About us

Intelligence Consulting Management Federal

Established in 2022, Intelligence Consulting Management is a professional services company that provides sustainable competitive advantage for our federal and private sector clients through consistent delivery of timely, value-added consultation and innovative solutions. Intelligence Consulting Management is headquartered in Los Angeles, California.

Who We Are

ICM Federal, a Disadvanatge woman owned small business, is a global service provider of multi-disciplined, management-consulting firm specializing in contract compliance and administration, the design, development and implementation of Disadvantaged Business Enterprise (DBE), Labor Compliance, and Project Labor Agreements (PLA), Title VI program models, including Equal Employment Opportunity (EEO) Non-Discrimination provisions, job training and placement, Community Outreach, ADA compliance, Grants & Funding Administration and referral programs, including Local Hire initiatives.

Vision

Professional Services for Competitive Advantage

Mission

Blending Expertise for a Comprehensive Approach

Core Values

Excelence | Diversity | Integrity

COMMITTED EXPERTS

Intelligence Consulting Management is committed to advancing our clients, government, and partner’s national security and economic interests by executing a range of strategic and tactical consultation services, targeted execution, and preempting cybersecurity threats by offering state of the art innovations to propel their operational effectiveness, efficiency, and cost savings.

Capabilities:

Intelligence Consulting Management (ICM) is well positioned to provide enterprise hybrid technology solutions to advance our clients bridge the gaps between agencies in supporting the warfighter and link 16 communication agencies receiving threat information data across the globe.

Commitment:

ICM aims to become your trusted technical solutions partner by delivering timely, valuable solutions. We will protect your data and resources across multiple zero-trust secured and unsecured enclaves as well as deploy cloud-based security to include pen-testing, auditing, and ensure a fully vetted cybersecurity readiness posture.

Accessibility Toolbar