SPECIAL NOTICE
D -- RECOVERY - Department of State Security Assurance Services & Innovation
- Notice Date
- 5/26/2009
- Notice Type
- Special Notice
- NAICS
- 541519
— Other Computer Related Services
- Contracting Office
- Department of State, Office of Logistics Management, Acquisition Management, P.O. Box 9115, Rosslyn Station, Arlington, Virginia, 22219
- ZIP Code
- 22219
- Solicitation Number
- 08L3182
- Point of Contact
- Lanah B Hamrick, Phone: 7038756842
- E-Mail Address
-
hamricklb@state.gov
(hamricklb@state.gov)
- Small Business Set-Aside
- N/A
- Description
- Description: In compliance with the transparency and accountability requirements associated with the supplemental appropriations provided by the American Recovery and Re-Investment Act of 2009, Publ.L. 111-5, THIS NOTICE IS PROVIDED FOR INFORMATION PURPOSES ONLY, IAW FAR 5.704, Publicizing – Preaward. The Government posts this notice of intent to issue a modification to existing Department of State Task Order S-AQMMA-08-L-3182 with Systems Research and Applications Corporation (SRA) located 4350 Fair Lakes Court, Fairfax, Virginia 22033-4232. The pending modification will add Functional Task Area 7.12, Improved Defense Sensors; Functional Task Area 7.13, Hardened IT Security Infrastructure; and Functional Task Area 7.14 Classified Systems Assessments. 7.12 ARRA - Improved Defense Sensors Provide technical and management support for implementing capabilities for improved network defense. Specific activities include the following: Network Defense Monitoring and Response •Support evaluation, testing, and implementation of capabilities to increase proactive network defense, such as capabilities for monitoring and trend analysis of attempted external attacks •Support evaluation, testing, and implementation of capabilities for monitoring the protection of Personal Identifiable Information (PII) •Perform security monitoring and respond to incidents involving network defense or PII •Coordinate network defense and PII protection activities with Department entities such as ENM and IRM/IA •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Network Defense Threat Analysis •Research, evaluate and implement advanced threat identification and analysis capabilities to provide for proactive and improved network defense •Determine and analyze risk exposure of PII, identifying potential threats and vulnerabilities •Participate in implementation of network defense sensors and PII safeguards •Coordinate network defense and PII protection activities with Department entities such as ENM and IRM/IA •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Network Defense Capabilities •Research, evaluate, test and recommend security tools and capabilities to improve network defense and guard against and track cyber attacks •Research, evaluate, test and recommend capabilities for monitoring and preventing PII data loss •Support implementation of network defense sensors and PII monitoring tools •Develop security guidelines for new technologies, to include software and hardware, to be implemented within the Department to ensure proper protection of information assets •Coordinate network defense and PII protection activities with Department entities such as ENM and IRM/IA •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review 7.13 ARRA - Hardened IT Security Infrastructure Provide technical and management support to provide for a more secure network infrastructure as part of the DoS IT infrastructure modernization. Specific activities include the following: Enhanced Security Infrastructure •Contribute technical expertise in the development and implementation of the modernized, state-of-the-art DoS IT infrastructure •Support implementation of increased regionalization, expanded use of HIDS / HIPS, network acceleration, routers, encryption, and enclave capabilities •Support implementation enterprise wide HIPS, PII protection capabilities and other safeguards •Perform technical Interface and coordination with ENM, IRM/IA and other Department entities involved in DoS IT infrastructure modernization •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Advanced Threat Analysis Capability •Contribute technical expertise in the development and implementation of the modernized, state-of-the-art DoS IT infrastructure •Research, evaluate and recommend advanced threat identification and analysis capabilities for the modernized DoS IT infrastructure •Support evaluation and implementation of safeguards for the modernized DoS IT infrastructure and for reducing risk exposures of PII •Perform testing, integration, and implementation of advanced threat analysis tools to include pilot testing, rollout, acceptance testing, transition and operation support •Perform technical Interface and coordination with ENM, IRM/IA and other Department entities involved in DoS IT infrastructure modernization •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Security Tools Life Cycle •Contribute technical expertise in the development and implementation of the modernized, state-of-the-art DoS IT infrastructure •Perform life cycle activities to incorporate enhanced security tools in support of DoS IT infrastructure modernization •Research, evaluate and integrate security technology to support the new DoS Firewall architecture •Research, evaluate and integrate security technology to support increased regionalization, expanded use of HIDS / HIPS, network acceleration, routers, encryption, and enclave capabilities •Support evaluation and testing of PII safeguards •Develop security guidelines for the modernized DoS IT Infrastructure •Perform technical Interface and coordination with ENM, IRM/IA and other Department entities •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review 7.14 Classified Systems Assessments Provide technical and management support for increasing the security of Department’s classified systems and interfaces and connectivity with Department of Defense’s SIPRNet and other classified systems. Specific activities include the following: Classified Systems Security Monitoring and Analysis •Perform technical analysis and evaluation of security monitoring and incident response tools for the Department’s SECRET and SBU/FOUO networks •Support extension of Desktop End Point Protection capability across the Department’s SECRET and below networks •Support enhanced classified network defense to ensure compliance with ODNI FDCC mandates •Monitor classified networks for signs of intrusion to include network access control to prevent un-patched or potentially compromised hosts from connecting to the Department’s networks •Provide technical expertise for increasing the security of the Department’s classified systems and interfaces/connectivity with SIPRNet and other classified systems •Perform technical interface and coordination with entities managing and operating classified networks at the Department of State, Department of Defense and other Government agencies •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Classified Systems Threat Analysis •Research, evaluate and recommend advanced threat identification and analysis capabilities for the Department’s classified systems •Support testing, integration, and implementation of advanced threat analysis tools for classified systems to include pilot testing, rollout, acceptance testing, transition and operation support •Provide technical expertise for increasing security of the Department’s classified systems and interfaces/connectivity with SIPRNet and other classified systems •Perform technical interface and coordination with entities managing and operating classified networks at the Department of State, Department of Defense and other Government agencies •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Classified Systems Security Tools Life Cycle •Research, evaluate and implement security technology and tools to provide for improved security for classified systems •Provide technical expertise for increasing the security of the Department’s classified systems and interfaces/connectivity with SIPRNet and other classified systems •Support extension of Desktop End Point Protection capability across the Department’s SECRET and below networks •Support enhanced classified network defense to ensure compliance with ODNI FDCC mandates •Support inspections and assessments of DoS classified systems similar to those conducted for the SIPRNet •Perform technical interface and coordination with entities managing and operating classified networks at the Department of State, Department of Defense and other Government agencies •Provide subtask monthly status reports as part of the Program and Task Status Report by the 15th of each month, containing details as described in paragraph 7.l, Program Management and Administration •Report on quality performance measures quarterly as part of the overall Program performance review Deliverables are added as follows for these Functional Task Areas: Improved Defense Sensors: •Monthly activities report as Monthly Task Status Report (Section 7.12) – due 15th of each month – Frequency: Monthly. •Quarterly Performance Measures Report as part of Overall Program Performance Review (Section 7.12) – due May 31st, August 31st, November 30th, and February 28t – Frequency: Quarterly. Hardened IT Security Infrastructures: •Monthly activities report as Monthly Task Status Report (Section 7.13) – due 15th of each month – Frequency: Monthly •Quarterly Performance Measures Report as part of Overall Program Performance Review (Section 7.13) – due May 31st, August 31st, November 30th, and February 28th – Frequency: Quarterly Classified Systems Assessments: •Monthly activities report as Monthly Task Status Report (Section 7.14) – due 15th of each month – Frequency: Monthly •Quarterly Performance Measures Report as part of Overall Program Performance Review (Section 7.14) – due May 31st, August 31st, November 30th, and February 28th – Frequency: Quarterly Performance Measures. The existing QASP (Quality Assurance Surveillance Plan is modified to add the following measures for the new Functional Task Areas. 1. Required Service: Defense Monitoring and Response: Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Methods to be Used: Periodic Inspection Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD 2, Required Service: Timeliness & Quality: Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Methods to be Used: Random Inspection (Judgmental Inspection) Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD Performance Standard: AQL: Monitoring Methods to be Used: Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD ************************************************************************************ 1, Required Service: Network Defense Threat Analysis Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Methods to be Used: Periodic Inspection Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Methods to be Used: Random Inspection (Judgmental Inspection) Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD ************************************************************************************ 1. Required Service: Network Defense Capabilities Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Methods to be Used: Periodic Inspection Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD 2.Required Service: Timeliness & Quality Performance Standard: Recommended/Engineered solutions produce the desired outcome AQL: Meets: produce the desired outcome Unsat: do not produce the desired outcome Monitoring Methods to be Used: 100% Inspection (Judgmental Inspection) Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Methods to be Used: Random Inspection (Judgmental Inspection) Monitoring Performed by Date(s): TBD Compliance with Performance Standards: TBD *********************************************************************************** 1. Required Service: Enhanced Security Infrastructure Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Method to be Used: Periodic Inspection Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Method to be Used: Random Inspection (Judgmental Inspection) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 1. Required Service: Advanced Threat Analysis Capability Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Method to be Used: Periodic Inspection Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Method to be Used: Random Inspection (Judgmental Inspecton) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD ************************************************************************************ 1. Required Service: Security Tools Life Cycley Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Method to be Used: Periodic Inspection Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Recommended/Engineered solutions produce the desired outcome AQL: Meets: produce the desired outcome Unsat: do not produce the desired outcome Monitoring Method to be Used: 100% Inspection (Judgmental Inspection) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 3.Required Service: Classified Systems Security Monitoring and Incident Response Capabilities Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Method to be Used: Random Inspection(Judgmental Inspection) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD ************************************************************************************ 1.Required Service: Classified Systems Security Monitoring and Incident Response Capabilities Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Method to be Used: Periodic Inspection Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Method to be Used: Random Inspection (Judgmental Inspection) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD ************************************************************************************* 1. Required Service: Classified Systems Threat Analysis Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Method to be Used: Period Inspection Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Method to be Used: Random Inspection (Judgmental Inspection_ Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD *********************************************************************************** 1. Required Service: Classified Systems Security Tools Life Cycle Performance Standard: Complete all tasks and deliverables by established due dates AQL: Meets: > 95% on time Unsat: < 95% on time Monitoring Method to be Used: Periodic Inspection Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 2. Required Service: Timeliness & Quality Performance Standard: Recommended/Engineered solutions produce the desired outcome AQL: Meets: produce the desired outcome Unsat: do not produce the desired outcome Monitoring Method to be Used: 100% Inspection (Judgmental Inspection) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD 3.Required Service: Timeliness & Quality Performance Standard: Deliverables address all required elements and reflect technical depth and competency AQL: Meets: address all required elements and reflect technical depth and competency Unsat: do not address all required elements or reflect technical depth or competency Monitoring Method to be Used: Random Inspection (Judgmental Inspection) Monitoring Performed by/Date(s): TBD Compliance with Performance Standards: TBD Monitoring/Evaluation The Department of State will enhance its disciplined Capital Planning and Investment Control (CPIC) process by increasing the level of scrutiny and frequency. These processes include project life-cycle methodology with rigorous earned value management, which will show us the bang for the buck as the project proceeds. Progress reports that include earned value data will be distributed monthly. Project Managers are/will be certified by the Project Management Institute and trained in the Department of State’s standard project management methodology. This effort will use a set of formal, established measures to ensure it achieves the desired outcome(s) and executes appropriately. Transparency The Department of State will continue to use its annual performance planning process as a basis for public reporting. The Department of State will also include all applicable information on the Recovery.gov website, which is linked to our primary website State.gov: The delivery order being modified was competitively awarded under the Department of State’s Security Assurance Services and Innovation (SASI) Blanket Purchase Agreements. The combination firm-fixed price and time-and-materials modification that will be awarded is estimated to be $10.5 million for the performance period of the ARRA funding. This modification will increase the total ceiling of the task order from $85.3 million to an estimated ceiling of $95.8 million. Contracting Office Address: U.S. Department of State Office of Acquisition Management Information Systems Branch P.O. Box 9115 – Arlington Station Arlington, Virginia 22219 Primary Place of Performance: U.S. Department of State Bureau of Diplomatic Security (DS/SI/CS) 1801 North Lynn Street (SA-20) Rosslyn, Virginia 22091 Primary Point of Contact: Lanah Hamrick Contracting Officer hamricklb@state.gov Phone: 703-875-6842
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/spg/State/A-LM-AQM/A-LM-AQM/08L3182/listing.html)
- Place of Performance
- Address: U.S. Department of State, Bureau of Diplomatic Security (DS/SI/CS), 1801 North Lynn Street (SA-20), Rosslyn, Virginia, 22091, United States
- Zip Code: 22091
- Zip Code: 22091
- Record
- SN01826970-W 20090528/090526234920-15caf0e12642c7a6265d79db50a8c0e6 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |