Information Technology

Information Technology

In an ever-changing world of technology, businesses are increasingly looking to hire IT professionals on an interim or contract to hire basis. Our Technology Staffing & Consulting division helps these businesses by providing talented IT consultants in a staff augmentation setting.

Whether a company is upgrading their systems, adding personnel bandwidth for special projects, or backfilling critical IT roles, our team of seasoned professionals can leverage their strong business experience and deep network to deliver superior talent and strategic value with an interim or right-to-hire approach.

Areas of Specialization:

  • Executive Leadership
  • Infrastructure
  • Software Development
  • Database / Data Warehouse
  • Functional IT Roles
  • ERP / CRM Platforms
  • IT Security
  • Compliance and Audit
Meet the Team

IT Security, Risk & Audit Services

StevenDouglas’ IT Risk Management and Audit experts can work with you to develop an intelligent approach when it comes to assessing IT risk and managing compliance. Our highly experienced team brings years of IT Security knowledge including developing products and services, managing and implementing security programs, HIPAA, GLBA, SOX assessment experience and auditing experience including SAS 70, SOX, and HIPAA. Other areas of expertise include vulnerability management, end-point protection, PCI-DSS, and BCP/DRP. Team members have also consulted for various US Federal Government agencies such as the Department of Defense (DoD) and the Department of Homeland Security (DHS).

Our solutions include…

  • IDENTIFICATION – We establish the scope of the organization, location and stakeholders, and identify processes, applications, and projects for assessment, preparing a high level project plan.
  • REMEDIATION – We develop a remediation plan, analyze remediation plan for build vs. buy, and implement process improvement and re-engineering, software selection, and personnel training.
  • ASSESSMENT – We assess your information security policies, processes, and technologies to identify weaknesses, and categorize security risks. Through this process, we conduct a gap assessment and make recommendations and then review the schedule with management and report our findings in an executive summary.
Meet the Team

StevenDouglas Locations