
Cybersecurity
Cybersecurity (CY) demands are very fluid in the operational environment. New vulnerabilities and exploits are discovered and propagated daily. Customer directives prompt immediate changes to processes, production systems and documentation. We believe that the key to rapid response in dynamic operating environments is maintaining security management process discipline.

IT Service Management
IR Technologies applies the agile development process Scrum to development projects. Scrum is a proven agile development approach used by industry and is managed within the context of the larger PDSS effort by ITIL and CMMI processes. Our development methodology is composed of phases including requirements analysis, design/specification, implementation (coding), testing, deployment, documentation, maintenance, training and support.

Software Implementation & Integration
IR Technologies uses robust processes and automated tools to distribute and integrate software within an organization. Our ITIL based methods ensure that software implementation is aligned with business requirements and provides value to our customers. The IR Technologies process is transparent to our clients, with full visibility and accountability in each step.

Data Engineering & Quality Assurance
At IR Technologies we understand the value of practicing a holistic approach to engineering and managing data as a strategic asset across the enterprise. IR Technologies considers the following guidelines in developing a portfolio view of data

Custom Training Development & Delivery
In 2010, IR-Tech was the support contractor for Global Combat Support System -Marine Corps training, which required the development, delivery, and maintenance of 34 courses, as well as hundreds of system simulations and training aids. Additionally, the training material had to stay current with enterprise systems (and government policies) that are constantly evolving.

Acquisition & Program Management
IR Technologies deftly maneuvers information technology (IT) programs through the DoD 5000 acquisition process. As experienced practitioners in the world of IT acquisition, we employ an initiative and risk-based approach that mitigates and manages the common and not so common pitfalls procuring technology in the government.