+ CyberSecurity Solutions

Audit and Assessment

Our IT Audit and Assessment services provide you with independent, unbiased assessment of your security program, policies,and controls to align with your organization’s objectives. Read More

Continuity of Operations Planning

Effective Continuity of Operations Planning (COOP) will help ensure the security of your staff, visitors, and operations in the event of a crisis. In just 60 days, ICS will have your organization prepared to continue operations in virtually any unplanned event – from a minor interruption to a major disaster. ICS’ certified business continuity planners Read More

Code Review

ICS is available for code review projects with the goal of identifying security issues and weaknesses in the applications’ coding. We are able to conduct a systematic review of applications in scope for code review, which can include in excess of 1,000,000 lines of code. Read More

Continuity of Operations Plan Testing

Continuity of Operations Plan (COOP) testing will help validate your existing BCP/COOP plan to ensure the security of your staff, visitors, and operations in the event of a crisis. Read More

Data Center Operations

ICS has been delivering global-scale datacenter operations support services since 1998. We have experience operating in a high-tempo combat support environment where the margin for error is nil. Read More

Disaster Recovery Plan Testing

Would your organization be able to continue critical business functions following a significant unplanned disaster? Disaster Recovery Planning allows an organization to establish steps to continue operation at planned levels of service, despite events or interruptions. Read More

Disaster Recovery Planning

Would an unexpected natural disaster or political event shut down operations entirely? Disaster Recovery Planning allows an organization to establish steps to continue operation at planned levels of service, despite events or interruptions. Read More


ICS offers forensic services to discover, analyze and document information in both proactive and reactive forensic circumstances. Many of our clients have found this service to be vital during personnel action, court order, civil action, and incident response situations. Read More

Incident Response (Post-Event)

In the event of an information security emergency, the ICS Incident Response team will step in to help your organization identify the source of the compromise, preserve critical information, and prevent the spread of contamination or unauthorized access to other systems and networks. Read More

Incident Response Planning

ICS offers incident response planning services that will allow your organization to have a clearly defined response plan and policies in place should a cyber incident occur. Read More

Information Assurance / CyberSecurity

ICS has been delivering information assurance, information protection and cyber-security services since 1997. The service catalog was initially developed to support our Department of Defense clients and has evolved to provide a military-grade level of service to our commercial and public sector clients. Read More

Penetration Testing (Pen Testing)

Penetration testing is often referred to as ethical hacking. Our certified ethical hackers take the basic vulnerability assessment a step further, verifying the findings of the vulnerability assessment and the impact a breach could have in your external and internal networks. Read More

Policy Development

Well-established IT policies can help ensure an optimal network environment in which data is stable, secure, and available. Effective IT policies can also help ensure operations continue under adverse situations, such as a natural disaster or other unplanned event. Read More

Risk Assessment

Our Risk Assessment model delivers both quantitative and qualitative measures of organizational risk, allowing you to optimize your security spend and efficiently allocate resources to maximize business value. Read More

Vulnerability Assessment

You can’t fix what you don’t know is broken, and it is impossible to ensure the security of your network without a clear picture of its strengths and its weaknesses. Regularly scheduled vulnerability assessments are an uncomplicated way to uncover potential hazards. Read More

Web Application Assessment

Chances are good that just about every department within your organization is using web apps daily for standard business functions. While the benefits of these apps are many, they also bring with them hazards for which you should be prepared. Read More

+ Technology Consulting Solutions

Network Design/Planning

Having a well-designed enterprise network architecture can greatly improve organizational workflow, while allowing for future growth. ICS can offer guidance in the Network Design and Planning phase that will help ensure your network is built to last. Read More

Network Operations

ICS has experience operating and defending networks of a global scale. Managed environments include both classified and unclassified production, administrative, backup, and management networks as well as the Demilitarized Zones (DMZ). Read More

Vendor & Technology Evaluation

ICS technology consultants conduct in-depth reviews, vendor evaluations and product testing to ensure that the hardware, software, and service-based solutions we recommended will perform to your specifications. ICS also saves you money by negotiating with vendors to get you the most competitive rates for the products and services your organization needs. Read More

+ Application Service Solutions

Application Development

ICS has the ability to design and implement custom applications and enhance legacy applications for commercial, public sector, and federal clients to help your organization enhance business processes and increase operational efficiency. Read More

Application Maintenance and Support

Is your IT team bogged down with application sustainment activities, leaving little time for activities that drive the business forward? Do you lack the internal resources to efficiently implement changes to your custom apps? It may be time to contact ICS. Read More

Application Services

ICS delivers high quality software development, sustainment and modernization services in a manner designed to minimize software development lifecycle times, manage schedule risk, and maximize savings to our clients. Read More

Legacy Modernization

ICS understands the challenges that can come with taking old applications to new platforms, and we offer software automated solutions that can significantly reduce both the time and budget needed to achieve the results you expect. Read More

+ Staff Recruitment and Augmentation Solutions

Staff Augmentation

ICS can supply your organization with the flexibility and expertise necessary to meet even the most complex project and business goals. Our information technology and security consultants offer practical and affordable staff augmentation for both long and short term assignments. Read More

Staff Recruitment

Clients across the United States depend on Integrated Computer Solutions for information technology search services. ICS delivers only top-quality, highly-trained candidates to your organization in as little as ten business days. Read More


At ICS, we pride ourselves in our unique ability to integrate comprehensive strategy and cutting edge security into information operations. We have a long and successful past performance history of providing information assurance, technical, advisory, and operations support services to our DoD and civilian federal clients. This, combined with our extensive experience serving clients in commercial, public sector and education markets, brings a fresh perspective and industry best practice to our federal clients.

Our Differentiators:

  • Demonstrated Performance: History of outstanding service delivery, supported by exceptional contractor performance assessment reports (CPARs)
  • Professional Workforce: Our employees are heavily degreed and professionally trained. In fact, 100% of ICS employees hold college degrees and/or one or more industry certifications.
  • Quality Processes: Our ISO 9001:2008 certification demonstrates our commitment to quality in all of our activities.
  • Effective Performance: ICS’ Forge.Mil program and the Quality Management group at ICS have been appraised at Level 3 of the CMMI Institute’s Capability Maturity Model Integration (CMMI)®.
  • Mature Project Management Methodology (PMM) and Certified Project Managers (PMI-PMP’s): Our proprietary PMM, used on every engagement over 80 hours in duration, follows Project Management Institute (PMI) Project Management Body of Knowledge (PMBOK) standards to ensure on-time and on-budget delivery of our services.

 Click here to view Past Performance history.

ISO 9001 2015Technology Industry InnovatorsVeteran Owned Small BusinessCMMI Maturity Level 3CISSP® - Certified Information Systems Security ProfessionalCertified Penetration TesterITIL IT Service ManagementCertified Ethical HackerProject Management Institute CertifiedUS Department of Homeland SecurityDisaster Recovery Institute CertifiedCertified Information Systems Auditor