© 2018 First Consulting, Inc.  All rights reserved.

CORE SERVICES

First Consulting, Inc. employs over 120 consultants with expertise and experience in four core service areas.

SOFTWARE ENGINEERING

Expertise in Agile development methodology, object oriented (including UML) and structured analysis design with experience in all phases of software development from requirements definition, through system design, documentation, testing, and implementation.

EMBEDDED ENGINEERING

Significant experience in embedded engineering for medical devices, print devices, GPS and ARM microprocessors, which are often under strict FAA and FDA regulations.

MAINFRAME SERVICES

Knowledgeable about mainframe computers with an understanding of the special challenges of maintaining the mainframe functionality and adapting their use with modern computing methods. Our engineers possess skills in various languages (COBOL, Eztrieve, Informatica, and SQL); various databases (DB2, Oracle, and IMS); as well as CICS servers.

Engineering Services

SOFTWARE TESTING

Assist in the process of validating and verifying that your software program, application, or product meets the business and technical requirements that guided its design and development.

​MEDICAL DEVICES SOFTWARE TESTING

Significant experience in testing medical devices that are under strict FDA regulations.

STATISTICAL ANALYSIS

Ensure that sound statistical practices are used to collect and analyze data for compliance to Federal directives; design sample plans, perform data analysis, and develop statistical material for clinical submissions to federal regulatory agencies such as 510(k), PMA, IDE.

Independent

Verification & Validation

VULNERABILITY ASSESSMENTS

Perform in-depth or impromptu threat analysis to identify threats to cyberinfrastructure.

PENETRATION TESTING

Test a system, network, or application to find weaknesses that an attacker could exploit.

HIPPA/HITECH COMPLIANCE

Ensure that your system has all the required physical, network, and process security measures in place and confirm they are being followed. 

PCI COMPLIANCE

Ensure that your system follows a proprietary information security standard for handling branded credit cards from the major card companies.

NETWORK INFRASTRUCTURE HARDENING

Review your system to find ways of reducing its surface of vulnerability.

Cybersecurity

Technical Documentation

INSTRUCTIONAL DESIGN

Proven record of developing customized training—web-based, instructor-led, blended, and gamification—designed to meet the specific challenges of an organization.

COMPLIANCE DOCUMENTATION

Review existing documentation to conduct a gap analysis that identifies areas needing new documentation; lead sessions to validate the accuracy of written procedures; and create ISO certification documentation for compliancy.

POLICY, STANDARDS, PROCEDURE DOCUMENTATION

Interview subject matter experts to understand specific business processes and then provide clear step-action procedures that fulfill policy and standards.

OTHER TECHNICAL DOCUMENTATION

Extensive experience in writing user manuals, administrative manuals, service manuals, and quick reference guides.