.png)
Key Strategic Alliance (KSA), LLC comprises Strategic Defense Solutions as the 8(a)-managing partner, and a small business STARS II alumnus, KeyBridge Technologies, Inc. KSA specializes in IT services and has been recently awarded (8) GSA STARS III status. At Key Strategic Alliance, we perform myriad activities to identify, manage, and mitigate supply chain risk. For example, we ensure that Security requirements are included in every solicitation and contract when soliciting and procuring new support or equipment. We work very closely with the vendor to ensure we address potential security vulnerabilities and or gaps. We make it our practice to work only with companies that align with our standards. In fact, we hold to a “one strike and you’re out” policy with respect to vendor products that do not meet KSA’s standards or project security specifications.
KSA will leverage the ISO 9001:2015 registered quality control measures of our JV partner and adopt as standard practice to ensure all component purchases are tightly controlled. Our team ensures we purchases hardware/software components from approved and prequalified vendors that meet our high-security standards. When a purchase includes hardware/software parts from vendors, we unpack, closely inspected, and verified by as necessary to ensure security measures are in place.
Additionally, we developed and implement Software Security Lifecycle plan, and follow updates to remain aware of influencing changes. We utilize automated security testing in our programming to minimize any negative effects of human interaction, which could lead to human-caused errors or oversight. Personnel in charge of supply chain cybersecurity actively collaborate with every team that touches any part of the product during its development lifecycle and ensures cybersecurity is part of suppliers’ and developers’ employee experience, processes, and tools.
Legacy support for end-of-life products and platforms assure continued supply of authorized IP addresses and parts. Tight controls on access by service vendors are imposed. Access to software is limited for very small number of vendors. Hardware vendors are limited to mechanical systems with no access to control systems. All vendors are authorized and escorted.
We use strict system security engineering processes in specifying and designing IT systems to protect them from internal and external threats as well as against hardware and software vulnerabilities. Separation of duties will be enforced through assigned access authorizations. Users are prevented from having all the necessary authority or information access to perform fraudulent activity without collusion but using distinct roles for production support and development.
We only use original equipment manufacturers (OEMs) or vendor certified resellers for information systems and ship all orders directly to the customer organization via bonded couriers that are validated each time a pickup or delivery is made to mitigate risk.
We service all IT systems using our own employees and usually perform the work on site. If remote support is provided we mitigate cyber risk by assigning a temporary account that is disabled after the maintenance session ends. The maintenance session is logged and reviewed by the ISSO.
If non-functional equipment cannot be repaired by the OEM or an OEM-authorized vendor /trusted partner under product warranties and contractual obligations, a certified data destruction provider destroys it. KSA uses only licensed and bonded data destruction vendors for the decommissioning of defective and/or obsolete products. Our data destruction contractors have signed full and comprehensive non-disclosure agreements.
Looking for Employment under GSA Stars III?
Recognizing the complex and varied requirements of the GSA STARS III Customer and the labor categories utilized to provide services under the GSA STARS III contract vehicle, Key Strategic Alliance, LLC (KSA) has a multi-faceted compensation plan to ensure the provision of competent and thriving employees who are the basis for maintaining program continuity and uninterrupted, high-quality work. As with the other business systems it maintains, KSA’s compensation system includes the requisite policies, procedures, internal controls, and quality control review to ensure that its compensation system, both structurally and in execution, ensures the attraction, retention, and motivation of employees to direct their efforts toward achieving the goals of the Company that can only be achieved through the satisfaction and retention of the GSA STARS III Customer.
We are currently looking for personnel in the following fields:
- Business Intelligence Analyst
- Computer and Information Research Scientist
- Computer and Information Systems Manager
- Computer Hardware Engineer
- Computer Network Architect
- Computer Network Support Specialist
- Computer Operator
- Computer Programmer
- Computer Systems Analyst
- Computer Systems Engineer/Architect
- Computer User Support Specialist
- Data Warehousing Specialist
- Database Administrator
- Database Architect
- Document Management Specialist
- Geographic Information Systems Technician
- Geospatial Information Scientist and Technologist
- Information Security Analyst
- Information Technology Project Manager
- Management Analyst
- Network and Computer Systems Administrator, Software Developer (Applications)
- Software Developer (Systems Software)
- Software Quality Assurance Engineer and Tester
- Technical Writer
- Telecommunications Engineering Specialist
- Telecommunications Equipment Installer and Repairer
- Training and Development Specialist
- Video Game Designer
- Web Administrator
- Web Developer
Master Contract Number: 47QTCB21D0088
Contractor DUNS: 117611473, Cage Code: 8NZA6
Program Manager: Reginald Gillis, STARS3@keystrategicalliancellc.com