1 / 15

Corporate Overview June 27, 2007

Corporate Overview June 27, 2007. Agenda. Background Overview Key Competencies/Capabilities Contract Vehicles Contact Information. Background. IT Professional Services and Systems Engineering firm Founded in 1995 Headquartered in Tysons Corner, Virginia

amina
Download Presentation

Corporate Overview June 27, 2007

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Corporate Overview June 27, 2007

  2. Agenda • Background • Overview • Key Competencies/Capabilities • Contract Vehicles • Contact Information

  3. Background • IT Professional Services and Systems Engineering firm • Founded in 1995 • Headquartered in Tysons Corner, Virginia • Specializes in building complex information collection, transformation, and distribution solutions, • Enterprise portals, • Business intelligence systems • Secure high performance Web applications • The team boasts an average of over 15 years of experience with most people holding several certifications within their areas of expertise as well as many holding the highest level of security clearance for a civilian – TS/SCI w/life style polygraph.

  4. Overview • Clients and Past Performance: • Treasury – Forms Automation, SOA, Testing / IV&V, Program Management, Security C&A • NSA – Lean Six Sigma Black Belt Consulting and Training, Data Warehousing • Intelligence Community- Systems Engineering, Information Assurance, Program Management, INFOSEC, Network Engineering, Capital Planning, Enterprise and Service Oriented Architecture • GEICO – Object Oriented Technology Mentoring / Architecture / Design, Web Portal Design and Development, Smalltalk Design and Development, Chief Enterprise Architect • Clearances: • Secret • TS • TS/SCI • TS-SCI w/Full Scope Polygraph • Certifications: • TS Facilities Clearance • CISSP • PMP • Juniper • Cisco • Oracle • Sun (Java) certified personnel

  5. NAICS Codes • 541511 - Custom computer programming services • 541512 - Computer systems design services • 541513 - Computer facilities management services • 541519 – Other computer related services • 541611 – Administrative management and general management consulting services • 541618 - Other management consulting services • 541690 - Other scientific and technical consulting services • 611420 - Computer training • 611430 - professional management development training

  6. Key Competencies/Capabilities • Information Assurance-Secure Systems Design, Software Implementation/Quality Assurance, Risk Assessments, Auditing • Network Security- Multi Level / Cross Domain Security Solutions, C&A, Policy Guidance and Implementation, FISMA compliance • Lean Six Sigma Black Belt Consulting and Training • Content & Records Management- Forms Automation, Data Warehouse development and administration. • Service Oriented Architecture / Enterprise Architecture • Network Engineering

  7. Six SigmaBlackbelt • Assisted the National Security Agency with implementing past experience with their current needs. • Assisted in consulting, reinforcing, and applying the Lean Six Sigma tools and methods needed to accomplish the project team’s goals. • Ensured that the teams path to completion is clearly defined • Coach teams on development • Supports the team in project status reports • Aid in developing quantitative metrics • Ensure that the project case book and results are presented accurately. • Trained the agency’s staff on the DMAIC, (Define, Measure, Analyze, Improve and Control) model • Guided the agency's staff through each phase of the model to insure that the appropriate LSS tool (Infinity Diagrams, Decision Matrix, Project Charter, Value Stream Analysis, Fishbone • Highlights • New Streamlined Processes  (processing time reduced from 14 to 2 day after LSS) • Process Cycle time reduce by 50- 75% resulting in additional resources being available for mission requirements  • Organization Restructuring for greater efficiency  • Error rates for sensitive reports are cut in half    • On average, an Agency investment of 21 hours per week for a LSS team to fix a broken process • Savings of more that 500 hours per month.

  8. Information Assurance • Certification and Accreditation • Trained engineers and security professionals are experienced in all certification and accreditation standards to include NIST, DCID 6/3, DITSCAP, and commercial requirements. • Experienced in meeting the FISMA and Independent Verification and Validation (IV&V) requirements. • Security Auditing • Provide third-party NIST 800-53 Security Controls Assessments (SCA). • Security control assessment teams to ensure our test scripts and test plans meet all NIST SP 800-53 SCA guidance and supplemental guidance. • Continuity Of Operation Plans/ Disaster Recovery Plans • Establish COOP and Disaster recovery plans to meet all federal and commercial requirements • Conduct. • Development • Implementation • Testing • Training • E-Government • Provide E-Authentication and secure Enterprise Architecture Design to meet requirements • We can also provide Secure Service-Oriented Architecture along with design, implementation, and maintenance. • Incident Response • Provide policy development, consulting and training to meet any need of incident response requirements.

  9. Information Assurance (cont’d) • Penetration Testing • Blackbox and/or Whitebox penetration testing. • Consultation on penetration testing techniques along with policy training. • Physical Security • Facilities physical security • Third party physical security assessment • DCID 1/21 pre-SCIF evaluation • Risk/Vulnerability Assessments • Provide agency-specific or National level risk and vulnerability assessments. • Risk and vulnerability assessments following the NIST SP 800-26, NIST SP 800-30, NIST SP 800-53, and Critical Infrastructure Protection (CIP) guidelines. • Development of comprehensive security control assessments for desktops, servers, embedded devices, and mainframes. • Secure System/Software Quality Assurance • Ensure software and system designs meet National, Departmental, and Agency security standards for both classified and unclassified systems and software. • Hardening of completed the development of a system or software package using Commercial-Over-The-Shelf (COTS) products and NIST/NSA hardening guides to meet US Government security compliance. • Secure Network Design and Implementation • Design, implementation, and configuration of network and security devices. • Secure network designs are based on Defense-In-Depth Strategies and meet certification and accreditation requirements.

  10. Internal Revenue Service • Autograph Support Services Project • Began working with the (IRS) in July of 2003 to provide expertise in converting legacy taxpayer notices into more efficient and modern correspondence. • The work coincides with the continued modernization initiatives in the IRS’s Modernization & Information Technology Services (MITS) group. • The Wage and Investment Income (W & I) and Small Business & Self-Employed (SB/SE) operating divisions currently have over 200 notice designs that are used as the primary form of communication with taxpayers. • A large portion of the current notices are run using legacy processing and complicated software installations • Autograph Support Services Project is to convert the processing of these notices to Document Science’s Autograph suite of software. • By providing additional expertise and project analysis, the Compumatics team is assisting the IRS in working towards the elimination of two expensive software packages, to be replaced by a more efficient, fully integrated Autograph solution.

  11. Director of National Intelligence • Executive Officer • Provided support to the Office of the Director of National Intelligence (DNI) within the Chief Information Officer (CIO) organization reporting directly to General Myerrose (DDNI). • Reviewed technical documentation, • Developed technical briefings for Director level government staff • Managed IT projects within the organization. • Preparation of technical documents • Defined and implemented project planning techniques for visibility across various contracts • Leadership in Enterprise Architecture Deployment (LEAD) • Technical leader on the LEAD program • Key goal to move the Intelligence Community’s enterprise architecture initiatives forward, and facilitate the implementation of these best practices. • These results were developed and presented at annual symposiums hosted by the DNI CIO and shared among members of the LEAD community. • Responsible for identifying the most effective EA processes and practices that can be leveraged by the Intelligence Community and LEAD participants. • In addition, our staff performed Customer Relationship Management (CRM) both internal and external to the LEAD program to identify potential participants in the LEAD program.

  12. GEICO • Challenge • Expand information collected • To expedite insurance policy quotes • To improve future policy administration • Implement new 3-tier architecture • Replace integration layer • Enhance several application interfaces • Migrate to object oriented technology • Implement redundant & failover features • Organization development • Implement Rational Unified Process • Train developers in OO techniques • Compumatics Role • Led architecture design • Object frameworks & components • Functional migration plans • Staff training & development • Trained and mentored client’s staff • Results • New policy information domain model • Required information incorporated • Newly gained flexibility to expand the model • New architecture • Object oriented • XML, SOAP, and Web Services based • New application interface layer • Self-diagnostic capabilities • Automatic failover

  13. Intelligence Community • Challenge • Complex Data Migration Issues • New customer applications • Lead programmatic and integration efforts • Implement Program Management Process • Link requirements to testing activities • Confirm requirements compliance • Deployed Customer Elements needed an immediate cross domain transfer capability • Develop surge capability and process • Compumatics Role • Led all PM efforts • Budget preparation • Schedules and tests • Senior System Security Engineering support • Coordinated with various internal / external security organizations • Results • Plan developed and accepted • Including budgets & schedules • Implemented PMP across organizational boundaries • Surge capability implemented • Deployed Customer representatives stated “..the efforts advanced important operational coordination forward by leap years!”

  14. NSETS II (NSA) CIOSP-2 EAGLE (DHS) ITSS-2 (Army) HITSS (State) IRS PRIME GSA Alliant Seaport-E (Navy and Marines) DNI-CIO Encore II (DISA) AFSO21 (Air Force) TIPSS III (Treasury) Several with the Special Access Required Customer Contract Vehicles

  15. 8321 Old Courthouse Road, Suite 255Vienna, VA 22182 USATelephone:  (703) 748-4545Fax:  (703) 748-4550www.compumaticsgroup.com Contacts: President Dennis Laibson (703) 748-4545 ext 101 dlaibson@compumaticsgroup.com Vice President Patrick Jenkins (571) 218-0350 pjenkins@compumaticsgroup.com

More Related