ReliaONE provides Staffing Solutions specializing in Information Technology, Accounting/Finance, and Cyber Security. ReliaONE and its’ Staffing Solutions Partner, KF Resources has a proven track record of finding top quality professionals for leading firms nationwide. While our primary focus is providing IT, Accounting/Finance Cyber Security/GRC Staffing solutions, we also provide Human Resources, Administrative and Clerical services as well.
Our Staffing Consultants are known for their ability to identify and locate highly-talented individuals to meet a client's specific needs for professionals on a Permanent, Contract, Temp-to-Perm basis. We have a reputation for providing top quality professionals in a timely manner. Our Consultants have decades of experience in the Information Technology, Accounting and Finance Staffing and Consulting Industries. We offer a customized personal approach which ensures that each professional identified fits an organization's immediate and long-term needs. We look forward to a mutually beneficial Staffing Provider Partnership.
|ERP SYSTEMS FUNCTIONAL AND TECHNICAL SPECIALISTS|
|ORACLE||SAP||PeopleSoft||JD Edwards||MS Dynamics|
|INFORMATION TECHNOLOGY SPECIALISTS|
|BI Specialist||Enterprise Architect||Systems Integrator||ERP Technical Consultant|
|CRM Specialist||Software Architect||Project Manager||Network Engineer|
|Program Manager||Software Engineer||Microsoft Specialist||ERP Functional Consultant|
|Web Developer||DBA||Data Warehouse||Data Modeler|
|Analytics||Cyber Security||Business Analyst||DevOps|
|CTO||CIO||Mobile Application||Middleware Architect|
|CYBER SECURITY/GRC SPECIALISTS|
|CHS||ISO 31000||ISO 27001||CCSK|
|CFO and Controller||Director of Finance||Financial Analysts||Accounting Manager|
|Audit||IT Audit||Finance Manager||Business Analyst|
Cyber Risk Assessment & Compliance Testing
The ability to perform risk assessment is crucial for organizations hoping to defend their systems. There are simply too many threats, too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable security infrastructure. Therefore, every organization, whether they do so in an organized manner or not, will make priority decisions on how best to defend their valuable data assets. Whether you''re a government organization that has to secure your network in accordance with NIST 800-53, a federal contractor that has to secure your network in accordance with NIST 800-171, or a commercial firm that simply wants to protect your company and your customers, we can help.
Risk Management Framework
On March 12, 2014, the DoD CIO approved DoDI 8510.01 transition from DIACAP to Risk Management Framework for Department of Defense (DoD) Information Technology. The change was prompted in part because, Defense Department CIO Teri Takai said, "we were concerned we''re driving up our costs by virtue of having companies have to fit our standards as well as to other national standards." The Risk Management Framework for DoD IT transition timeline calls for an end to new accreditations under the legacy DIACAP process within six months, and for the full transition of all existing DIACAP-based accreditations within three-and-a-half years from the policy''s effective date, March 12, 2014. Part of the objective is to consolidate DoD C&A practices, focusing on maximizing reciprocity and reducing duplicative efforts. If your organization needs help making sure you''re on track, we can help.
Safeguarding of UCTI (NIST 800-171 Compliance)
If you are new to NIST 800-171, it is intended to help "non-federal entities" (e.g., contractors) to comply with new security requirements using the systems and practices that contractors already have in place, rather than trying to use government-specific approaches. It also provides a standardized set of requirements for all Controlled Unclassified Information (CUI) security needs, tailored to non-federal systems, allowing non-federal entities to comply and consistently implement safeguards for the protection of CUI. If your company needs help becoming NSIT 800-171 compliant, we use a template driven approach to quickly and economically help you become compliant.
System Security Plan Support
The completion of system security plans is a requirement of the Office of Management and Budget (OMB) Circular A-130, Management of Federal Information Resources, Appendix III, Security of Federal Automated Information Resources, and Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA), The purpose of the system security plan is to provide an overview of the security requirements of the system and describe the controls in place or planned for meeting those requirements. The system security plan also delineates responsibilities and expected behavior of all individuals who access the system. The system security plan should be viewed as documentation of the structured process of planning adequate, cost-effective security protection for a system. It should reflect input from various managers with responsibilities concerning the system, including information owners, the system owner, and the senior agency information security officer (SAISO). Additional information may be included in the basic plan and the structure and format organized according to agency needs, so long as the major sections described in this document are adequately covered and readily identifiable. If your organization needs help using NIST 800-18, Guide for Developing Security Plans for Federal Information Systems, to put your System Security Plan in place, we can help.