PERS-54 Information Technology Division
The five branches within this division are IT Engineering IPERS 54I), IT Management (PERS 542), IT Services (PERS 543), IT Operations (PERS 544) and Information Assurance Branch (PERS 545).
PERS-541 IT Engineering Branch
This branch is responsible for delivering secure, affordable, next generation technologies and business capabilities that support Total Force Lines of Business. This Branch provides project management and application, system, and network engineering efforts in support of NPC applications.
PERS-542 IT Management Branch
This branch is like the business operations department for PERS-54. This branch provides Program Of Record management for several IT POR's. This branch facilitates IT procurements and monitors maintenance renewals and also provides the MICP and tasker management for the Division.
PERS-543 IT Services Branch IT Customer Service (NMCI/NGEN)
We would all be without a computer and internet services if it weren't for this branch. This branch is the workhorse of the command when it comes to providing IT support and services. The major responsibilities of this branch include, but not limited to, providing NMCI support services to NPC, processing Move, Add, or Change requests, operating the NPC Messaging services, VTC services, constructing NMCI security groups, managing NMCI shared folders, and maintaining the IT inventory.
PERS-544 IT Operations Branch
This branch provides the daily operations of the command IT systems including BOL, EMPRS, and Selection Boards. This branch provides the testing services required to deploy new or changed applications to the network. It also provides NPC IT Helpdesk services.
PERS-545 Information Assurance Branch
Some of the major responsibilities of this branch include developing and maintaining NPC Information Assurance program, granting access to users, managing systems access, and handling security incidents. Additionally, this branch is responsible for ensuring users and system support personnel have the required security clearances, authorization, and are indoctrinated on command security practices before granting access to information systems.