Category

Blog Posts

Innovation Empowerment That Drives Growth

By | Blog Posts

By Mark Peters, Innovation Analyst and VectorCSP Site Lead for Air Force Special Operations Command (AFSOC) Training Innovation Assisting, tracking, and monitoring the rapid transformation of Air Force Special Operation Forces (AFSOF) training is critical for our client’s ability to lead through accelerated and deliberate strategies. AFSOC training innovation support of the warfighter is maintained through a trusted partnership founded on projects that deliver significant tactical impact and keep in stride with the strategic priorities of the Special Operations Command and Washington. The AFSOC Training Innovation teams remain cognizant of warfighter needs and continually analyze return on investment (ROI) and…

Read More

Working With Thread… The New Social Fabric

By | Blog Posts

By Janis Nagy, Chief Strategy Officer I wanted to let everyone know about a project VectorCSP is working on with Thread, a non-profit based out of Baltimore. Thread engages underperforming high school students confronting significant barriers outside of the classroom by providing each one with a family of committed volunteers and increased access to community resources. They foster students’ academic advancement and personal growth into self-motivated, resilient, and responsible citizens. Their results are amazing, and I encourage all of you to check out their website and Facebook page. VectorCSP is using the Optimizing Human Performance (OHP) Front End Analysis (FEA)™…

Read More

What to do between Proposal Submittal and Award Notification: How VectorCSP Transitions Contracts

By | Blog Posts

By: Bob Burnett, Vice President of Business Development If you were to distill government contracting into two macro buckets, you would end up with two categories, pursuing work and doing work. For Business Development (BD) professionals, the pursuing work phase is where we live and breathe; despite that, we know that work is won or lost based on the doing work phase. Performance on current tasking is what drives increased technical capability, a great reputation, and highly rated Contractor Performance Assessment Reporting System (CPARS) from our clients. So, while BD folks may get the glory for “winning” new work, it is the…

Read More

Stoicism in Government Contracting – Part 4 – Speaking Latin

By | Blog Posts

By Bob Burnett, Director of OASIS PMO In this final installment of the 4-part series on Stoicism in Government Contracting, we focus on three more themes identified by The Daily Stoic that typify stoicism, namely Kindness, Amor Fati, and Memento Mori. Yes, you are reading correctly…those last two ideals are written in Latin, but we will get to that shortly. If you have read the previous posts in this series, you know that the general intent is to demonstrate how themes found in the philosophy of stoicism can be of great use to those of us who support government contracting…

Read More

Creating a Social Media Presence for a Government Contracting Company

By | Blog Posts

By: Frances Sherlock, Proposal Coordinator Like many small government contractors, VectorCSP has struggled to create a presence on social media. We had LinkedIn and Twitter profiles that we occasionally posted on. But there was no rhyme or reason to the posts – they happened when someone randomly remembered to post something. Was this bad? No. We had to push social media to the back burner while we focused on capture efforts and proposal bids. But that obviously didn’t help our social presence. An effective social media strategy requires consistently engaging, interacting, and posting in order to build a positive presence….

Read More

VectorCSP – Cut Through the Noise

By | Blog Posts

By: Damien Walz, Vice President of Business Development At VectorCSP, we work to cut through the noise. The confusing noise of the complex bureaucracies of our customers, the trivial noise of some of our self-important beltway contracting counterparts, the droning noise of the latest management theories and business buzzwords, and the unending noise of purposeless meetings and meetings and meetings. We accept that there will always be noise. Therefore, we will forever work to cut through the noise on behalf of our: Employees, who want to contribute to meaningful and actionable solutions, Teammates, who want to know that we are…

Read More

Foreign Interests, Technology, and Operations Security

By | Blog Posts

By David Wilson, Facility Security Officer and IT Manager In the business of government contracting, it is a huge mistake to ever let down your guard. There are adversarial groups, governments, and interests in all walks of life, and they are getting smarter, and much more technologically advanced. They understand the kinds of information and data they can use, and they understand how to get it. Here are a couple of recent examples. Until about a year and a half ago, Kaspersky antivirus was the product of choice for protecting your computers – work and home. It got the best…

Read More

Stoicism in Government Contracting – Part 3 – Don’t Give Up!

By | Blog Posts

By Bob Burnett, Director of OASIS PMO In this third installment of the four-part series on Stoicism in Government Contracting, we focus on three more themes identified by The Daily Stoic that typify stoicism, namely: Duty, Pragmatism, and Resiliency. These traits are especially useful in the world of government contracting. Any government contractor doing their job well understands the importance of Duty, even if they don’t always consider how their function supports the larger picture. Any government contractor who has yet to go mad trying to keep up with the fickle and capricious nature of our federal government must possess…

Read More

The Very Real Danger of E-Mail Phishing Scams to Business Security

By | Blog Posts

By David Wilson, Facility Security Officer and IT Manager E-mail security has been identified as one of the top threats, if not the top vulnerability in government and industry cyber-security. Millions of phishing attempts are made daily by hackers, automated bots, and sophisticated programs dredging for everything from identities to steal, to confidential information and embarrassing data that could be used for blackmail. The scope and size of these operations is vast, but in recent years, a more identifiable pattern has emerged. A recent article on MSN News from the Associated Press details how Russian hackers known by the code…

Read More