ABOUT

i   sme - gLOBAL

2T

vISION

sTATEMENT

MISSION

STATEMENT

hISTORY

vISION sTATEMENT

The overall name of the I2T SME - Global represents three imperative model principles: which reflect the support of service management, protection & in-depth defense addressing all phases of Information Technology (IT)/Systems (IS) & Cybersecurity combined with Intel applicational disciplines and cleared HR Recruitment. 

 

In our overall key business philosophies, we strategize capabilities to engage world-class sets of Subject Matter Experts (SME’s) in Global High Tech Strategy IT/IS, & Intel Consulting model to build a framework think tank of elite technical problem-solving across DOD and the Commercial sectors of technical innovation. Delivering a visionary core practice of superior cutting-edge products, advanced technology services & addressing advanced critical challenges with fully comprehensive consulting responsive requirements to a quality business model plan.

Mission sTATEMENT

I2T SME - Global leverages integrity defined by excellence with talent, and communicative leadership through a process of effective client-focused commitments built on expertise, decades of operational experience showcasing advanced people diversity, management, and skills.  I2TSME - Global builds upon complex areas yielding advanced critical assessment thinking, to tackle the most complex of any business & technology issues.  Objectively tailoring, solving complex requirements & expanding capabilities using the latest in business acumen; as an executive presence of detailed analytics and technological processes in all areas of Civil, Commercial, US Government, and DoD strategic management execution.

 

I2T SME - Global, represents three echoed imperative model principles: Reflects the support of Service Management, protection & in-depth defense addressing all phases of Information Technology (IT), Info. Systems Security (IS) & Cybersecurity combined with Intel applicational disciplines; all applied by talented Cleared & Uncleared HR Recruitment. 

 

In our overall key business philosophies, we strategize capabilities to engage world-class sets of Subject Matter Experts (SME’s) in Global High Tech Strategy IT/IS, & Intel Consulting model to build a framework think tank of elite technical problem-solving across DOD and the Commercial sectors of technical innovation. Delivering a visionary core practice of superior cutting-edge products, advanced technology services & addressing advanced critical challenges with fully comprehensive consulting responsive requirements to a quality business model plan.

  • Dedication to the Mission

  • Higher Qualitative Valued Choices

  • Information Dominance in Technical Security

  • Inspired Teamwork & Work Ethic

  • Leadership Principles with Integrity

  • Professionalism in our Industry Profession

  • Quality Commitment to Excellence

  • Service Oriented

  • Safety & Care of Mission with Equality

History

I2T SME - Global focuses on a key theme, which expertly executes full-service management of solving identity access character management, internal threat awareness, target & systems detection, intrusion discovery detection & prevention, security incident management & internal execution with training will lead organizations to the highest defense methodologies & practices. I2T SME - Global articulated and stated goals; are keeping in concert with staying ahead of the common forward regulatory actions and provided consistent oversight and performance objectives. Strategic & Realistic issues benefit, define & articulate technical problems.

  • Build Joint Capabilities Technology Demonstration (JCTD)

  • Cybersecurity Services 

  • Executive Project Management 

  • Healthcare IT Services Management

  • Intelligence Direct Support

  • Management Consulting Services

  • Management Support Services

  • ​Science & Technology Solutions - Frameworks

  • Technical Training and Development Services

Overview Summary

I2T SME - Global overall competencies are key values of expertise teamwork, Agile requirements forging distinctive tailored proficiencies & providing an advanced integrated solution; benefiting a demanding greater & higher output of performance capabilities, policies & integration.  Leveraging our overall training, execution, realistic performance high standards: Management in strategic, advanced technical systems integration & Governance Security, Mgt. & Analytic Assessments.  I2T SME - Global provide a higher premium: Business strategies with a “Tailored Accuracy & Expertise”.

I2T SME - GLOBAL - Joint Functional Multi-Discipline, Cybersecurity, Info. Technology (IT) Network & Intel Subject Matter Expert (SME’s) & Technical Program Mgt. Leaders & Acquisition Professionals:

Core Competencies: 

  • 5G Transformation Combined w/ Planning of Data Networks, Processing & Dissemination of Internet of Things (IoT) Service Capabilities Integrated

  • 5G Site Configuration & Installation

  • Acquisitions Mgt., Education, Training & Simulations

  • Aerospace & Defense (Policy Prog. Execution, Technology Exploration of National Security Interest: Comms to R&D)

  • Army Cyber Operations Planner (N9)

  • Army Satellite Planner (3E)

  • Army Space Planner (3Y)

  • Business Intelligence (BI) Skills & Big Data (BD) Analytics

  • Cybersecurity/Cyber Threat Hunting

  • Cyber Threat & Info. Assurance (IA) Intelligence

  • Electronic Warfare Freq. Mgt. & ISR Tasking SME

  • Enterprise Architecture Planning/ Development Strategies

  • Incident Response/Handling & Systems Sec. Plans (SSP)

  • Innovation, Information Security & Info. Technology

  • Intrusion Analysis & Forensics

  • IT, IS & Cybersecurity Project Mgt. & Health IT Tech.

  • IT, IS & Cyber Training | Development

  • Networking/Routing, Protocols & Cloud Services

  • Operational Intelligence Strategic Planner

  • Problem Solving (Tech) & Analytics Proj. Assessments

  • Project Mgt. Experienced/Trained - Ret. Mil. Veteran Prof.

  • Recovery Sys | Data Protection and Risk Mitigations Plans

  • Risk Mgt. Framework (RMF), Governance and Resiliency

  • Routers/Switches/Firewalls & Network Monitoring

  • Security Data Protection, Information & R&D Event Mgt.

  • Signal Intel (SIGINT), Signal Telecomm. & Info. SME’s

  • Space & Electronic Warfare Cadre Technical Experts

  • Space ACQ & Systems Data Characterization Engineering

  • Strategic Team Consulting and Research & Dev. Mgt.

  • Targeting & Sensor Integration, Spectrum Management

  • Tech. IT/IPSEC, Info. Syst. & Cloud Architecture DevOps 

  • Technical Systems Integrator & Tech. Writer

  • Technical Writer & Direct Language Translations

  • Value Aid Sensing {All Risk Mgt w/Data Integrity Policies}

  • Platforms & Cloud Long-Haul Communications

  • Visionary Prog. & Project Mgt. w/ Strategic Assessments

  • Vulnerability Assessments, Cyber & Incident Responses

Commercial & Professional Military Certifications:

  • Certified Acquisition Mgt. Team Training (AMTT)

  • Certified Best Value Source Selection (BVSS)

  • Certified Business Financial Management (BFM)

  • Certified Contracting Off. Technical Repr. (COTR)

  • Certified Cybersecurity Command, Control, Comms., & Comp., Intel Surveillance & Reconnaissance (C4ISR)

  • Certified Earned Value Mgt.

  • Certified Enterprise Defender (GCED)

  • Certified Ethical Hacking (CEH)

  • Certified Executive NRO Prog. Mgt. Crs (ENPMC)

  • Certified Incident Handler (GCIH)

  • Certified Info. Syst. Sec. Professional (CISSP)

  • Certified Intrusion Analyst (GCIA)

  • Certified Joint DOD Firepower & Targeting Capabilities Spt to Tactical Air & Ground Threat Operations Engagement

  • Certified Leading the Acquisition Team

  • Certified Microsoft Server 2008, 2012R2 & 2016 (Active Dir., SQL, WSUS, SharePoint, SCCM, SCOM, & Exch.)

  • Certified Mgt. P-Shell, MS-Off. Suite, Linux Server Platform

  • Certified Mission Command Systems, Command Post of the Future (CPOF), NetApp SAN/NAS, Dell Power Vault

  • Certified NRO Congressional Budgeting Process (NCBP)

  • Certified NRO Prog. Mgt. Crs (NPMC)

  • Certified NRO Use of Advisory & Assistance and Organizational Conflicts of Interest (OCI)

  • Certified Penetration Tester (GPEN)

  • Certified Perimeter Protection Analyst (GPPA

  • Certified Windows Sec. Administrator (GCWN)

  • Continuous Service Improvement Activities (CSI)

  • Digital Network Intel (DNI) - Tracking Analysis

  • Information Technology Infrastructure Library (ITIL) Intermediate - Lifecycle Mgt.

  • North Atlantic Treaty Org. (NATO) Staff Officer

  • Project Management Professional (PMP)

  • Security Essentials (GSEC)

  • Service Design, Operation & Strategy

  • Service Transitions/ Benchmark Performance SME’s

  • Space & Telecom Segment Integrated Comms. Planning

  • Sr. Exec. Leaders Advanced Cryptologic CY500

  • Systems and Network Auditor (GSNA)

  • Weapons of Mass Destruction (WMD) Technical Threat Analytic Deterrence Planning SME

  • VMware vSphere 6.0 & 6.5, Cisco (Switching, Routing, Call Manager), ACAS, NESSUS, ForeScout, HBSS, & SPLUNK

cORE

cAPABILITIES

lEADERSHIP

Careers

Legal Consideration & Direction: The I2TSME - Global Exec. Leadership, as the authorship owns /retains full dedicated legal rights. I2TSME - Global

- Information Technology/Info. Systems (IT/IS), Cybersecurity & Intel Subject Matter Experts in Global Consulting:

5900 Balcones Drive Ste 100, Austin, TX 78731 | (888) 910-1918 | (USA) Office

Site HQ:

San Antonio & Austin Metro Office

2186 Jackson Keller Rd

Ste 1070

San Antonio, TX (USA) 78213

Site Pacific: 

Hawaii

1001 Bishop St.

Suite 2685A

Honolulu, HI (USA) 96813

Site Capital: 

District of Columbia

1717 N Street NW

STE 1

Washington, DC  (USA) 20036

Site West:

Northern SF

1267 Willis St.

STE 200

Redding, CA (USA) 96001

Site Alpha: 

Southern

300 Colonial Center Pkwy STE100

Roswell, GA  (USA) 30076

Site East:

Virginia

1900 North Quinn Str.

Arlington, VA (USA) 22209

Call: +1-888-910-1918

+1-703-214-7444

Copyright Infringement: Federal Copyright Statutory penalties are found at 18 U.S.C. § 2319. A defendant, convicted for the first time of violating 17 U.S.C. §  506(a) by the unauthorized reproduction or distribution, during any 180-day period, of at least 10 copies of data, or phone-records, or 1 or more copyrighted works, with a retail value of more than $2,500 can be imprisoned for up to 5 years and fined up to $250,000, or both. 18 U.S.C. §§ 2319(b), 3571(b)(3).

© 2020 by I2TSME - Global.