1. Home
  2. Companies
  3. ITHR Technologies Consulting LLC
IT

ITHR Technologies Consulting LLC

About

At ITHR, we deliver comprehensive IT and HR solutions that go beyond conventional approaches. We specialize in combining cutting-edge AI innovations with industry best practices to create tailored solutions that meet the unique needs of each client. Our expertise spans IT strategy, software development, cloud computing, network and security, data management and analytics - all designed to help organizations navigate complexity and achieve sustained growth.

What sets us apart is our people-first approach. We don't see ourselves as just a service provider, but as a true partner in our clients' success. Whether it's through C-Suite head hunting, staff augmentation, recruitment outsourcing, or HRIS implementation, we leverage AI technology to identify and attract top talent efficiently. Our team of expert technologists and HR professionals work collaboratively to ensure alignment with business objectives, driving measurable results and operational excellence.

Open roles at ITHR Technologies Consulting LLC

Explore 1 open positions at ITHR Technologies Consulting LLC and find your next opportunity.

IT

Enterprise Account Manager - Cybersecurity

ITHR Technologies Consulting LLC

Dubai, Dubai, United Arab Emirates (Hybrid)

2w ago

Similar companies

PC

ProSidian Consulting, LLC

ProSidian Consulting is an integrated management and operations consulting firm with a national practice spanning six solution areas: Risk Management, Compliance, Business Process, IT Effectiveness, Energy and Sustainability, and Human Capital. Launched by former Big 4 management consultants, the firm brings together nearly 190 professionals who deliver tailored solutions to private companies and government agencies of all sizes. ProSidian's multidisciplinary teams provide immediate access to staff expertise capable of seamlessly responding to complex project needs. The firm deploys a "Structured Approach to Strategic Solutions" that targets drivers of economic profit - growth, margin, and efficiency - while aligning at the intersections of assets, processes, policies, and people. ProSidian assists client leaders in improving operations and maximizing return on investment capital through strategically diversified business and technical services. The company serves clients across Manufacturing, Banking & Financial Services, Consumer Products & Retail, Energy & Utilities, and Federal, State & Local Government Agencies.

8 jobs
GT

Gainwell Technologies LLC

Gainwell Technologies runs the digital infrastructure behind Medicaid processing for over 60 million beneficiaries across all 50 states - a surface area that makes it a tier-one target. The company operates cloud-enabled platforms handling real-time claims, eligibility verification, and analytics for state health agencies, which means the threat model spans patient data integrity, payment fraud, and service continuity for vulnerable populations. With over five decades in public health IT, the stack includes ServiceNow, SQL Server, Tableau, and hybrid Windows/Linux environments tied to Active Directory - legacy modernization in motion, with all the exposure that entails. The security posture here isn't about protecting a consumer app; it's about defending critical state infrastructure where downtime or breach directly impacts healthcare access. Real-time Medicaid processing demands low-latency resilience and tight access controls across federated state systems. The technical domains - cloud migration, healthcare IT, and analytics platforms - require practitioners fluent in compliance frameworks like HIPAA, FedRAMP, and state-specific security mandates, plus the operational discipline to secure hybrid environments at scale. No room for abstraction: the adversaries targeting this sector are persistent, well-resourced, and motivated by both financial gain and data exfiltration. Gainwell's challenge is classical but high-stakes: modernizing legacy public sector systems while hardening them against contemporary threats. The work involves threat modeling for multi-tenant cloud architectures, securing API layers that connect state agencies, and instrumenting visibility across a geographically distributed infrastructure. If you care about defending systems that actually matter - where failure isn't measured in user churn but in denied healthcare claims - this is the domain.

1 job
IT

Infinity Technology Services, LLC (ITS)

At ITS, we believe that mission success comes from a team of dedicated professionals who bring both technical expertise and a deep commitment to national security. As a minority-owned, Certified Service-Disabled Veteran-Owned Small Business (SDVOSB), we combine the discipline of military service with cutting-edge engineering capabilities to deliver solutions that matter. Founded in 2017 and headquartered in Colorado Springs, Colorado, we have grown from 11 employees to over 130 team members who are passionate about supporting critical space and defense missions. Our culture emphasizes ownership, excellence, and the importance of every team member's contribution to our collective success. We specialize in providing engineering and advisory services for government and commercial sectors, with particular expertise in space systems, ground systems, and cybersecurity. Our team of engineers, analysts, and technical specialists work directly on programs that shape the future of space operations and national defense. From supporting the U.S. Space Force's Battle Control Center Cyber Maintainer Course to conducting test and evaluation for STARCOM, our work has real-world impact. We operate with the agility of a small company and the technical depth of a large organization, allowing us to adapt quickly to emerging challenges while maintaining the highest standards of quality and security. At ITS, we don't just complete projects - we build careers, foster professional growth, and create an environment where innovation thrives alongside mission-critical discipline.

BL

By Light Professional IT Services LLC

By Light Professional IT Services LLC, founded in 2002, is a leading provider of innovative IT, infrastructure solutions, and full spectrum cyberspace operations for U.S. Federal and State Government agencies. What began as a small Veteran-owned business has grown into an expanding and thriving large company with Federal and Commercial clients around the globe. The company recognizes the current and future needs across all industries to secure information and communications databases, networks, and systems from malicious actors while maximizing reliability and efficiency. By Light has grown substantially in the past few years, both organically and through strategic acquisitions such as Cole Engineering Services. By Light has built a strong portfolio, stepping to the forefront of cutting-edge technology in key market growth areas of IT and Cyberspace Operations and Security; Network Services, Integration, and Operations; Cloud and Managed Services; Artificial Intelligence; Software Services; and Satellite and Wireless Communications. The company readies warfighters and federal agencies with technology and systems engineered to connect, protect, and prepare individuals and teams for whatever comes next.

OC

OCT Consulting, LLC

OCT Consulting, LLC is an SBA-certified small business that has been delivering professional services and IT solutions to U.S. federal government clients since 2013. Founded by Atul Kathuria, a former Booz Allen Hamilton consultant, the company operates across management consulting, cybersecurity, strategic planning, data analytics, and acquisition support. The firm maintains multiple government contract vehicles and positions itself as combining small business agility with large consultancy expertise - a claim it backs by serving as a recurring advisor to federal agencies navigating process optimization and operational efficiency challenges. On the technical side, OCT's cybersecurity practice operates within a broader IT solutions portfolio that includes data analytics capabilities. The company's federal-focused work means threat models center on compliance frameworks, agency-specific security requirements, and the particular constraints of government IT environments. Teams work directly with agencies on both strategic planning and hands-on implementation, though specific tooling, scale of security operations, or depth of specialized practice areas remain undisclosed in public materials. The firm has grown from startup to established federal contractor over the past decade, though employee count and revenue figures aren't publicly available. OCT's client base consists entirely of U.S. federal government agencies, which shapes both the operational tempo and the nature of problems teams encounter - long procurement cycles, clearance requirements, and the intersection of policy and technology. The company emphasizes innovation culture internally, but federal consulting work ultimately means balancing technical solutions with bureaucratic navigation and regulatory compliance.

CT

Crosslake Technologies LLC

Crosslake Technologies conducts technical due diligence and risk assessment for private equity deals where software and infrastructure are material to valuation. Since 2010, the firm has evaluated over 6,000 technology investments for 500+ PE firms globally, focusing on threat surface mapping, technical debt quantification, and operational security posture before capital commits. Their proprietary TechIndicators® platform benchmarks target companies against $30 billion in transaction data - measuring everything from cloud architecture hygiene to identity management maturity across AWS, Azure, and GCP environments. The threat model here is investor exposure: acquirers inheriting unpatched systems, weak access controls, or compliance gaps that crater post-close valuations. Crosslake's practitioners - former senior executives averaging 20+ years in the field - assess Active Directory configurations, EDR/MDR deployment, and authentication frameworks like Office365 and G Suite to surface hidden liabilities. They also deploy interim CISOs into portfolio companies during integration windows when security leadership is absent or transitional. Beyond diligence, the firm provides strategic advisory on technology integration and value creation post-acquisition. This includes rationalization of overlapping security tooling, remediation roadmaps for critical vulnerabilities, and infrastructure consolidation across merged entities. The work is empirical and transactional - no vision decks, just concrete risk registers and benchmarked security postures that shape deal terms or kill transactions outright.