Strategic Consulting with Subject Matter Experts

JOHNSTEK, Inc. provided their writing skills, organization, expertise and experience as executives and leaders to multiple Corporate giants, joining large proposal development efforts for opportunities in Defense, Intelligence and Homeland Security opportunities. JohnsTek SMEs support capture managers, proposal managers, and proposal writers to develop proposals, Pink Team, Red Team, and Estimate Costs in response to…

LoctDown Select Mobile Device

JOHNSTEK, Inc. teamed with other corporate partners to design and implement a unique mobile device technology that provides remote profile management, panic alerts, staff/family location services, encrypted voice and data, complete awareness of the owner’s current surroundings and anonymous email and chat. This mobile management approach will render mobile devices more secure and provide additional…

S.A. Client Fusion Center Systems Design

JOHNSTEK, Inc. was selected to design a high end system-of-systems for a large Latin American organization that optimize the reporting and visualization of data using advanced technologies. Information is made available for correlation and reporting by employing standardized methodologies of data extracting, semantic tagging and indexing critical information, index of geo-references, and enabling web services…

USASAC FMS Case Study

The US Army Security Assistance Command hired JOHNSTEK, Inc. under a Foreign Military Sales Case to provide a study of data integration capabilities for a S.A. Partner Nation. The PN is in the process of making organizational and capabilities changes to reflect the current needs of their Military. Therefore, an Information Integration Center site survey…

Thunderstorm Group LLC Vulnerability Study

JOHNSTEK, Inc. supported Thunderstorm Group in a study of Carlos Alibizu University security vulnerabilities. The analysis of Information Technology risk management included an evaluation of the university’s posture in the areas of Computer Security, Information Assurance, and Disaster Planning. The current Information Technology risks were evaluated under the categories detailed in the JOHNSTEK Vulnerability Assessment…