Icon Software Engineering


We use industry-leading standards and methodologies to develop custom applications and deliver process-focused software solutions that enable our clients to realize their critical business requirements across a variety of domains.

Our capabilities include:

  • EHR Integration and Interoperability
  • Agile Software Development
  • Human and User-Centered Design and Usability
  • Business Analysis and Systems Engineering
  • DevOps
  • System Enhancements
  • Software Architecture and Development
  • Software Requirements and Specifications
  • Quality Assurance and Testing
  • Deployment, Training, and Sustainment
  • COTS Integration
Icon Data Analytics


We offer a comprehensive suite of data analytics capabilities that are designed to enhance data interoperability and promote evidence-based decision making by integrating data governance, data integration, data mining, data modeling and data visualization functions on a modern, secure infrastructure.

Our capabilities include:

  • Business Intelligence and Interactive Dashboards
  • Data Discovery and Advanced Visualization
  • Data Mining
  • Statistical Analysis
  • Analytics Model Development
  • Predictive Analytics, including Fraud, Waste, and Abuse and Risk Modeling
  • Clinical Data Abstraction
  • Data Quality Assessments
  • Data Strategy and Management
  • Data Transformation (Extract, Transform, Load (ETL)) and Data Cleansing
Icon Cyber Security


We aid our clients in defending their data, information systems, and personnel against all types of attacks, including opportunistic hacking, insider threats, and Advanced Persistent Threats (APTs). Our experts work to understand, prioritize, and manage cyber security in the context of our customer’s business and mission goals to address the issues of today and prepare for the challenges of tomorrow.

Our capabilities include:

  • System Testing and Acceptance
  • Authority to Operate (ATO)
  • System Certification and Accreditation (C&A)
  • Security Technical Requirements Gap Analysis
  • Cyber Security Architecture
  • Network Security
  • Security Technical Training
  • Security Technical Documentation Creation
  • Security Test and Evaluation (ST&E)
  • Security Controls Assessment (SCA)
  • Management and Operations (M&O) Assessment
  • Penetration Testing
Icon IT Infrastructure


We offer a comprehensive and integrated suite of mature technical services that enable our experts to better engage clients, drive innovation, and successfully deliver solutions to address the most challenging business application needs.

Our capabilities include:

  • Application Virtualization and Cloud Migration
  • Enterprise Reference Architecture (TIC-Gateway)
  • Enterprise Applications Operations and Management
  • Application Modernization and Re-engineering
  • Data Management (Database Administration)
  • Performance Tuning
  • Application End-User Support Training