Information International Associates (IIA) employees over 600 information & data systems designers, developers, data scientist, cybersecurity experts, S&T professionals, and mission specialists serving government agencies with data-intensive missions from our offices in McLean, VA, Alexandria, VA, Oak Ridge, TN; Morgantown, WV, and Dayton, OH. IIA leverages expertise in information & data management, big data analytics, the innovative application of technology, and deep subject matter expertise to provide unique value for our customers' big data challenges. We have developed a keen understanding of the role of data within and between organizations and how to unlock the potential of data as a strategic resource.
IIA provides total life cycle support for enterprise information technology (IT) and large-scale data management. From architecture and design, to agile development, cloud migration, and operations & maintenance, IIA brings world-class expertise and innovation to critical federal IT systems.>
IIA has a proven track record of leveraging Agile software development principles and values to rapidly develop, operate, and maintain applications and mission-critical systems. Our overall DevOps/DevSecOps approach integrates Agile development methodologies with automated collaboration, deployment and testing processes to streamline the delivery quality of software and ensure alignment with organizational goals.
IIA consistently delivers robust infrastructure and data center design, development, operations, and maintenance services through the application of best industry practices, including ITIL, ISO, and CMMI standards. Our engineers and technicians support the full spectrum of legacy, hybrid, and cloud platforms from high performance computing systems (HPC) and hyperscale Big Data systems to enterprise data centers, data warehouses and local databases. We develop automated tools and methods to provide efficient, consistent, and cost-effective delivery of services and scan emerging technologies to find additional capabilities to inject. We provide solutions to enhance management visibility into the enterprise through customized single pane of glass reporting and monitoring dashboards. IIA has a successful track record in the design, implementation, and execution of disaster recovery for individual services and entire data centers. IIA supports our customers in achieving their Data Center Optimization through data center consolidation, stabilization, migration, and process re-engineering.
IIA is cloud vendor agnostic so we are an honest broker of cloud migration, development, and operations services to the federal government. Our approach not only gets the best deal for the customer today, but ensures the availability of future migration pathways by avoiding the vendor “lock in” that adds costs and stalls innovation. We evaluate the readiness of organizations to move workflows and services to the cloud from a technical, organizational, and cost-benefit perspective. We assist the customer in determining the optimal mix of on-premise, hybrid, and public cloud services to meet current and future needs efficiently. We evaluate the best path forward from virtual machines to microservices and serverless functions. IIA provides overall architecture and application re-design and migration guidance to optimize the use of SaaS, PaaS, IaaS, and FaaS services.
IIA provides the full range of end-user solutions and support services. We design, develop, test, deploy and manage user applications, mobile apps, Internet of Things (IoT), blockchain-based systems, and user interfaces. We manage end user computing, virtual desktop infrastructure, and mobile devices. We ensure configuration management and security compliance. We develop Tier 0 user support systems such as Wikis and ChatBots, provide onsite and virtual Tier I-III help desk and user support, as well as manage Tier IV vendor interactions. Our team develops and automates ITSM and RPA solutions to meet customer needs on both the BMC Remedy and ServiceNow platforms.
Data Analytics for national mission sets is an IIA core competence. We support federal decision making by analyzing structured, semi-structured, and unstructured data that has the potential to be mined for actionable intelligence. We enable access to and analysis of large and complex data sets to improve and optimize decisions and performance. We develop algorithms and artificial intelligence systems to identify potential fraud and misuse in large volumes of financial and tax transactions, resulting in the recovery of substantial funds and revenue. We develop algorithms and machine learning systems to sift through petabytes of internet and Dark Web data for cyber security and critical infrastructure protection applications. Our solutions are mission/user driven and leverage an integrated team of user domain experts (e.g., intelligence, finance, and fraud analysts, and S&T researchers ) with our data scientists and enterprise data management engineers to deliver optimal insight and actionable intelligence.>
IIA works across the information life cycle to pull wisdom, knowledge, information, and insight from data. Our data scientists and decision support analysts improve management decisions and operational effectiveness, advance science, and support technology development. We address the challenges of the volume, variety, velocity, and veracity of large, complex data. We understand big data issues that include identifying, capturing, validating, curating, and storing big data. We pay attention to the critical issues of data confidentiality, data culture, and reproducibility.
Data is exploding exponentially. IIA identifies, captures, validates (quality checking), curates, and stores this data. We apply data analytics and advanced analytical tools to uncover hidden patterns and discover knowledge within the data, knowledge that is not easily obtained through human brain processing alone. New and rapidly evolving AI, machine learning, and deep learning algorithms are applied to this data to enable faster, better decision making and reveal unprecedented insights. IIA pays close attention to key issues in data confidentiality (PII and HPII), Intellectual property, data culture, and reproducibility.
We offer a full lifecycle of services, from, in, and around data analytics from Consultancy to Deployment (C2D), Objectives Analysis, Data Readiness Assessment, Data Governance, Data Policy Strategies and Data Management as a Service (DMaaS), to enterprise and mission applications design, development, deployment, support, and operations.
IIA embeds computational thinking in all our enterprise architectures and mission solutions. We understand the state-of-the-possible in analytics and the opportunities available to exploit data in support of improving management decisions, identifying threats in physical and cyber space, and advancing scientific discovery and technology development. We live and operate across the information life cycle to provide value from data.
IIA subject matter experts, scientists, technologists, and linguists understand the importance of methodically and systematically applying domain and mission expertise to our customers' most important data exploitation challenges. With this mission understanding, we mine, translate, and contextualize global information sources and integrate them with other data sources to form strategic, operational, and tactical perspectives to inform federal decision making and investments. Leveraging our domain experts and analytics capability IIA is adept in Multi-INT Analysis. Leveraging our S&T pedigree we have a particular competency in collecting, managing and harvesting Scientific and Technical (S&T) Intelligence.>
The world is awash in an ocean of open source structured, semi-structured, and unstructured data. This creates a “target rich” environment for our in-house team of intelligence analysts, data scientists, subject matter experts (SMEs), trade-craft specialists, scientists, and technologists. We locate key information and provide analytical support for addressing critical mission and strategic collection needs. We provide the full range of open source research, all-source intelligence analysis, training, database development, policy and strategy development, in-country research, language services, and assessments to help government entities find scientific, technical, operational, and policy solutions that fortify, strengthen, and protect the nation’s security apparatus, critical infrastructures, and economic competitiveness.
We have a deep and rich heritage in Scientific and Technical Information research and analysis, conducting open source research and analysis of foreign military capabilities and systems, CBRN, physical science, WMD, engineering, space, missiles, trade and critical infrastructure. This capability runs across many contracts in our company – wherever and whenever our customers have a need to hone in on the collection and analysis of large and complex S&T data sets.
IIA has completed medical capability assessments for over 100 foreign countries and supported the DoD and U.S. government with critical medical intelligence. Our extensive research includes topics ranging from infectious diseases, blood safety, medical infrastructure, vaccines and quality of healthcare professionals to traditional medicine and socio-cultural issues impacting healthcare. IIA socio-cultural assessments are comprised of historical, socio-cultural, and ethnographic data that is combined with in-country field research and interviews with subject matter experts from academic, policy and government organizations. Our method employs open source information derived from traditional published, electronic and grey literature. IIA researchers employ leading-edge data mining, entity extraction and advanced visualization tools to produce comprehensive analyses.
IIA is proud of its junior, mid, and senior-level analysts with advanced degrees in science, technology, engineering and mathematics (STEM) and operational experience and capability in general military intelligence (GMI). We work in coordination with analysts and decision makers and are often embedded with the organization we support whether located CONUS or in forward-deployed regions throughout the world. We are able to provide 24/7 support to operations and have expertise in All-Source intelligence to include SIGINT, MASINT, IMINT, OSINT, HUMINT and GEOINT.
IIA delivers native foreign-language speakers who are proficient in English to provide English language abstracting and translation support and analysis to our OSINT and S&T projects. Many of our linguists have advanced science and technical degrees, which provides our customers with increased analytic expertise.
Information assurance, cyber security and threat intelligence is a big data problem. We integrate the disciplines of information assurance, cyber security, threat intelligence, data management, and data science to protect programs, information, networks, digital assets, intellectual property, and critical infrastructures. Our team of data scientists and cyber security specialists has over five decades of experience working in some of the world’s most demanding cyber environments continually serving customers employed on the front lines of national security and critical infrastructure protection operations. We take a sweeping and pre-emptive approach to cyber operations and are world leaders in internet and Dark Web mapping and cyber threat hunting.>
IIA provides a full range of information assurance and security services for our customers. We integrate industry-leading technologies to provide defense in depth and a 360-degree situational awareness view throughout the enterprise. Our team performs such tasks as security architecture design, security systems engineering, SOC operations, program protection, security analytics, incident response, and forensic investigation services to ensure our customers remain secure.
With the volume of data increasing exponentially, state-of-the-art cyber tools are only a fraction of the answer to detecting, identifying, analyzing, and countering cyber threats. The success of any cyber defense program depends on trained IIA analysts teamed with IIA data scientists who understand cyber operations trade-craft, state-of-the-possible technology, industry trends, and unique Federal missions. IIA leads the way with big data, machine learning-enabled cyber analysis support services, tools, and techniques to help fill the gaps in cyber and threat intelligence operations. Our team is trained using the latest cyber and analytics technology and is seasoned and well versed on the latest threats, mitigation strategies, and defense-in-depth approaches. As part of our support, we also can train, or assist in training, your staff to high levels of cyber proficiency and readiness.
With Wikileaks and recent retail organization hacks, large amounts of credit card and personal data have been leaked to the Dark Web. Before this, few people understood or even knew what the Dark Web was. IIA cyber professionals offer a very focused Dark Web monitoring service that will immediately notify you if any of your Agency (or personal) data is found on Dark Web or if staff are uploading or downloading files. Details are provided as to what was found, when, and where it was found. The level of granularity and frequency of the monitoring is determined by the mission requirements of the Agency, and their unique missions.
Across the government and industry organizations confront the same kinds of questions every day: “have I been breached?” or “what is my risk to ransomware?” Some organizations don’t ask these questions until it is too late. Built on over five decades in the industry, IIA cyber professionals have developed a comprehensive report: Passive Perimeter Evaluation (PPE). The PPE is the equivalent of a security “credit score” for an organization. It is low-profile, discrete, and delivers invaluable security insight without interrupting your mission or business operations. The PPE covers all major areas of concern: Dark Web exposure, compromised data, ransomware exposure, potential for data loss, and network perimeter exposure.
IIA provides full service disaster recovery and digital forensic analysis, whether the disaster is natural or human caused. While it’s difficult to fully prepare a business for the unexpected data breach or cyber-attack, having a trained Cyber Incident Response Team (CIRT) and incident response plans can be the difference between business success and failure to fully recover. We help companies build their business continuity plans from the ground up, many times with little or NO starting point of a base document. It’s not a matter of “IF” a company will be breached or lose data… it’s “WHEN.” …and when that day happens, the successful companies are the ones with a recovery plan to protect their Intellectual Property (IP). …or “Crown Jewels.”
We often engage new customers through approved Passive Network Assessments (PNAs), which we offer as a low-cost alternative to penetration testing. PNAs evaluate the current state of an organization’s network security in its current environment. Through a methodical, macro-to-micro approach, we identify problem areas, such as misconfigurations, pinholes, vulnerabilities, gaps in technology configuration, and misaligned resource utilization. We evaluate the network’s ability to support the current and future requirements of the organization and identify potential points of compromise. We build your staff up through information sharing, collaboration, and training.
We assess systems with a combination of open source, commercial, and proprietary tools to identify security vulnerabilities of external-facing systems, internal networks, or both. We perform active-attacks to confirm the existence of vulnerabilities and reduce false positives. We actively exploit vulnerabilities to compromise systems and attempt to expand the attack through privilege escalation and launching attacks on other systems. We target systems at the network and/or application layers, as well as other external access points including modems and wireless LANs. We prioritize vulnerabilities and author detailed reports with specific remediation instructions.
We define an enterprise approach for assessing, prioritizing, managing, and monitoring security risks. We define the desired end-state for security and identify gaps from the current state. We establish short and long-term plans for achieving the end-state. We establish a business-driven governance process for the information security program. We help define security risk tolerance posture for the organization and an approach for making cost-benefit decisions with respect to accepting security risk. We socialize with leadership to achieve senior executive and board awareness and buy-in.
We will guide you through drafting a suite of security policies, procedures, and standards that are customized to the specific needs and risk posture of the organization. We clarify roles and responsibilities for key security control requirements and identify mechanisms to demonstrate compliance and measure and report violations.
IIA is engaged at the forefront of Federal engineering, science and technology with dozens of PhDs in a wide variety of STEM fields. We understand the critical need for integrating expertise with data analytics and visualization, high performance computing, and large-scale scientific and technical data management. We understand that the R&D community is very different from the operational community, but also the critical need to bridge these communities in order to deliver the advanced technologies and capabilities that will keep the Nation secure, the economy strong, and our energy infrastructure productive.>
Science and technology (S&T) is core to our national security, energy assurance, and global competitiveness. Our scientists, engineers, researchers, and technologists support our customers in the discovery of new and innovative approaches and methods. Many on our team have advanced degrees, including dozens of PhDs. Our staff specialize in areas such as energy conversion engineering, materials engineering and manufacturing, geological and environmental systems, chemistry, energy analysis and modeling, systems engineering and analysis, computational science and engineering, R&D program and project management, techno-economic analysis, biometrics, medical assessment, and life-cycle analysis. For example, we offer a core set of mission-oriented S&T services and solutions that directly addresses the most pressing needs of our Nation’s energy infrastructure including advanced energy delivery and security from cyber and emerging threats. We bring the domain expertise and research credentials necessary to support our customers complex engineering and S&T data intensive programs dealing with today's and tomorrow’s national security and energy assurance initiatives.
The Chemical, Biological, Radiological, Nuclear and Explosive (CBRNE) weapons of mass destruction (WMD) threat is an omnipresent, data-intensive problem that requires S&T expertise in addition to data analytics and intelligence expertise and experience to address. We provide scientist, engineers, chemists, innovative analytics technology, and mission know-how in the areas of Chemical, Biological, Radiological and Nuclear Defense (CBRND) and Countering Weapons of Mass Destruction (CWMD). We support decision makers ranging from those charged with our Homeland Defense and Homeland Security to the Chairman of the Joint Chiefs of Staff’s (CJCS) Joint Requirements Office (JRO). We bring expertise ranging from the technologies involved and counter-proliferation, through CBRND operational and risk analysis.
IIA brings a vendor-neutral, systems integration approach with technical and operational expertise in identity management and biometrics tools and systems. We have hands on experience integrating technical systems, business processes, policy, and change management imperatives when implementing biometrics solutions ranging from classified facility security though cyber insider threat applications. Because we can leverage an integrated team of data scientist, cybersecurity professionals, security experts, and project management professionals, we can customize solutions tailored to specific mission set requirements. Moreover, we have the experience and breadth to help agencies with their technology decision and implementation process and through any organizational changes or work-flow modifications. We understand and can support agencies through the intricacies of the full biometrics lifecycle, fully harnessing the power and potential of this technology.
Supporting Oak Ridge National Laboratory and the Department of Energy for over 30 years, S&T is our pedigree. Our team of in-house engineering, science, and program experts bring a comprehensive breadth and depth of experience and subject matter expertise to manage and execute large-scale research and development (R&D) for the science and technology (S&T) community. We combine subject matter expertise in S&T with our data scientist, enterprise data management, and program management specialists to address and solve complex research challenges in a managed and structured approach. We cover S&T strategic planning, large-scale R&D program management, technology maturation lifecycle, technical readiness levels (TRL), system readiness assessment (SRA) frameworks, R&D program planning and strategy, lifecycle analysis, complex techno-economic analyses and modeling of emerging technologies to determine the value, benefit, and risks associated with the technology across economic, environmental, and mission drivers. Knowing the importance of people when dealing with S&T breakthroughs, we also bring expertise in organizational change management to identify changes proactively, determine scope and impact of changes, define communication methods, and ensure training of affected personnel to maximize the potential of technology and to reduce risk. We are an integrated partner throughout the full R&D life-cycle, from discovery through commercialization.