Systems Thinking & Solutions
Systems Thinking & Solutions
  • Home
  • About Us
  • Capabilities
  • CONTRACT VEHICLES
  • GSA STARS III
  • Join Our Team
  • Contact Us
  • More
    • Home
    • About Us
    • Capabilities
    • CONTRACT VEHICLES
    • GSA STARS III
    • Join Our Team
    • Contact Us
  • Home
  • About Us
  • Capabilities
  • CONTRACT VEHICLES
  • GSA STARS III
  • Join Our Team
  • Contact Us

Core Capabilities

Systems Engineering

Our systems engineers provide technical assistance for analyzing requirements, verifying that individual requirements have been met, and validating that the purpose of the system is achieved. We specialize in Model-Based Systems Engineering (MBSE) to create structured, data-driven representations of systems, processes, and services to enable seamless interoperability, enhanced traceability, and optimized performance. The logical model representations allow us to trace requirements to design elements; align functional activities with system capabilities; identify capability gaps and system interfaces; evaluate the implications of change requests across the enterprise; and maintain configuration control. We have significant system architecture experience using a variety of languages, tools, and frameworks.


Our capabilities include:

  • Systems Integration.  Designing and managing integrations between third-party applications and internal microservices-based architectures in classified government cloud environments (AWS GovCloud, C2S, Azure Government).
  • System Architecture.  Defining system requirements, interfaces, and behaviors using SysML, UML, BPMN, DODAF, Business Enterprise Architecture, and MBSE tools such as Cameo, MagicDraw, Enterprise Architect, and Innoslate.
  • Continuous Integration and Continuous Delivery (CI/CD). Implementing DevSecOps principles, CI/CD pipelines, and automation tools (Ansible, Jenkins, GitOps) to streamline deployments and enhance system reliability.
  • Verification & Validation.   Developing and executing system verification and validation tests to ensure all requirements are met and the system performs as intended. 

Modeling & Simulation

We use advanced modeling and simulation techniques to explain, predict, and visualize system behavior. Our capability provides a virtual sandbox to explore operational scenarios, perform what-if analysis and repeat decisions many times while considering hundreds of variable and assumption combinations. We Transform complex data into interactive dashboards, and real-time visual simulations to enhance stakeholder understanding, facilitate communication, and improve situational awareness. The accuracy and credibility of models and simulations is ensured through rigorous verification, validation, and accreditation (VV&A) processes to maintain fidelity and trust. The computational nature of the simulations allows scientific experiments to be conducted from which inferences and insights can be derived to answer questions and inform strategies 


Our models support:

  • Strategy Development. The models serve as a canvas to formulate strategies and act as a quantitative translation of the qualitative stakeholder concerns. Multiple versions of strategies can be merged into a single model reflecting the collective understanding of the intended strategy.
  • Strategy Exploration. Virtual environments allow the strategist to explore the full range of possible outcomes. Positive and negative behaviors emerge during the exploration phase and the potential unintended consequences of a strategy are illuminated.
  • Strategy Exploitation. The model can be made available to strategists across the enterprise through a user experience (UX) platform. Users can exploit the model by 1) accessing and viewing existing simulation data, 2) running their own experiments and performing analyses and 3) creating dashboards to share and compare outcomes.

Decision Analysis and Risk Management

Our analysts create quantitative models to help decision makers navigate the complexities of selecting the best alternative while balancing multiple objectives and uncertainties. We provide support for data-driven decisions and risk management using net present value investment analysis; Bayesian inference models of uncertainty; rational decision-making principles; decision trees; influence diagrams; solving value hierarchies; analyzing the value of information; incorporating risk attitudes; and conducting Monte Carlo sensitivity analysis. Our analysts apply these advanced skills to characterize the organization’s / decision maker’s attitude toward risk; create risk profiles for each decision alternative and make decisions that optimize objectives based on predicted outcomes and uncertainties.

Business Analysis Support

We support our customers with a comprehensive set of analytical capabilities. Our analysts transform raw data into meaningful information that provides insight into an organization's processes, products, and services. For example, we develop performance management plans to establish a baseline from which improvements can be measured. The performance management plans are derived from a framework of technical performance measures that are based on program objectives, are aligned with strategic plans, and respond to statutory and regulatory requirements for Information Technology (IT) investments. We analyze metrics results, identify opportunities for improvement, and manage corrective action plans. In addition to analyzing metric results, we perform ad-hoc queries and analysis of program and system performance to support data calls and continuous improvement efforts. Other analytical support services include lifecycle cost estimates (LCCE) models; business case development; earned value analysis, budget and spend plan analyses; program implementation /execution earned value analysis. 

Six Sigma and Business Process Reengineering

Identification of waste, non-value-added activities, and service/product variation are opportunities for improvement and gateways to innovation. Our Six-Sigma/Lean Six-Sigma Black Belts analyze the most complex processes, services, and products; and identify the best opportunities to close process gaps, eliminate unnecessary redundancies, and establish controls to maintain improvements. Our approach integrates data analytics, performance management, and a host of six sigma / lean six sigma methods that enable our team to deliver continuous process improvement (CPI) and Business Process Reengineering (BPR) for our clients.

Enterprise Software Maintenance

STS maintains software using tools to create command-line programs that automate repetitive tasks and configure software applications according to service request tickets and security guidelines. Typical examples are the Security Technical Implementation Guide (STIG) requirements, removal of unauthorized functionality, setting configuration values to eliminate the need for users to customize settings. We use Microsoft System Center Configuration Manager (SCCM) and Tanium to patch both the operating system as well as third-party applications. Application Deployment Toolkit, PowerShell, or MSI installer are used with SCCM or Tanium deploy functions to install the source files and provide detailed logs for troubleshooting. 

Cyber Security

STS proactively prevents the exploitation of endpoint vulnerabilities by regularly working with the Computer Emergency Response Team (CERT) to mitigate risks identified through compliance scans, vulnerability alerts, and security guidelines. We participate in security inspections, perform Tanium Threat Response network scans, use Security Technical Implementation Guide (STIG) viewers to monitor STIG updates, and search for vendor security alerts. We provide the initial security baseline for all newly imaged systems using a locally applied copy of the STIG Group Policy objects (GPOs) to ensure that every computer meets DISA's security requirements as soon as it is imaged.

Technical Program Management

STS has significant experience supporting Program Management Offices (PMO) in the application of Acquisition Category (ACAT) processes following DODI5000.02/.75 acquisition guidelines for information technology capabilities. Our specialists tailor the acquisition process to fit program objectives; create acquisition documents and milestone decision packages; develop detailed work breakdown structure project management plans; maintain an integrated master schedule; identify risks and manage mitigation action plans; prepare program status briefings; and facilitate the acquisition lifecycle process. STS follows the Project Management Institute’s standards for managing projects and programs throughout their life cycle. Our certified scrum masters (CSM) and project management professionals (PMP) know how to use Scaled Agile Framework (SAFe) and other best practices to streamline projects and optimize schedules while meeting cost and performance objectives.

CAPABILITY STATEMENTS AND BRIEFINGS

A summary of our capabilities and past performance. 

STS CapabilityStatement (pdf)Download

Copyright © 2022 Systems Thinking & Solutions, Inc. - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept