend our national security systems. The Centauri cyber team applies its unique ingenuity to a wide variety of special programs to defend today and into the future.

    Our Cyber Security Capabilities

    close
    earth globe

    Activity Based Intelligence

    Activity-based Intelligence (ABI) approaches intelligence problems by analyzing events and transactions (activity) in a geo-temporal context, understanding available data and its underlying properties, and analyzing that data in a forensic fashion to enable network analysis. ABI, by definition, uses MULTI-INT collections to obtain the information needed to compute the required analytics, which must be registered in a common frame of reference. The quantity of data is too large for analysts to perform manual manipulation; therefore, ABI must leverage automation to aid the analyst in their tasking.

    close

    Adversary Weapons System Analysis

    Centauri is conducting material development and analysis activities for advanced composite structures. These efforts are focused on development of advanced airframes, structures, and components for high-speed, long duration flight. This includes manufacturing techniques for high-temperature resins, carbon fibers, and advanced ceramics for integrated airframe & thermal protection. Centauri capabilities for advanced materials development include the streamlined fabrication, testing, and analysis of in-house prototype designs.

    close

    Counterintelligence

    Employees of the government and private sector entrusted with placement and access to critical information are potential targets of foreign intelligence services. Centauri’s collective Counterintelligence (CI) expertise is a product of careers of consequence which focused on identifying an adversary’s requirements, capabilities and intentions and employing a range of sophisticated tools and techniques to disrupt them. Leveraging this remarkable concentration of expertise, Centauri assists our clients and partners within and outside the Intelligence Community (IC) in confronting the operational sophistication and rigor of our adversaries to safeguard critical personnel, assets, and programs.

    close

    Cyber Investigations

    Centauri’s Cyber Counterintelligence Investigators (CCIOs) have extensive experience in traditional counterintelligence investigations, coupled with cyber and digital forensics knowledge, skills, and abilities.

    close
    cybersecurity readiness

    Cyber Program

    The digital landscape is quickly becoming the dominant battlefield of the 21st Century. Attacks perpetrated by nation-state actors, cyber criminals, hacktivists, and insider threats all pose a significant risk to an organization's information and information systems. From theft of intellectual property, accidental or intentional information deletion, or data alteration from the latest ransomware strain, organizations need a cybersecurity partner with the knowledge and experience to defend against these asynchronous threats.

    close

    Cyber Range

    Technology changes rapidly, as do adversary tactics, which requires defenders to continually improve their craft to detect, deter, and defeat system and network intrusions. Waiting for an attack to gain those skills in a production environment puts us at a disadvantage. America doesn’t send soldiers into battle without first receiving training on their primary weapon. Every service member trains for many hours at the weapons range as part of their basic training and throughout their career. Today, cyber weapons are the primary weapon for many operations. The operators of these cyber weapons require extensive training on those tools, tactics and techniques as well.

    close

    Human Intelligence

    Human Intelligence (HUMINT) requires deep, data-rich analysis that goes beyond traditional behavioral analysis to discover trends, correlations, and anomalous activities occurring around specified events bounded in space and time – seeking to infer about the nature of unusual activity and draw actionable intelligence from it.

    close

    Intelligence Analysis

    Intelligence Analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a sub-context. The capacity to develop timely, well-formulated strategic intelligence is vital to the security of Centauri clients. Our analysts collect information from a wide-range of individuals and connect the similarities of their knowledge, which will create a shared truth.

    close

    Insider Threat Analysis

    Insider Threat Programs serve to detect, deter, and mitigate the actions of any person intent on using authorized access to do harm to the security of the United States.

    close

    Large Data Analytics

    Centauri creates and uses state of the art machine-learning algorithms to process massive amounts of data, at scale, in order to provide timely intelligence exploitation and analysis to end-users across the globe. Our integration of artificial intelligence into all phases of the Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) cycle allows us to provide new insights from previously intractable datasets as well as rapid visualization of those insights and deployment to the warfighter.

    close

    Machine Learning & AI

    Advances in computational hardware, algorithms, and an explosion of available training data have enabled machine learning algorithms to achieve human-level competency on a range of important tasks. Department of Defense (DoD) and Intelligence Community (IC) sensors are now providing more data than can be reasonably processed by trained analysts. Hence, it is critically important to leverage modern machine learning techniques to enable rapid, reliable processing of data so that the analyst can be maximally effective.

    close

    Multi-Intelligence Analysis

    Multi-INT analysis involves the processing and correlation of intelligence data from a multitude of collection sensors and methods. The distinction between Multi-INT and all-source analysis is slight, but revolves around the intent of the analysis and the level of processing necessary to accomplish production requirements. Analytic tradecraft is essential to timely and accurate representation of Multi-INT analysis when the large breadth of requirements is considered. Today’s intelligence operations are data rich environments where productive analysis requires smarter, more efficient means of getting the best information in the right context to its many customers.

    close
    precision engagement satellite

    Precision Engagement

    A key component of our nation's security strategy is precision engagements against time-sensitive targets with precision-guided weapons. While laser-guided weapons require a man-in-the-loop for guidance, all-weather GPS-guided weapons require precision target coordinate placement on the globe. Those precision engagement weapons are essential to our nation's global War on Terror as we require minimum collateral damage while ensuring maximum weapon effectiveness. Centauri specializes in providing rigorous photogrammetric science and sensor modeling to enable our nation's strategic and tactical imaging systems to support computing those coordinates rapidly and confidently.

    close
    pnt critical infrastructure

    PNT Critical Infrastructure

    Centauri supports the analysis and hardening of PNT systems used in critical infrastructures by identifying vulnerabilities in lab and field testing, and simulating real world events in extreme environments. Our mission is to detect, understand and neutralize threats creating superior defenses within PNT and Cyber environments.

    close
    radio frequency cyber

    Radio Frequency Cyber

    The Centauri Radio Frequency (RF) Cyber team takes a multi-disciplinary approach to solving difficult RF reverse engineering and cyber vulnerability research problems. The team combines traditional electronic warfare tactics with next generation Software Defined Radio (SDR) cyber capabilities to develop offensive and counter Electronic Warfare (EW) platforms that meet mission requirements. A deep understanding of digital communications systems Is utilized to analyze complex systems such as Internet of Things (IoT), Industrial Control Systems, and voice communications systems to deliver RF cyber solutions. Centauri's counter EW platforms are designed to protect vulnerable critical wireless infrastructure against emerging wireless threats.

    close
    reverse engineering

    Reverse Engineering

    The Centauri Cyber team is dedicated to solving the most complex cyber and electronic warfare issues, using a combination of software and hardware reverse engineering to understand and overcome mission targets. Using cutting-edge tools and techniques, the team can discover potential vulnerabilities or malicious behavior. Our team also has the ability to leverage uncovered vulnerabilities to develop offensive cyber capabilities to provide vital tools for cyber and electronic warfare. With a pristine performance record and decades of experience, with work that spans the Department of Defense (DOD), Intelligence Community (IC), and commercial sectors, our team is ready to take on the next challenge, no matter how complex.

    close

    Trusted Microelectronics

    The continued globalization of the microelectronics supply chain has placed the security of defense and industrial microelectronics at considerable risk. Examples of potential vulnerabilities include counterfeit devices, malicious hardware trojans, intellectual property theft, and leakage of sensitive information. Conventional microelectronics development has focused on the optimization of power, performance, and area constraints. These optimizations often come at the expense of hardware security. For this reason, the mitigation of these hardware security vulnerabilities requires drastic changes to the status quo of microelectronics design, assessment, validation, and verification. Effective research in these areas calls for multidisciplinary teams capable of developing novel techniques for a broad array of state-of-the-art microelectronics systems.

    Mission Leaders

    close

    Rob Thomas

    SVP, Intel & Cyber Analytics

    Rob Thomas, Senior Vice President of Intel and Cyber Analytics, is responsible for a team of highly-specialized team of scientists, engineers and senior acquisition professionals working next-generation image and geospatial related technologies and systems engineering and integration services for a myriad of national agencies. He has over twenty three years of defense support experience in program management and advanced research and technology development in the core area of imagery, geospatial-intelligence (GEOINT), and target intelligence with a focus on imagery quality and photogrammetric-based geospatial analysis and services. Prior to joining Centauri in November 2001, Rob served in a variety of program management and systems engineering positions within the Department of Defense as well as supporting National Agencies. These include the National Reconnaissance Office, (NRO), Headquarters United States European Command (HQ USEUCOM), Central Imagery Office (CIO), Headquarters United States Strategic Command (HQ USTRATCOM), and the Headquarters Strategic Air Command (SAC) as an Air Force Officer. Rob graduated in 1986 with an undergraduate degree in Physics from the University of Colorado and followed with a M.S. in Applied Mathematics from Creighton University in 1995.

    close

    Neil Carender

    VP, Special Programs

    close

    Mark Westfall

    VP, Human and Technical Operations

    Mark Westfall, head of Human & Technical Operations, joined Centauri in August 2018. He was previously Vice President, Cyber Analytics for Perspecta’s Intelligence Group and focused on business development and the transition of applied research to mission. Mark retired from United States Federal Government service in November 2016 after a 29 year career. During that time, he worked overseas in the Middle East, South Asia, and Europe as well as in Washington, DC. His responsibilities included the management and execution of operations involving HUMINT, Counterintelligence, and Cybersecurity. Mark obtain a Master’s degree from the California Institute of Technology in Electrical Engineering and a Bachelor’s of Science in Systems Engineering from the University of Virginia.

    close

    Bruce Hart

    VP, Cyber Analytics

    close

    Eric Hildebrand

    VP, Technical Intelligence

    Join Our Team

    Learn how you can join our team and do work that matters on the next generation of cyber technologies.

    Learn More