it-solutions

It Solutions

Program & Portfolio Management

RELI delivers high-quality program management solutions offering a turnkey approach to building project controls, encompassing all phases of program planning through delivery. This includes project coordination, communication management, risk management, schedule and stakeholder management. Our PMO support is cross-functional and flexible enough to work within a traditional or agile environment. Our team of experienced program and project managers have industry recognized Project Management Professionals (PMP) Certification. Our team works with clients to successfully initiate, plan, design, execute, monitor, control, and close-out the mission critical activities that allow our clients to serve their constituents. Depending on our client’s nature of the project and needs, our services include:
  • Project Initiation, Planning, Execution, Monitoring and Controlling, and Closing
  • Effective Governance & Alignment
  • Program Assurance
  • Management & Integration
  • Financial Control
  • Communications
  • Risk Management
  • Quality Assurance/Quality Control
  • Performance Improvement
  • Assessment and Identification of lessons learned

System Integration and DevOps

RELI offers cost-effective, high-quality architectural integration of new systems with existing data sources, leveraging our expert understanding of healthcare systems and administration technology, information assets, organization structure, and existing agency infrastructure for our clients. Our expertise extends to major technologies, JAVA, .NET, HTML5 and SharePoint. RELI uses DevOps to meet client objectives through rapid iterative development and deployment. We leverage tool sets to support infrastructure automation such as product O&M support, Linux Server Maintenance in BDC, Verizon, and AWS. We provide our clients with End-to-End technology solutions with systems analysis, custom application development, database design and development, Software Testing and QA, Web development, and Mobile application development.

Requirements Engineering & Business Process Modeling (BPM)

By analyzing the underlying requirements and workflows, we apply a reengineered business process that considers people, processes, and technology to reduce inefficiencies. We define and outline business practices, processes, information flows, data stores, and systems, leading analysis and design calls with shared systems maintainers and providers, perform downstream system analysis, develop requirements documents and support release management.

Testing and Independent Validation & Verification (IV&V)

Leveraging the right testing practices is critical when building new application or performing operations and maintenance activities.  This enables early detection of defects prior to a production release and resulting in positive feedback and confidence in the solution.  RELI testing practices support a waterfall or agile environment while leveraging testing practices that support early detection of defects prior to product release.  Ensuring the product or enhancement meets customer requirements is our primary focus.  This includes functional and non-functional, but also integration, security and performance testing. These same practices are leveraged during IV&V.  Our technical experts can assist in reviewing source code, design documents, security to ensure alignment with organizational and federal guidelines. Whether we are the application developer or the IV&V contractor our goal is to ensure that customer requirements are achieved through delivering while adhering to regulations and budgets.

Privacy and Security

RELI holds a history of providing IA services to Federal health customers. We ensure confidentiality, integrity, and availability of data on critical applications & systems. RELI take a proactive approach to IA that ensures compliance with FISMA and allows our world class health and medical research customers to focus on their mission rather than IT. For example, RELI developed Privacy Impact Assessment within a period of 6 months, reviewing all security artifacts; perform patch management, security updates, and deploys vulnerability scanning software and tools within federal environments. We have experience defending information systems and networks by responding to computer security incidents, securing deployed systems, conducting vulnerability assessments and penetration tests, mitigating risk, and analyzing threats. With our experience we provide information technology security consulting services and solutions to ensure full security coverage for client’s organization IT infrastructure including logical, network, and physical security. Our services include:
  • Security Operations
  • Vulnerability Management
  • Application Security Lifecycle Solutions
  • Intrusion Prevention and Detection
  • Incident Response and Recovery
  • Network Security
  • Security Architecture
  • Risk Management
  • Security Impact Assessments
  • Risk Consulting Solutions
  • Privacy Act Compliance
  • Security Authorization (C&A)
  • Business Impact Analysis
  • Business Continuity
  • Disaster Recovery
  • Contingency Planning
  • Contingency Testing, Training, and Exercising
  • Privacy Impact Analysis (PIA)
  • Security Testing & Evaluation (ST&E)
  • Authority to Operate (ATO) package submission

Training and Facilitation

Use lean methodology, Kaizen, to convene an event with multiple stakeholders involved with clinical decision support (CDS), yielding improvements to adherence to clinical guidelines. We perform event organization and provide SMEs to facilitate workshops.