Information Technology


Project Management

TAMARACK provides high-character and knowledgeable Project Management and Acquisition experts well versed in all facets of the acquisition life cycle. Our team will provide collaboration with internal and external stakeholders seamlessly while addressing our clients’ most challenging concerns to ensure program success from strategy development to risk management and solution delivery. Specifically, we engage with Program Managers to assess current state, decide on priorities, execute to plan, perform within cost and schedule, and traverse the program life cycle. From strategy development through solution delivery to optimized synchronization, collaboration, and communications, we are well-postured to solve the most complex government business challenges. Our experts pride themselves on thorough planning and communication with stakeholders through each program stage to stay on time, and within budget. 


Information Assurance

TAMARACK delivers support services from Categorization to Authorization (C&A), Assessment and Authorization (A&A) and Continuous Monitoring sustainment utilizing the NIST Risk Management Framework (RMF) to achieve an Authority to Operate (ATO). We provide professional knowledge and experience to leverage current Federal Information Processing Standards (FIPS) and Special Publications (SP): SP800-18, SP800-37, SP800-53, SP800-53A, SP800-60, FIPS-199, FIPS-201 and FIPS-140-2, utilization of the DISA Security Requirements Guide (SRG) and Security Technical Implementation Guides (STIG)


Cybersecurity

TAMARACK ensures support of Cybersecurity domains of Application, Network, Critical infrastructure, Disaster Recovery and Business Continuity planning (DR & BC), Internet of Things (IoT), and Cloud securities. Our Cybersecurity services are geared to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access. We employ various processes, methods, and technologies to protect all organizational assets from the loss of confidentiality, integrity, availability, internal and external threats, as well as disruptions due to natural disasters.

Share by: