top of page
We design electrical transmission solutions for utility clients by leveraging our experience as engineers, electricians, and builders.
ELECTRICTY IS OUR CORE
THE FUNDAMENTAL OF OUR GROWTH
IEC was founded on engineering principles by a Ph.D in electrical engineering.
Our approach begins with understanding our clients immediate and long-term needs and challenges. Designs reflect a comprehensive understanding of client standards, emerging standards of smart systems, security concerns, and the unique dynamics and challenges of a specific site. Our perspective of as a national electrical contractor benefits each design with a perspective of constructability, reliability, and maintainability.
Simply put, our mission is to allow our clients to execute their mission. In other words, we need to listen and understand how our clients define success and what stands in the way of them reaching their goals.
Our Design process begins with understanding our client's mission to engineer a solution that meets the needs for today and tomorrow.
We plan, design and build generation connections that tie renewable , commercial, and industrial sites to the power grid across the United States.
SUBSTATION REBUILDS & UPDATES
Designs that maximize the utility spend to address immediate needs and long-term goals to update existing infrastructure to support the needs of the future.
Comprehensive design elements to factor in the nuances of each project site, market, and client including civil, structural, communications, and switchability considerations.
IEC 61850 compliance and support. Utilizing the best practices of the integrated ‘smart-grids’ and clients current infrastructure.
using imaging tools (VR and AR) to model and visualize project elements in the preconstruction phase to identify and address project risks.
Strategic perspective on meeting the regulatory and commonsense requirements to protect your substation investment. Compliance with NERC CIP-014 can be met and exceeded with careful considerations of resource allocation, technology deployment, and asset management. All of which are incorporated in our comprehensive security analysis.
bottom of page