SlideShare a Scribd company logo
1 of 14
Corporate
  Capabilities


  13873 Park Center Road  Suite 450
          Herndon, VA 20171
(703) 435-9105  Fax: (703) 435-9135
         www.dowless.com
Information Systems Security Engineering
Infrastructure Security Engineering and Integration
Providing security engineering, integration and support activities for enterprise infrastructure.

 Email/Web Systems
 Perimeter Components
 Virtualization
 VPN Solutions Engineering and Implementation




Enterprise Security Solutions and Services
Delivering full data protection services for our clients using vetted enterprise products for Public Key Infrastructures, file
and media encryption technologies operations and security management services.

 Encryption Solutions
    Storage Encryption for data “at rest”
    File and Email Encryption for data “in transit”
    Network Encryption for Isolation of Communication Paths
    Encryption Key Management using Public Key Infrastructure
       – Enterprise Data Protection Design and Implementation
       – Key Management Design and Implementation


 Planning, Implementation, and Management
       Risk Assessments and Analysis
       Security Policy Development
       Certification and Accreditation




                                                                                                                                 2
Software Engineering
   Providing software program management, configuration management, design, development, integration
   and maintenance, database administration, local area network administration, system administration and
   operations support for state of the art and legacy systems.
     Application Development
           C, C++, Highview, Visual Basic
           Application Security (Access Controls, System/ Application Roles, Authentication and Identification
            Integration)
        Database Development
    
        Web Development
    
        Configuration Management
    
        Independent Verification and Validation (IV&V)
    
        Software Lifecycle Management
    



Curriculum Development & Training
   Providing innovative training solutions to create programs that are flexible and responsive to our client’s
   needs. Our team of seasoned training professionals develops customized curriculum and delivers training
   for customized security solutions, proprietary software programs, or COTS and GOTS products.
     Student & Instructor Guides
     User Reference and System Administration Manuals
     Technical Writing & Editing
     Instructor-led and Computer-Based Training
     Operational Support
     Administration, Enrollment and Coordination
     Customer Advocacy



                                                                                                                  3
Enterprise Security Solutions Provider

 Dowless & Associates supports only vetted vendors in the information security market and we stand apart from the
 competition by focusing on obtaining deep technology expertise from these world class vendors. Leveraging our business
 alliances with Microsoft Corporation, PGP Corporation, IronPort, KoolSpan, Secure Computing and Trend Micro have given us
 extensive experience with selected products.

       “Best of Breed” security product offerings
   
       On-site Professional Engineering Services
   
       Engineering Documentation
   
       Discounted Software based on volume
   
       Support Training Administrative Personnel
   




 We provide custom product engineering, enterprise integration, and support services for our selected suite of products. We
 specialize in providing a security roadmap for introducing new products into current and legacy systems, and offer
 customized services to our customers that minimize the time between product purchase and use, thereby mitigating
 security vulnerabilities during solution integration. Our customized administrator product training enables immediate
 assumption of responsibilities for operations and maintenance. Dowless & Associates maintains a full function laboratory
 where extensive testing and product demonstration occur.

 Standard services include:
     Engineering Deployment Guide
     Two 1 hour engineering teleconferences
     Customized Professional Services Statement of Work
     On-site Professional services
     Follow-up with assigned Engineer




                                                                                                                          4
Past Performance
Enterprise Data Protection Services
Scope: $20M Contract over 10 yrs and 4 Separate Awards (3 sole source & 1 F/O
  Competition)
 Delivery of full data protection services for our clients including
    Engineering Activates
        – Public Key and Key Management Infrastructures,
                User key management
                Key management for Data Center Encryption Appliances and
                Encryption Key Repository (GOTS development & implementation)
        – Implementation of software file and media encryption technologies,
        – Evaluation and implementation of multiple encryption technologies to satisfy specific requirements,
        – Integration of encryption technologies into COTS application,
      Supporting Activities
        – Planning, Implementation, and Management,
        – Risk Assessments and Analysis,
        – Security Policy Development, and
        – Certification and Accreditation,
        – Product migration,
        – Documentation and training,
        – User support,
      Commercial Encryption Product Market Research, Evaluation, and Reporting
        – Data Center encryption appliances with rich policy management capabilities
        – Provided suggestions for vendors for product enhancement



                                           Indicates receiving customer awards for quality work



                                                                                                                5
Past Performance
Enterprise Operational Security Support

Scope: Subcontracted to Support Project Security Consulting Support Services
      Ensuring detection, analysis, and mitigation hostile attacks upon Enterprise networks
      Systems security test and evaluation of candidate Enterprise Core Products and Data Protection Products
      Development of implementation guidance and standards for implementation of Enterprise Security Policy
      Development and maintenance of Special Access Required (SAR) security applications used to detect
       vulnerabilities within the Enterprise Infrastructure.
      Development and delivery of mandatory Security Training Programs for All Agency Systems Administrators
      Development of new program for Agency Security Waiver Approvals and Access Requests




 Custom System Security Platform Development and Integration
    Presidential Support
    SAR Program Support




                                         Indicates receiving customer awards for quality work



                                                                                                                 6
Past Performance - Software Engineering and
Data Management of Operational Systems

Scope: $20.2 M Contract over 5 years, beginning 3rd year of performance
 Operational System and Data Management Support
      Software design, development and maintenance support
      Systems and Application Integration
      Systems Data Ingest Management
      System, Application, and Data Performance Tuning


 Integration and deployment of new system and application services


 Customer Support Services
    Tier 1 & Tier 3 Help Desk support
    Development and delivery of user training
 Program Management
    Managed four subcontractor large companies
    Grew Business area by 30% in second year to meet new requirements
    Developed management processes and procedures specifically for this effort to ensure communication and
       coordination with a host of corporate support organizations
      Communication plan was vital for smooth system upgrades and scheduled maintenance outages
      Validated requests, assigned module releases, updated programs, and deployed changes




                                        Indicates receiving customer awards for quality work



                                                                                                              7
Other Corporate Qualifications                          (as of 12/3/2008)


 32 Billing Technical Specialists (TS/SCI w/Full Scope Poly)
 Corporate Support
   Full Time Capture/Business Development
   Full Time Contracts Administrator
   Full Time Controller
   Full Time Recruiter
   Full Time HR Director
   Part Time Security Officer
   Part Time Publications Specialist
 Prime Contracts
   Security Center Services Contract
   Information Review and Release Systems
     –   Staffing with Employees, Subcontractors, and Independent Contractors
 Security
   TS Facility Clearance
 Accounting Systems and Controls
   Approved for Cost Plus Contracting Vehicles
   Responsive to Customer Reporting Requirements



                                                                                8
Staff Certifications
  Certified Information Systems Security Professional (CISSP)


  PGP Certified Engineer, PGP Enterprise Deployment Partner


  Microsoft Certified Systems Engineers (MCSE)/Trainers (Network, Security)


  Cisco Certified Network Administrator (CCNA)


  CCA (Citrix)


  Citrix Certified Enterprise Administrator


  IronPort Certified Engineer


  Information Technology Infrastructure Library (ITIL)


  Certified Tivoli Consultant


  Oracle Certified Professional DBA


  INFOSEC Administrator


  A+




                                                                               9
About Us
  Dowless & Associates is a woman-owned small-business, founded in 1994 and incorporated in 1999. We
  innovate, integrate, and implement industry best practices for “best–of–breed” technology solutions for
  our U.S. Intelligence and Commercial customers with a focus on Security and Software Engineering, and
  Curriculum Development and Training. As an Enterprise Security Provider, we offer customized solutions
  to meet today’s demanding security requirements with the select products we sell and support.


Core Values
  To demonstrate integrity, accountability, and a commitment to excellence in achieving our mission.
  Integrity – We stand by our personal principals of honesty, honor, reliability, and live by these principals as
  individuals and as a team.
  Accountability – We are accountable for our actions. We respect each member of our team and communicate
  openly, honestly and respectfully.
  Excellence – We strive to continually improve both professionally and personally, and always apply our best
  efforts.


Corporate Mission
  To support our customers by providing innovative Information Technology
  solutions and services with a commitment to excellence.




                                                                                                                    10
Corporate Vision
  Focus on the success of our customers and our employees
  Lead industry in the business of software, systems, and security
   engineering
  Provide a culture of cooperation, collaboration, empowerment, and
   teamwork
  Challenge our employees to broaden their personal capabilities,
   enable them as leaders, managers, innovators, and thinkers
  Provide employees the tools, education, training, and
   encouragement to ensure success
  Reward employees commensurately for success and extra effort
  Have employees with a vested interest in the success of the
   corporation
  “Give back” to our respective communities


Our Capabilities
Dowless & Associates provides full lifecycle solutions for Information Systems Security Engineering, Software
Engineering and Curriculum Development and Training. We work closely with our customers to define mission
requirements and develop solutions that satisfy them from program level security engineering to backend
enterprise wide solutions. Through the implementation of well known frameworks such as ITIL and Six Sigma,
our solutions use the “best practices” in full life cycle management.

As an Enterprise Security Provider, Dowless & Associates supports only the best product vendors in the
information security market. Our focused efforts key on the customer’s mission and vetted products where we
apply our unique expertise.




                                                                                                                11
Corporate Profile
                       Certified Woman-Owned Small Business
                       NAICS Codes
                          541511 Custom Computer Programming Services
                          541512 Computer Systems Design Services
                          541519 Other Computer Related Services
                          611420 Computer Training
                       Clearances
                          TS Facility Security Clearance with IC Agency & TS DSS Facility   Security Clearance
                          TS/SCI with full-scope polygraph cleared personnel

                 Corporate Growth                                                                Employee Growth
                                                                                45
                                                                                                                                   40
                                                                                40
                                                                                                                         35
                                  Revenue Growth                                35
                                                                                30
                                                                                                                  25
                                                                                25                      21
                                                                    10.2
        10
                                                                                20
         9
                                                                                                14
                                                           7.28
         8                                                                      15
                                                                                      10
Dollars In Millions




         7
                                                                                10
         6
                                                  4.58                           5
         5
                                         3.28
         4                                                                       0
         3                       1.95                                                2003       2004   2005       2006   2007   Projected
                        1.27
         2                                                                                                                        2008
         1
         0
                        2003    2004     2005     2006     2007   Projected
                                                                    2008



                                                                                                                                  12
Executive Management
 Nan Dowless                   Ms. Dowless is a versatile professional with over twenty years of executive management experience and
                               nearly thirty years in the field of training and professional development. She founded Dowless &
 President/CFO
                               Associates, LLC in 1994 providing practical experience in strategic planning, business process
 ndowless@dowless.com
                               reengineering methodologies and served on corporate Total Quality Executive Management Boards for
                               her clients. As a Program Manager and project lead for multiple service contracts she has excellent
                               project management skills. In 1999, she became President of Dowless & Associates, Inc. Ms. Dowless
                               has a B.S. in Human Resource Management. She maintains certifications including IS Security
                               Implementation, MCP, Certified Instructor, Franklin/ Covey Time Management , ITIL and holds a TS/SCI
                               clearance.

 Jerry Dowless                 Mr. Dowless has over 37 years of Information Assurance and Information System Security Engineering
                               for computers, networks, and software systems expertise. In addition to his executive and business
 Chief Executive Officer
                               development duties, he is our resident Subject Matter Expert on architecture and system design,
 jdowless@dowless.com
                               development, integration and implementation of Enterprise IS security strategies. He has managed
                               several multi-million dollar projects and programs for customer in the Intelligence Community and the
                               Department of Defense. He holds a B.S. in Human Resource Mgmt, and an M.S. in Computer Systems
                               Management. Mr. Dowless maintains several certifications including PMP, CISSP, MSCE, CLNE, ITIL and
                               holds a TS/SCI clearance.
 Ray Lemanski                  Mr. Lemanski has a diverse background in the areas of Corporate Finance, Executive Management,
                               Information Assurance, System Engineering, and Project Management. As Chief Operating Officer and
 Chief Operating Officer
                               member of the Executive Committee, Mr. Lemanski has been instrumental in developing and
 rlemanski@dowless.com
                               maintaining our operational budgets, enhancing our support structure for business development and
 Direct: (703) 766-5661        process development and in developing our corporate strategy. Mr. Lemanski holds a B.S. in Business
                               Administration with a concentration in Finance, a Graduate Certificate in Information Security
                               Management and various certifications including CISSP, PGP, and ITIL. He is cleared at the TS/SCI level.

 Susan Milloy                  Ms. Milloy has been with Dowless & Associates, Inc. since its inception and has been an integral part of
                               the company’s growth. As the Director of Corporate Services and member of the Executive Committee,
 Director Corporate Services
                               Ms. Milloy’s role includes managing our HR, Recruiting and Office Management functions and associated
 smilloy@dowless.com
                               personnel. Ms. Milloy’s corporate knowledge and proven management skills serve us well, as she
 Direct: (703) 766-5484        develops and manages the processes and procedures necessary to support the growth of our company.
                               Ms. Milloy holds a B.S. in Business Administration with a focus in Human Resources and is ITIL
                               Foundation Certified.




                                                                                                                                          13
Why Partner with Dowless & Associates, Inc?

            1. We contribute as a team player and
               earn the respect of our partners and
               customers

            2. We specialize so that we add REAL
               value to the team with depth of
               knowledge

            3. We innovate and bring new ideas for
               solving difficult problems

            4. We respond promptly and accurately
               for information requests

            5. We can prove our claims of success!
                                                      14

More Related Content

What's hot

Docker and Container Compliance
Docker and Container ComplianceDocker and Container Compliance
Docker and Container ComplianceControlCase
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineExamcollection
 
New Window of Opportunity
New Window of OpportunityNew Window of Opportunity
New Window of OpportunityCASCouncil
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examInfosec
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyControlCase
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Managed It Services
Managed It ServicesManaged It Services
Managed It ServicesGss America
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Microsoft Décideurs IT
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood
 

What's hot (20)

Docker and Container Compliance
Docker and Container ComplianceDocker and Container Compliance
Docker and Container Compliance
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE Outline
 
New Window of Opportunity
New Window of OpportunityNew Window of Opportunity
New Window of Opportunity
 
CompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new examCompTIA network+ | Everything you need to know about the new exam
CompTIA network+ | Everything you need to know about the new exam
 
Adarsh Resume ISO27001
Adarsh Resume ISO27001Adarsh Resume ISO27001
Adarsh Resume ISO27001
 
Resume-DPITVlinkedin
Resume-DPITVlinkedinResume-DPITVlinkedin
Resume-DPITVlinkedin
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Resume
ResumeResume
Resume
 
Resume-Piyush_Agarwal (1)
Resume-Piyush_Agarwal (1)Resume-Piyush_Agarwal (1)
Resume-Piyush_Agarwal (1)
 
Managed It Services
Managed It ServicesManaged It Services
Managed It Services
 
Identity Management Project Roadmap
Identity Management Project RoadmapIdentity Management Project Roadmap
Identity Management Project Roadmap
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 

Viewers also liked

Short film analysis
Short film analysisShort film analysis
Short film analysisarsenal1886
 
E020 SLA Learning Directory Cover_PG3
E020 SLA Learning Directory Cover_PG3E020 SLA Learning Directory Cover_PG3
E020 SLA Learning Directory Cover_PG3Hannah Pascoe
 
Saga lazos de sangre
Saga lazos de sangreSaga lazos de sangre
Saga lazos de sangreDidiPaldis
 
Décembre 2011
Décembre 2011Décembre 2011
Décembre 2011evanim
 
Computer Solutions 2008
Computer Solutions 2008Computer Solutions 2008
Computer Solutions 2008guestc8d4438
 
Creciendo con libros.
Creciendo con libros.Creciendo con libros.
Creciendo con libros.DidiPaldis
 
Los alumnos de 4ºB y el día de la Paz
Los alumnos de 4ºB y el día de la PazLos alumnos de 4ºB y el día de la Paz
Los alumnos de 4ºB y el día de la PazCEIP TIERRA DE PINARES
 
Rihanna album advert analysis
Rihanna album advert analysisRihanna album advert analysis
Rihanna album advert analysisanitaa20
 
Christine M. Ener RMA
Christine M. Ener RMAChristine M. Ener RMA
Christine M. Ener RMAMichele Ener
 
The Story Of The $1.1 Million Facebook Referral
The Story Of The $1.1 Million Facebook ReferralThe Story Of The $1.1 Million Facebook Referral
The Story Of The $1.1 Million Facebook ReferralMatt Gentile
 
Paradox analysis
Paradox analysisParadox analysis
Paradox analysisarsenal1886
 
Paradox analysis
Paradox analysisParadox analysis
Paradox analysisarsenal1886
 

Viewers also liked (17)

Short film analysis
Short film analysisShort film analysis
Short film analysis
 
E020 SLA Learning Directory Cover_PG3
E020 SLA Learning Directory Cover_PG3E020 SLA Learning Directory Cover_PG3
E020 SLA Learning Directory Cover_PG3
 
Dec5
Dec5Dec5
Dec5
 
Saga lazos de sangre
Saga lazos de sangreSaga lazos de sangre
Saga lazos de sangre
 
Décembre 2011
Décembre 2011Décembre 2011
Décembre 2011
 
Vídeo 4 reflexão
Vídeo 4   reflexãoVídeo 4   reflexão
Vídeo 4 reflexão
 
Computer Solutions 2008
Computer Solutions 2008Computer Solutions 2008
Computer Solutions 2008
 
Creciendo con libros.
Creciendo con libros.Creciendo con libros.
Creciendo con libros.
 
Los alumnos de 4ºB y el día de la Paz
Los alumnos de 4ºB y el día de la PazLos alumnos de 4ºB y el día de la Paz
Los alumnos de 4ºB y el día de la Paz
 
Rihanna album advert analysis
Rihanna album advert analysisRihanna album advert analysis
Rihanna album advert analysis
 
Christine M. Ener RMA
Christine M. Ener RMAChristine M. Ener RMA
Christine M. Ener RMA
 
The Story Of The $1.1 Million Facebook Referral
The Story Of The $1.1 Million Facebook ReferralThe Story Of The $1.1 Million Facebook Referral
The Story Of The $1.1 Million Facebook Referral
 
Paradox analysis
Paradox analysisParadox analysis
Paradox analysis
 
Pedro (4)
Pedro (4)Pedro (4)
Pedro (4)
 
Paradox analysis
Paradox analysisParadox analysis
Paradox analysis
 
Como tocar el_piano
Como tocar el_pianoComo tocar el_piano
Como tocar el_piano
 
SIMETRÍA
SIMETRÍASIMETRÍA
SIMETRÍA
 

Similar to Dowless Corp Cap 12 06 08

Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]rickkhosla
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation EnglishTechnowave
 
Perennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial Systems
 
About graycon
About grayconAbout graycon
About grayconmartyrj
 
Sci capabilities fed dec 2014
Sci capabilities fed dec 2014Sci capabilities fed dec 2014
Sci capabilities fed dec 2014Iqbal Tareen
 
IGI - Solution presentation-DP
IGI - Solution presentation-DPIGI - Solution presentation-DP
IGI - Solution presentation-DPNeetu Gupta
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentationNAISales2
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Microsoft Technet France
 
Routeget Technologies - Corporate presentation
Routeget Technologies - Corporate presentationRouteget Technologies - Corporate presentation
Routeget Technologies - Corporate presentationAmarnath Gupta
 
Avnet Integrated Benefits
Avnet Integrated BenefitsAvnet Integrated Benefits
Avnet Integrated BenefitsIlkka Honkala
 
Aspeo Corporate Presentation
Aspeo Corporate PresentationAspeo Corporate Presentation
Aspeo Corporate Presentationratieh
 
Digital Group Corporate Brochure
Digital Group Corporate BrochureDigital Group Corporate Brochure
Digital Group Corporate BrochureMustafabalsara
 

Similar to Dowless Corp Cap 12 06 08 (20)

Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]
 
Company Presentation English
Company Presentation EnglishCompany Presentation English
Company Presentation English
 
Perennial systems corporate overview presentation
Perennial systems corporate overview presentationPerennial systems corporate overview presentation
Perennial systems corporate overview presentation
 
About Micro
About MicroAbout Micro
About Micro
 
About graycon
About grayconAbout graycon
About graycon
 
Goip Profile
Goip ProfileGoip Profile
Goip Profile
 
Best Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company IndiaBest Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company India
 
Sci capabilities fed dec 2014
Sci capabilities fed dec 2014Sci capabilities fed dec 2014
Sci capabilities fed dec 2014
 
Scale Focus en
Scale Focus enScale Focus en
Scale Focus en
 
IGI - Solution presentation-DP
IGI - Solution presentation-DPIGI - Solution presentation-DP
IGI - Solution presentation-DP
 
About Atidan 2016
About Atidan 2016About Atidan 2016
About Atidan 2016
 
Past performance presentation
Past performance presentationPast performance presentation
Past performance presentation
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
 
Routeget Technologies - Corporate presentation
Routeget Technologies - Corporate presentationRouteget Technologies - Corporate presentation
Routeget Technologies - Corporate presentation
 
Avnet Integrated Benefits
Avnet Integrated BenefitsAvnet Integrated Benefits
Avnet Integrated Benefits
 
Aspeo Corporate Presentation
Aspeo Corporate PresentationAspeo Corporate Presentation
Aspeo Corporate Presentation
 
Digital Group Corporate Brochure
Digital Group Corporate BrochureDigital Group Corporate Brochure
Digital Group Corporate Brochure
 
WIPRO
WIPROWIPRO
WIPRO
 
Arsons informatique
Arsons informatiqueArsons informatique
Arsons informatique
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Dowless Corp Cap 12 06 08

  • 1. Corporate Capabilities 13873 Park Center Road  Suite 450 Herndon, VA 20171 (703) 435-9105  Fax: (703) 435-9135 www.dowless.com
  • 2. Information Systems Security Engineering Infrastructure Security Engineering and Integration Providing security engineering, integration and support activities for enterprise infrastructure.  Email/Web Systems  Perimeter Components  Virtualization  VPN Solutions Engineering and Implementation Enterprise Security Solutions and Services Delivering full data protection services for our clients using vetted enterprise products for Public Key Infrastructures, file and media encryption technologies operations and security management services.  Encryption Solutions  Storage Encryption for data “at rest”  File and Email Encryption for data “in transit”  Network Encryption for Isolation of Communication Paths  Encryption Key Management using Public Key Infrastructure – Enterprise Data Protection Design and Implementation – Key Management Design and Implementation  Planning, Implementation, and Management  Risk Assessments and Analysis  Security Policy Development  Certification and Accreditation 2
  • 3. Software Engineering Providing software program management, configuration management, design, development, integration and maintenance, database administration, local area network administration, system administration and operations support for state of the art and legacy systems.  Application Development  C, C++, Highview, Visual Basic  Application Security (Access Controls, System/ Application Roles, Authentication and Identification Integration) Database Development  Web Development  Configuration Management  Independent Verification and Validation (IV&V)  Software Lifecycle Management  Curriculum Development & Training Providing innovative training solutions to create programs that are flexible and responsive to our client’s needs. Our team of seasoned training professionals develops customized curriculum and delivers training for customized security solutions, proprietary software programs, or COTS and GOTS products.  Student & Instructor Guides  User Reference and System Administration Manuals  Technical Writing & Editing  Instructor-led and Computer-Based Training  Operational Support  Administration, Enrollment and Coordination  Customer Advocacy 3
  • 4. Enterprise Security Solutions Provider Dowless & Associates supports only vetted vendors in the information security market and we stand apart from the competition by focusing on obtaining deep technology expertise from these world class vendors. Leveraging our business alliances with Microsoft Corporation, PGP Corporation, IronPort, KoolSpan, Secure Computing and Trend Micro have given us extensive experience with selected products. “Best of Breed” security product offerings  On-site Professional Engineering Services  Engineering Documentation  Discounted Software based on volume  Support Training Administrative Personnel  We provide custom product engineering, enterprise integration, and support services for our selected suite of products. We specialize in providing a security roadmap for introducing new products into current and legacy systems, and offer customized services to our customers that minimize the time between product purchase and use, thereby mitigating security vulnerabilities during solution integration. Our customized administrator product training enables immediate assumption of responsibilities for operations and maintenance. Dowless & Associates maintains a full function laboratory where extensive testing and product demonstration occur. Standard services include:  Engineering Deployment Guide  Two 1 hour engineering teleconferences  Customized Professional Services Statement of Work  On-site Professional services  Follow-up with assigned Engineer 4
  • 5. Past Performance Enterprise Data Protection Services Scope: $20M Contract over 10 yrs and 4 Separate Awards (3 sole source & 1 F/O Competition)  Delivery of full data protection services for our clients including  Engineering Activates – Public Key and Key Management Infrastructures,  User key management  Key management for Data Center Encryption Appliances and  Encryption Key Repository (GOTS development & implementation) – Implementation of software file and media encryption technologies, – Evaluation and implementation of multiple encryption technologies to satisfy specific requirements, – Integration of encryption technologies into COTS application,  Supporting Activities – Planning, Implementation, and Management, – Risk Assessments and Analysis, – Security Policy Development, and – Certification and Accreditation, – Product migration, – Documentation and training, – User support,  Commercial Encryption Product Market Research, Evaluation, and Reporting – Data Center encryption appliances with rich policy management capabilities – Provided suggestions for vendors for product enhancement Indicates receiving customer awards for quality work 5
  • 6. Past Performance Enterprise Operational Security Support Scope: Subcontracted to Support Project Security Consulting Support Services  Ensuring detection, analysis, and mitigation hostile attacks upon Enterprise networks  Systems security test and evaluation of candidate Enterprise Core Products and Data Protection Products  Development of implementation guidance and standards for implementation of Enterprise Security Policy  Development and maintenance of Special Access Required (SAR) security applications used to detect vulnerabilities within the Enterprise Infrastructure.  Development and delivery of mandatory Security Training Programs for All Agency Systems Administrators  Development of new program for Agency Security Waiver Approvals and Access Requests  Custom System Security Platform Development and Integration  Presidential Support  SAR Program Support Indicates receiving customer awards for quality work 6
  • 7. Past Performance - Software Engineering and Data Management of Operational Systems Scope: $20.2 M Contract over 5 years, beginning 3rd year of performance  Operational System and Data Management Support  Software design, development and maintenance support  Systems and Application Integration  Systems Data Ingest Management  System, Application, and Data Performance Tuning  Integration and deployment of new system and application services  Customer Support Services  Tier 1 & Tier 3 Help Desk support  Development and delivery of user training  Program Management  Managed four subcontractor large companies  Grew Business area by 30% in second year to meet new requirements  Developed management processes and procedures specifically for this effort to ensure communication and coordination with a host of corporate support organizations  Communication plan was vital for smooth system upgrades and scheduled maintenance outages  Validated requests, assigned module releases, updated programs, and deployed changes Indicates receiving customer awards for quality work 7
  • 8. Other Corporate Qualifications (as of 12/3/2008)  32 Billing Technical Specialists (TS/SCI w/Full Scope Poly)  Corporate Support  Full Time Capture/Business Development  Full Time Contracts Administrator  Full Time Controller  Full Time Recruiter  Full Time HR Director  Part Time Security Officer  Part Time Publications Specialist  Prime Contracts  Security Center Services Contract  Information Review and Release Systems – Staffing with Employees, Subcontractors, and Independent Contractors  Security  TS Facility Clearance  Accounting Systems and Controls  Approved for Cost Plus Contracting Vehicles  Responsive to Customer Reporting Requirements 8
  • 9. Staff Certifications  Certified Information Systems Security Professional (CISSP)  PGP Certified Engineer, PGP Enterprise Deployment Partner  Microsoft Certified Systems Engineers (MCSE)/Trainers (Network, Security)  Cisco Certified Network Administrator (CCNA)  CCA (Citrix)  Citrix Certified Enterprise Administrator  IronPort Certified Engineer  Information Technology Infrastructure Library (ITIL)  Certified Tivoli Consultant  Oracle Certified Professional DBA  INFOSEC Administrator  A+ 9
  • 10. About Us Dowless & Associates is a woman-owned small-business, founded in 1994 and incorporated in 1999. We innovate, integrate, and implement industry best practices for “best–of–breed” technology solutions for our U.S. Intelligence and Commercial customers with a focus on Security and Software Engineering, and Curriculum Development and Training. As an Enterprise Security Provider, we offer customized solutions to meet today’s demanding security requirements with the select products we sell and support. Core Values To demonstrate integrity, accountability, and a commitment to excellence in achieving our mission. Integrity – We stand by our personal principals of honesty, honor, reliability, and live by these principals as individuals and as a team. Accountability – We are accountable for our actions. We respect each member of our team and communicate openly, honestly and respectfully. Excellence – We strive to continually improve both professionally and personally, and always apply our best efforts. Corporate Mission To support our customers by providing innovative Information Technology solutions and services with a commitment to excellence. 10
  • 11. Corporate Vision  Focus on the success of our customers and our employees  Lead industry in the business of software, systems, and security engineering  Provide a culture of cooperation, collaboration, empowerment, and teamwork  Challenge our employees to broaden their personal capabilities, enable them as leaders, managers, innovators, and thinkers  Provide employees the tools, education, training, and encouragement to ensure success  Reward employees commensurately for success and extra effort  Have employees with a vested interest in the success of the corporation  “Give back” to our respective communities Our Capabilities Dowless & Associates provides full lifecycle solutions for Information Systems Security Engineering, Software Engineering and Curriculum Development and Training. We work closely with our customers to define mission requirements and develop solutions that satisfy them from program level security engineering to backend enterprise wide solutions. Through the implementation of well known frameworks such as ITIL and Six Sigma, our solutions use the “best practices” in full life cycle management. As an Enterprise Security Provider, Dowless & Associates supports only the best product vendors in the information security market. Our focused efforts key on the customer’s mission and vetted products where we apply our unique expertise. 11
  • 12. Corporate Profile  Certified Woman-Owned Small Business  NAICS Codes  541511 Custom Computer Programming Services  541512 Computer Systems Design Services  541519 Other Computer Related Services  611420 Computer Training  Clearances  TS Facility Security Clearance with IC Agency & TS DSS Facility Security Clearance  TS/SCI with full-scope polygraph cleared personnel Corporate Growth Employee Growth 45 40 40 35 Revenue Growth 35 30 25 25 21 10.2 10 20 9 14 7.28 8 15 10 Dollars In Millions 7 10 6 4.58 5 5 3.28 4 0 3 1.95 2003 2004 2005 2006 2007 Projected 1.27 2 2008 1 0 2003 2004 2005 2006 2007 Projected 2008 12
  • 13. Executive Management Nan Dowless Ms. Dowless is a versatile professional with over twenty years of executive management experience and nearly thirty years in the field of training and professional development. She founded Dowless & President/CFO Associates, LLC in 1994 providing practical experience in strategic planning, business process ndowless@dowless.com reengineering methodologies and served on corporate Total Quality Executive Management Boards for her clients. As a Program Manager and project lead for multiple service contracts she has excellent project management skills. In 1999, she became President of Dowless & Associates, Inc. Ms. Dowless has a B.S. in Human Resource Management. She maintains certifications including IS Security Implementation, MCP, Certified Instructor, Franklin/ Covey Time Management , ITIL and holds a TS/SCI clearance. Jerry Dowless Mr. Dowless has over 37 years of Information Assurance and Information System Security Engineering for computers, networks, and software systems expertise. In addition to his executive and business Chief Executive Officer development duties, he is our resident Subject Matter Expert on architecture and system design, jdowless@dowless.com development, integration and implementation of Enterprise IS security strategies. He has managed several multi-million dollar projects and programs for customer in the Intelligence Community and the Department of Defense. He holds a B.S. in Human Resource Mgmt, and an M.S. in Computer Systems Management. Mr. Dowless maintains several certifications including PMP, CISSP, MSCE, CLNE, ITIL and holds a TS/SCI clearance. Ray Lemanski Mr. Lemanski has a diverse background in the areas of Corporate Finance, Executive Management, Information Assurance, System Engineering, and Project Management. As Chief Operating Officer and Chief Operating Officer member of the Executive Committee, Mr. Lemanski has been instrumental in developing and rlemanski@dowless.com maintaining our operational budgets, enhancing our support structure for business development and Direct: (703) 766-5661 process development and in developing our corporate strategy. Mr. Lemanski holds a B.S. in Business Administration with a concentration in Finance, a Graduate Certificate in Information Security Management and various certifications including CISSP, PGP, and ITIL. He is cleared at the TS/SCI level. Susan Milloy Ms. Milloy has been with Dowless & Associates, Inc. since its inception and has been an integral part of the company’s growth. As the Director of Corporate Services and member of the Executive Committee, Director Corporate Services Ms. Milloy’s role includes managing our HR, Recruiting and Office Management functions and associated smilloy@dowless.com personnel. Ms. Milloy’s corporate knowledge and proven management skills serve us well, as she Direct: (703) 766-5484 develops and manages the processes and procedures necessary to support the growth of our company. Ms. Milloy holds a B.S. in Business Administration with a focus in Human Resources and is ITIL Foundation Certified. 13
  • 14. Why Partner with Dowless & Associates, Inc? 1. We contribute as a team player and earn the respect of our partners and customers 2. We specialize so that we add REAL value to the team with depth of knowledge 3. We innovate and bring new ideas for solving difficult problems 4. We respond promptly and accurately for information requests 5. We can prove our claims of success! 14