We provide technical support ranging from basic Tier 1 desktop issues to the most complex Tier 4 issues that require collaboration with 3rd party vendors. We have the right level of technical support to classify, analyze, and resolve IT incidents and service requests. Our System Administrators have deep working knowledge of computing devices (workstations, servers, thin/zero clients, smartphones, tablets, etc.) and how they interface with non-classified and classified network architecture. Our certified IT professionals use the latest software tools like Microsoft SCCM, Tanium, VMware, Citrix, Microsoft SQL, WDM/Wyse Management Suite (WSM), Citrix Remedy, Jira, and best practices like ITIL and DoD ITSM to minimize downtime, protect networks, and perform a host of IT services (virtualization, cloud computing, enterprise email, data storage/recover, portable computing, software distribution, and cyber security). Our team of IT specialists deliver support by phone, e-mail, on-site or remote, and if necessary, we are available 24x7.
STS maintains software using tools to create command-line programs that automate repetitive tasks and configure software applications according to service request tickets and security guidelines. Typical examples are the Security Technical Implementation Guide (STIG) requirements, removal of unauthorized functionality, setting configuration values to eliminate the need for users to customize settings. We use Microsoft System Center Configuration Manager (SCCM) and Tanium to patch both the operating system as well as third-party applications. Application Deployment Toolkit, PowerShell, or MSI installer are used with SCCM or Tanium deploy functions to install the source files and provide detailed logs for troubleshooting.
STS proactively prevents the exploitation of endpoint vulnerabilities by regularly working with the Computer Emergency Response Team (CERT) to mitigate risks identified through compliance scans, vulnerability alerts, and security guidelines. We participate in security inspections, perform Tanium Threat Response network scans, use Security Technical Implementation Guide (STIG) viewers to monitor STIG updates, and search for vendor security alerts. We provide the initial security baseline for all newly imaged systems using a locally applied copy of the STIG Group Policy objects (GPOs) to ensure that every computer meets DISA's security requirements as soon as it is imaged.
STS has significant experience supporting Program Management Offices (PMO) in the application of Acquisition Category (ACAT) processes following DODI5000.02/.75 acquisition guidelines for information technology capabilities. Our specialists tailor the acquisition process to fit program objectives; create acquisition documents and milestone decision packages; develop detailed work breakdown structure project management plans; maintain an integrated master schedule; identify risks and manage mitigation action plans; prepare program status briefings; and facilitate the acquisition lifecycle process. STS follows the Project Management Institute’s standards for managing projects and programs throughout their life cycle. Our certified scrum masters (CSM) and project management professionals (PMP) know how to use Scaled Agile Framework (SAFe) and other best practices to streamline projects and optimize schedules while meeting cost and performance objectives.
Our systems engineers provide technical assistance for analyzing requirements, verifying that individual requirements have been met, and validating that the purpose of the system is achieved. We use a Model Based System Engineering (MBSE) approach to create logical data representations of systems, processes, services, and products across the business enterprise. The logical model representations allow us to trace requirements to design elements; align functional activities with system capabilities; identify capability gaps and system interfaces; evaluate the implications of change requests across the enterprise; and maintain configuration control. We have significant architecture modeling experience using a variety of languages, tools, frameworks, processes, and approaches. Our experience includes Systems Modeling Language (SysML) / Unified Modeling Language (UML), Department of Defense Architecture Framework (DODAF), Business Enterprise Architecture, No Magic Cameo, and MEGA. Our MBSE approach is consistent with the Unified Architecture Framework (UAF) and provides an ontology that supports collaboration and encourage innovation. We create value and technical advantage for our customers by integrating our MBSE approach with other capabilities and processes (quality management, configuration management, program management, continuous process improvement, and risk management).
Identification of waste, non-value-added activities, and service/product variation are opportunities for improvement and gateways to innovation. Our Six-Sigma/Lean Six-Sigma Black Belts analyze the most complex processes, services, and products; identify the best opportunities to improve performance, reduce variation, and eliminate waste. Our approach integrates data analytics, performance management, DOTMLPF-P, and a host of six sigma / lean six sigma methods that enable our team to deliver continuous process improvement (CPI) and Business Process Reengineering (BPR) for our clients.
We support our customers with a comprehensive set of analytical capabilities. Our analysts transform raw data into meaningful information that provides insight into an organization's processes, products, and services. For example, we develop performance management plans to establish a baseline from which improvements can be measured. The performance management plans are derived from a framework of technical performance measures that are based on program objectives, are aligned with strategic plans, and respond to statutory and regulatory requirements for Information Technology (IT) investments. We analyze metrics results, identify opportunities for improvement, and manage corrective action plans. In addition to analyzing metric results, we perform ad-hoc queries and analysis of program and system performance to support data calls and continuous improvement efforts. Other analytical support services include lifecycle cost estimates (LCCE) models; business case development; earned value analysis, budget and spend plan analyses; program implementation /execution earned value analysis.
Our analysts create quantitative models to help decision makers navigate the complexities of selecting the best alternative while balancing multiple objectives and uncertainties. We provide support for data driven decisions and risk management using net present value investment analysis; Bayesian inference models of uncertainty; rational decision-making principles; decision trees; influence diagrams; solving value hierarchies; analyzing the value of information; incorporating risk attitudes; and conducting Monte Carlo sensitivity analysis. Our analysts apply these advanced skills to characterize the organization’s / decision maker’s attitude toward risk; create risk profiles for each decision alternative; and make decisions that optimize objectives based on predicted outcomes and uncertainties.
Models help us understand system behaviors and how they relate to other systems and environments. We are experienced with building models and using them to explore "what if" scenarios to gain insights into system challenges. Our engineers and architects are proficient at using quantitative and qualitative modeling methods including Systems Modeling Language (SysML) / Unified Modeling Language (UML), Department of Defense Architecture Framework (DODAF), business process modeling notation (BPMN), agent based modeling, system dynamic simulation, causal loop diagrams, risk and decision analysis, lifecycle cost estimates (LCCE), multiple regression analysis, among others. We use our modeling proficiency to provide our clients with the information they need to manage the enterprise and make more informed decisions.
Copyright © 2017 Systems Thinking & Solutions, Inc. - All Rights Reserved.