TCC Seeks a Business Analyst

Posted by Kelly Grant, Senior Technical Recruiter

Responsibilities
• Proactively communicate and collaborate with external and internal customers to analyze information needs and functional requirements.
• Critically evaluate information gathered from multiple sources, reconcile conflicts, articulate high-level information into details, abstract up from low-level information to an advanced understanding, and distinguish user requests from the underlying true needs
• Assist in the creation and quality assurance review of design documents and test results
• Works directly with clients and project and business leaders to identify analytical requirements
• Assist in design, development, and delivery of training as required
• Conduct participate in business requirement review sessions, JAD sessions, design reviews and project status meetings
• Adhere to Service Delivery Life Cycle processes and AGILE Methodology
• Template and/or business process development, as needed
• Deliver the following as needed:
o Functional Requirements
o Business Requirements Document
o Use Cases
o Screen and Interface Design
o System Design Document

Qualifications:
• BA/BS in Computer Science, Information Systems, Business Administration, or related field
• Minimum of 4 years’ experience with business analysis
• Advanced experience in Microsoft Suite, TFS, Visio
• Prior experience with AGILE Methodology
• Experience in the development of application specifications, requirement documents and use cases
• Prior experience in a client facing role
• Demonstrated strong written, verbal, organizational, and communication skills

Available Benefits
• Medical, Dental, Vision Insurance
• Employer-funded Health Reimbursement Arrangement (HRA)
• Company sponsored 401k
• Paid Time Off

About TCC

Founded in 1996 in Indianapolis, IN, The Consultants Consortium (TCC) is an innovative solutions provider committed to designing and delivering high-value, cost-effective IT consulting services and application technology solutions for both the private and public sectors. With a team of more than 250 IT and business professionals, TCC serves clients nationwide, from state and federal government agencies to commercial sector customers. TCC is committed to providing the most cutting edge solutions, and with that, ensures they stay up-to-date on crucial certifications and affiliations. Among these are the highly accredited Microsoft Certifications.

TCC holds multiple MS Certifications, including a Gold Certification level in both Application Development and Hosting, as well as a Silver Data Center Certification. In addition to Microsoft, TCC is also a Registered Partner with Amazon Web Services (AWS), and a Capability Maturity Model Integration (CMMI) Level III assessed development organization that utilizes the Information Technology Infrastructure Library (ITIL) standard processes for IT service management that focuses on aligning IT services with the needs of business. To maximize these practices, TCC encourages staff members to gain ITIL certifications, and even offers study courses and material in-house.

Accessibility: If you need an accommodation as part of the employment process
please contact Human Resources at Email: tcc.recruiting@e-tcc.com

Equal Opportunity Employer, including disabled and veterans.

To apply for this position please visit our website https://jobs.ourcareerpages.com/job/559910?source=TCCSoftwareSolutions&jobFeedCode=TCCSoftwareSolutions&returnURL=https://www.e-tcc.com/

20 Cyber Topics in 20 Weeks Series – Week 8

20 topics

Purdue MEP and PTAC are Proud to Announce FREE
20 Cyber Topics in 20 Weeks Webinar Series!

Many Indiana families are focused on remaining healthy during the COVID-19 crisis.  Additionally, Indiana businesses are challenged to keep their business afloat as a result of the COVID-related loss of revenue. As a result, much of the Indiana Defense Industrial Base (DIB) has done little to prepare for Cybersecurity Maturity Model Certifications (CMMC) which will soon be mandatory to conduct business with DoD.

What can we do to help in this very busy and stressful time? Under the leadership of the Indiana Procurement Technical Assistance Center (PTAC), Purdue MEP and many Indiana cybersecurity providers have developed a series of essential cybersecurity topics.  20 cybersecurity topics in 20 weeks is an effort to provide Indiana businesses with the training needed to achieve CMMC Level 1/basic small business information security and to improve the Indiana DIB’s cyber-health.  In addition to live webinars, all of the presentations will be recorded to create a library of cyber information that clients can view when they do have the time to focus on cyber health and defense acquisition regulation compliance.

20 weeks of cybersecurity training will begin this month and run through December 2020. These training sessions will be delivered by a wide-range of Indiana cybersecurity providers; Purdue cyberTAP, Sterlyn Group, TCC Solutions, Lifeline Data Centers, RevealRisk, AME Group, Sondhi Solutions, IU Health and more!

Cost? This training is free!

This Week’s Topic

Cyber Topic/Concept Presenter Webinar Date Description

How to protect organizational communications at key internal and external boundaries- firewalls, etc. (CMMC L1).

REGISTER

The AME Group 10/1/2020 Firewalls and other devices can be used to block unwanted traffic such as known malicious communications or browsing to inappropriate websites, depending on the settings. Install and operate a hardware firewall between your internal network and the Internet.  This session will review how to protect organizational communications at key internal and external boundaries.

To learn more about TCC’s Security Services please visit our website https://www.e-tcc.com/security-services

The Surprising Costs of Cyberattacks on Small Businesses

Posted by Stephen Palamara

Small business owners know that a vigilant cybersecurity program is expensive. Yet it is evident that cybercrime is one of the fastest growing forms of criminal activity, so defense must be a top priority. An article on the CNBC website highlighted the potentially devastating impact of a cyberattack on a small business.

https://www.cnbc.com/2019/10/13/cyberattacks-cost-small-companies-200k-putting-many-out-of-business.html#:~:text=Cyberattacks%20now%20cost%20companies%20%24200%2C000%20on%20average%2C%20putting%20many%20out%20of%20business,-Published%20Sun%2C%20Oct&text=Forty%2Dthree%20percent%20of%20cyberattacks,defend%20themselves%2C%20according%20to%20Accenture.

The article states that 43% of cyberattacks are aimed at small businesses, but only 14% of those businesses are adequately prepared to defend themselves.

“Modern IT infrastructures are more complex and sophisticated than ever, and the amount of virtual ground that we’ve got to safeguard has also grown exponentially,” explains Jesse Rothstein, CTO of online security provider ExtraHop. “From mobile to desktop interactions, cybercriminals can launch thousands of digital attacks designed to compromise your operations at every turn, only one of which ever needs to connect to cause serious disruption.”

In terms of the cost of a security breach to an organization, the article states “the consequences of cyberattacks continue to grow, with digital incidents now costing businesses of all sizes $200,000 on average, according to insurance carrier Hiscox. Sixty percent go out of business within six months of being victimized.”

The article suggests a multipronged approach to defense against cybersecurity attacks, since threats can come from internal staff as well as external sources. “It’s important to take a multi-faceted approach to cybersecurity,” explains Dan McNamara, chief technology and security officer at MedReview. “As our organization has grown, so has the number of cyberattacks it faces. … In the last two quarters alone, we saw 12 to 15 million breach attempts, many of which take place during early morning hours and weekends. [To safeguard ourselves,] we try to embrace AI and autonomous services; implement real-time cybersecurity tools; and encourage every person on staff to play a role in combating online threats.”

Adequate training for staff, in addition to advanced digital safeguards can help small businesses protect themselves from cyberthreats and thrive in an age of ongoing digital transformation.

For more information on TCC’s Security Services please visit our website https://www.e-tcc.com/security-services

20 Cyber Topics in 20 Weeks Series – Week 8

20 topics

Purdue MEP and PTAC are Proud to Announce FREE
20 Cyber Topics in 20 Weeks Webinar Series!

Many Indiana families are focused on remaining healthy during the COVID-19 crisis.  Additionally, Indiana businesses are challenged to keep their business afloat as a result of the COVID-related loss of revenue. As a result, much of the Indiana Defense Industrial Base (DIB) has done little to prepare for Cybersecurity Maturity Model Certifications (CMMC) which will soon be mandatory to conduct business with DoD.

What can we do to help in this very busy and stressful time? Under the leadership of the Indiana Procurement Technical Assistance Center (PTAC), Purdue MEP and many Indiana cybersecurity providers have developed a series of essential cybersecurity topics.  20 cybersecurity topics in 20 weeks is an effort to provide Indiana businesses with the training needed to achieve CMMC Level 1/basic small business information security and to improve the Indiana DIB’s cyber-health.  In addition to live webinars, all of the presentations will be recorded to create a library of cyber information that clients can view when they do have the time to focus on cyber health and defense acquisition regulation compliance.

20 weeks of cybersecurity training will begin this month and run through December 2020. These training sessions will be delivered by a wide-range of Indiana cybersecurity providers; Purdue cyberTAP, Sterlyn Group, TCC Solutions, Lifeline Data Centers, RevealRisk, AME Group, Sondhi Solutions, IU Health and more!

Cost? This training is free!

This Week’s Topic

Cyber Topic/Concept Presenter Webinar Date Description

Requirements for physical access and the monitoring of visitors (CMMC L1).

REGISTER

The AME Group 9/24/2020 Physical access to organizational information systems, equipment, and the respective operating environments should be limited to authorized individuals.  This session will review methods to limit physical access appropriately.

To learn more about TCC’s Security Services please visit our website https://www.e-tcc.com/security-services