TCC Seeks a Program Director

Posted by Kelly Grant, TCC Senior Technical Recruiter

Type: Contract
Term: 3 months initial term with probable long-term extension
Location: Hamilton, New Jersey  – remote option with 2-3 days onsite minimum

Job Summary:

The Program Director will provide senior-level leadership and operations management for a major software development project.  As Program Director, candidate will be charged with implementing a governance and client engagement strategy that promotes strategic implementation of technical and business solutions to meet the client’s vision, objectives and funding requirements. The job requires cross-departmental leadership and support to an internal team of TCC professionals who work together with the purpose of implementing high-quality technical and business solutions our state government client.

Essential Functions:
• Consult, coordinate and serve as Liaison with client Executive Sponsors on matters of strategic direction, short and long-term objectives and project performance
• Serves as an escalation point for the client’s Senior Leadership team
• Communicate and direct work across the TCC Technical Team, TCC Call Center and outside vendors, as prioritized and authorized by client
• Implement project and data governance structures, processes and communication protocols with fidelity
• Plan agenda and lead Executive Sponsor meetings
• Implement Project Increment Planning process with support from the Senior Architect and Project Managers
• Develop and maintain a Program Road Map to provide a basis for common understanding amongst all stakeholders as to the priorities and schedule for future work
• Manage risks, deliverables, system quality, budget and schedule
• Establish client reporting protocol to include contract deliverable status, data quality performance metrics and fiscal status
• Oversee outside subcontractors with support from TCC Contract Compliance Office and Project Coordinator
• Review and approve invoices to client
• Participate in internal project meetings, such as:  Scrums, Contract Compliance Committee, Weekly Project Status
• Be available at client site on a routine basis
• Accurately record and approve others time in on a daily basis

Competencies
• Acts as a Change Agent using influencing and negotiation skills.
• Exercises creativity and independent judgment to deliver functional and technical expertise
• Builds strong interpersonal relationships
• Exercises business acumen in selecting methods and techniques to deliver functional and technical solutions.
• Identifies and speaks to factors that affect transactional performance, throughput, and scalability.
• Acts with Professionalism and Integrity and accepts Accountability
• Displays a High Level of Commitment, takes Initiative, and inspires a Shared Vision
• Communicates effectively, utilize expert knowledge and convey that knowledge to others

Required Education, Experience, and Skills
• Must have at least one of these:
> Masters Degree in childhood learning, social work, human services, or child welfare
> 3-5 years of relatable work experience in one of these fields
> 10 years of experience with state government
• Enterprise customer-facing experience with strong oral and written communication skills, presenting to both large and small audiences
• Expert communicator, able to lead demanding enterprise customers even in difficult situations.
• Must have the ability to deal with issues of a sensitive nature
• Exceptional interpersonal skills (negotiation, team-building, positive thinking, and flexibility)
• Ability to interact with all levels of an organization
• Prior supervisory experience and the ability to coach and develop team members effectively
• Must possess strong analytical and synthesis skills to identify and resolve complex functional and technical issues
• Previous experience related to large scale IT projects is preferred.

Travel
• Requires routine travel to New Jersey client site
• Occasional travel to the Indianapolis development site as required

About TCC
Founded in 1996 in Indianapolis, IN, The Consultants Consortium (TCC) is an innovative solutions provider committed to designing and delivering high-value, cost-effective IT consulting services and application technology solutions for both the private and public sectors. With a team of more than 250 IT and business professionals, TCC serves clients nationwide, from state and federal government agencies to commercial sector customers. TCC is committed to providing the most cutting edge solutions, and with that, ensures they stay up-to-date on crucial certifications and affiliations. Among these are the highly accredited Microsoft Certifications.

At TCC, we know that having a strong company culture is paramount in sustaining the success and stability of the company, especially within the information technology industry. That’s why we place our focus on the people who make our success possible: our employees, partners and clients. We strive to create an environment that preserves and fosters growth while still promoting the DNA of our company.

Our core values:
• Building strong, reliable relationships with our employees, our partners and our clients
• Upholding integrity, honesty and respect
• Supporting our local community
• Encouraging continued education and development

Equal Opportunity Employer, including disabled and veterans.

Staying Safe Online – Five Tips for Good Cybersecurity Hygiene

Stephen Palamara, TCC Director of Business Development

I recently read an article published on the National Cybersecurity Alliance Website that gave some good, practical advice for staying safe online, amid a surge in cyber-attacks and scams. https://staysafeonline.org/blog/scams-and-misinformation-challenges/

The article pointed out that cybercriminals are taking advantage of the COVID-19 pandemic to leverage this hot topic to spread misinformation and lure audiences into their schemes. Often these scams target vulnerable populations such as children or senior citizens.

The article states “Cyber scammers are spreading misinformation to initiate cyber scams through email, social media, and messaging applications. Tactics have become more nefarious and misleading than ever before.”

The reliance on digital connectivity increased over the past year due to more people working from home or being on lockdown.  To be able to work and enjoy the internet safely, the article provides the following five tips for better cybersecurity:

  1. “Use strong passphrases and a password manager”
  2. “Enable multi-factor authentication (also known as two-factor authentication) on all accounts that support it (email, banking, online shopping, etc.)”
  3. “Back-up and protect your sensitive data and personal identifiable information (PII). Follow the 3-2-1 rule: have 3 copies of your data, on two different media, with one copy stored off-site.”
  4. “Pay close attention to possible phishing emails, texts and phone calls (think before you click).”
  5. “Pay attention to security settings at both the user level and device level. For example, free public WiFi can be spoofed easily. Try to avoid connecting to public WiFi and use a hotspot or VPN instead.”

Installing reputable cybersecurity protections and taking care of cybersecurity hygiene will allow you to use the internet safely.

To learn more about TCC’s Security Services please visit our website https://www.e-tcc.com/security-services.

Creating Successful Acceptable Use Security Policies

Stephen Palamara, TCC Director of Business Development

Good security policies are more important now than ever.  Since the beginning of the COVID-19 pandemic, there has been a surge in cybercrime including phishing attacks and other types of scams.

One type of security policy is externally focused and technology-oriented.  This type of policy helps prevent external threats and maintain the integrity of the network.

The other type is user focused.  Defining policies for appropriate use of the network can protect companies from liability if an employee violates the policy.

This article published on the Tripwire website outlines some considerations for creating a successful Acceptable Use Policy https://www.tripwire.com/state-of-security/risk-based-security-for-executives/risk-management/7-things-consider-creating-acceptable-use-policy/

  1. CONSIDER IMPACTS BEFORE ESTABLISHING RULES

The article suggests “If you haven’t gone through the process of identifying risks and the impacts of those risks, it’s really important to have some kind of discussion or risk assessment before drawing up rules that may or may not fit your organization.”

2. DEFINE WHAT DATA MATTERS AND WHY

“When this is well defined up front, it will create an expectation that staff can apply generally even if they forget a specific rule defined in the policy.”

3. DEFINE ANY COMPLIANCE OR LEGAL CONCERNS

“A good policy should speak to both best practices and compliance standards.”

4. SOLICIT FEEDBACK FROM STAKEHOLDERS AND REVISIT POLICY

“Even if things are going well and you have established a strong culture, your policies will need to adjust over time. New staff will come on board, and they will need to be taught the proper rules, as well. Plus, everyone needs a refresh once in a while. This feedback loop is very important and will help make policy stronger and easier to manage.”

5. CONSIDER PERSONALLY OWNED DEVICES THAT ACCESS COMPANY DATA ASSETS

“Ultimately, the most valuable part of your system is the data you control. In general, organizations that have major breaches or loss of data face significant challenges moving forward. Therefore, your policy should focus on controlling and securing data. As such, I would encourage any organization that allows staff to “Bring Your Own Device” to consider device usage as part of their Acceptable Use Policy.”

6. SOCIAL MEDIA

“Social media can be a very productive tool for organizations but obviously, it can also be a time waster and, even worse, a potential outflow of sensitive information or a tool as part of a phishing scam. Social media also transcends the IT infrastructure of the organization, so it’s important to take a broad view of this just like you would with personally owned devices.”

An Acceptable Use Policy can help reduce the risks associated with data security and IT management, but it must be tailored to meet the needs of each organization.

To learn more about TCC’s Security Services please visit our website https://www.e-tcc.com/security-services.

Five Tech Trends for Government in 2021

Mike Boyle, TCC Director of Business Development

Most people would agree that 2020 was a tough year.  The pandemic forced businesses to change many of the ways they conducted their daily operations.  The same is definitely true for government agencies that had to rapidly adjust to a changing business climate.

I came across an article on the GCN website that summed up the top five trends affecting government agencies in 2021. https://gcn.com/articles/2021/02/12/5-tech-trends.aspx

  1. “Automation moves out of the back office and into citizen-facing applications.”

The article states that the pandemic forced government employees to work remotely, which kept employees safe, and is also driving an increase in the use of automation not only for back-office tasks, but also for citizen-facing applications. 

2. “AI (not just machine learning) establishes a true foothold in government.”

Artificial Intelligence (AI) gives automation the decision making ability required to keep up with increasing volumes of data utilized by government agencies.  During the pandemic government agencies built the infrastructure required to utilize AI for automating and machine learning.  The article states “Government adoption of AI is vital to both maintaining the nation’s geopolitical position and augmenting human-based processes in the wake of multiplying data volumes.”

3. “Remote-access technologies become the hottest security tech for the government.”

The article states that the pandemic forced IT professionals to get remote employees connected and back to business as quickly as possible.  “In 2021, they’ll have to go back and secure the many applications and networks spun up in the cloud over the last year. The attack surface widened dramatically in a very short time, and ransomware evolved to take advantage of the opportunity. This year, agencies must implement zero trust for remote users and then apply those settings to on-site employees, as opposed to the other way around.”

4. “Government’s data analytics capabilities will mature and move toward predictive analytics.”

Government agencies can now utilize the infrastructure built during the pandemic to increase the use of predictive analytics into their workflows.  The article cites the following examples of the use of predictive analytics: “The Department of Agriculture, for instance, has turned to predictive analytics to help farm, forest and ranch managers make sustainable decisions. Additionally, predictive analytics are helping the Department of Defense anticipate when machine parts need to be replaced, which helps vehicles maintain a higher level of uptime.”

5. “CMMC will drive continuous monitoring.”

The Cybersecurity Maturity Model Certification (CMMC) is recognized as the security standard for many government agencies, including the Department of Defense.  The article states “Continuous monitoring requires a mindset shift as much as a technological one, and it allows for a greater understanding of any given contractor’s data, systems and network footprints. Additionally, continuous monitoring gives agencies the ability to establish a baseline on a company-by-company basis.”

As the article notes, the transformation of government IT services that began in 2020 will continue in 2021 and beyond.

To learn more about TCC and our work with government agencies please visit our website www.e-tcc.com.