Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF MAY 29, 2009 FBO #2741
SOURCES SOUGHT

D -- Threat Computer Network Operation (CNO) Teams for Test and Evaluation events.

Notice Date
5/27/2009
 
Notice Type
Sources Sought
 
NAICS
541519 — Other Computer Related Services
 
Contracting Office
Department of the Army, PEO STRICOM, PEO STRI Acquisition Center, PEO STRI Acquisition Center, 12350 Research Parkway, Orlando, FL 32826-3276
 
ZIP Code
32826-3276
 
Solicitation Number
W900KK-09-SFAE-KOT-TCNO
 
Response Due
6/16/2009
 
Archive Date
8/15/2009
 
Point of Contact
Darlene Brakefield, 256-876-8579<br />
 
E-Mail Address
PEO STRI Acquisition Center
(darlene.brakefield@us.army.mil)
 
Small Business Set-Aside
N/A
 
Description
Request for Information (RFI) Closing Date: 16 June 2009 Description: The Program Executive Office for Simulation, Training and Instrumentation (PEO STRI)/ Project Manager for Instrumentation, Targets and Threat Simulators Threat Systems Management Office (PM ITTS TSMO) is seeking industry information and capabilities to conduct Threat CNO for Test and Evaluation events. Background: Threat Computer Network Operations (CNO) Team is a program which satisfies Army and DoD requirements for a threat representative CNO capability for Operational Testing as detailed in Department of Testing and Evaluation (DOT&E) guidance and the Army Test and Evaluation Command (ATEC)-sponsored Threat CNO Certification Process. Threat CNO Team provides a realistic representation of the threat capability through the use of properly trained teams and certified professionals capable of executing threat Computer Network Attack (CNA) and Computer Network Exploitation (CNE), in accordance with a Threat Test Support Plan (TTSP) and supporting a threat commanders objectives, while employing threat doctrine, tactics, and techniques (DTT). The CNO Team personnel must maintain the necessary training, certifications, and clearances to execute threat CNA on open and closed Army networks. The threat CNA/ Computer Network Exploitation (CNE) capability of the Threat CNO Teams can represent a broad range threat CNO forces against a spectrum of U.S. operating systems, networks, protocols, computer components; proprietary, open and owned standards, COTS and GOTS resources, and languages. CNA/CNE is accomplished using open source (whether threat attributable or in general) tools, doctrine, techniques, tactics, procedures and exploits to provide a complete testing/training threat CNO environment. In addition to the human element, exploitation tools and techniques that can be directly associated with the technologies (e.g. operating systems, protocols, applications) known to be used by and against the DoD are a focus of this CNA capability. It is also critical to account for other technologies that may not be officially used or widespread in their use (e.g. commercial wireless, applications) as these can be integrated with DoD purchases of commercial equipment and software. This CNO research identifies, develops, and integrates these current and next-generation technologies, processes, procedures, and functionalities into the Threat CNO Teams suite of threat CNO capabilities. PEO STRI is seeking experienced contractors who can provide the unique services stated in this RFI. Respondents/potential sources must possess the expertise and required resources to manage the complexities of the current and future Threat CNO Teams test support and certification requirements, and maintain experienced staff who can comprehend the complex and intricate requirements of the Threat CNO Teams mission. This effort will continue the ongoing Threat CNO support of the Threat CNO Teams program. Upon contract award, the contractor must be capable of executing all contract requirements within the critical timeframe stated. Specific requirements as follows shall be met: " Provide a four (4) man-year of on-site Threat Computer Network Operations (CNO) testing support, and be capable of providing an increase of one-two (1-2) man-years of support in following years. " Possess a TS/SSBI clearance with a preference given to personnel with an active SCI. " Possess and maintain active certification for the following: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) certification " Possess at time of award or obtain within eight months the Certified Information Systems Auditor (CISA) certification. " Personnel shall have level III Department of Defense (DoD) and Army Information Assurance (IA) certifications at the time of contract award " Shall have a firm knowledge of Net Admin (server/client, proxy appliances, SAN), Net Management (routers, switches, VPN concentrator) and Net Defense (security appliances, web proxy/cache flow) technologies and services as well as scripting and a fundamental understanding of programming. Shall be capable of using and configuring virtual 1machines. " Understand and apply hacking methodologies, Computer Network Defense (CND), Computer Network Attack (CNA), and Computer Network Exploitation (CNE). " Requires the use of Canvas, Metasploit, and Live distribution CDs to include BackTrack and Knoppix " Requires a minimum of five years of experience as a systems/network administrator or two years experience and Computer Science degree. " Requirements to obtain the U.S. Army 1st IO Commands Persistent Penetration and Exploitation (PP&E) certification within eight months of contract award. " Personnel shall maintain all necessary certifications through continuing education courses, as well as take any required new training as job requirements evolve. " Personnel shall travel in support of the aforementioned work. All travel shall be in accordance with the requirements and guidelines set forth in the Joint Travel Regulations (JTR). The following are Desirable Skills: " Experience as a software developer " MCSE Certification " CCNA Certification " Linux background Responses: THIS IS NOT A REQUEST FOR PROPOSAL. The intent of this RFI is to locate sources capable of meeting above stated requirements and to provide an opportunity for qualified contractors to respond accordingly. This RFI does not obligate the government to pay for the requested information nor respond to any submissions. Responses to this RFI must include pertinent information which would enable the Government to assess a firms capabilities to meet Government needs for the Threat CNO Teams program. At a minimum, responses shall provide the following: " Resumes that depict work experience and certification required for positions as stated in the specific requirements above. Please do not include social security numbers, home addresses or information of a personal nature. " A Copy of all certifications. " Provide experience in the form of an outline of previous projects with specific relevant work completed or currently being performed of equivalent magnitude and complexity of a similar nature, including contract numbers, description of work, points of contact, phone numbers and email addresses, professional qualifications and specific experience of personnel identified to perform the work. Additionally, this RFI is issued to assist in developing the Governments acquisition strategy and to determine if a set aside for Small Business Concerns is possible. A determination by the Government not to compete this effort based on any responses to this notice is solely within the discretion of the Government in accordance with FAR Part 6. Contractors shall indicate if they are a large or small business (if small, please indicate any applicable socio-economic status such as Small Disadvantaged Business (SDB), Service-Disabled Veteran-Owned Small Business (SDVOSB), 8(a), etc.), if they are interested in participating as the prime contractor or as a subcontractor, and if they are planning to team with other companies for this contract. If you are a small business and intending to prime this effort, please answer the following: " If you are expecting to prime this effort, can you meet the limitations of subcontracting, as stated in FAR clause 52.219-14, 50% of the cost of contract performance incurred for personnel shall be expended for employees of that concern. " Due to the delays that some time occurs in the DFAS system, do you have enough resources where you can go without payment for 60 to 90 days? Submission of Responses: Responses shall be as succinct as possible while providing actionable insight. Responses/ capability statements should not exceed five (5) pages inclusive of the cover sheet but excluding resumes and certifications. Submissions shall be sent in the form of text documents in MS Word, PowerPoint, or PDF presentations. Responses may be emailed or mailed using conventional postal delivery services. Information sent via email should be sent to Llane McGee@us.army.mil. However, if a size constraint on attachments prevents the use of email submission (limited to 10MB), conventional mail should be used. Respondents have a choice of sending one paper copy and/or one electronic copy (in Microsoft Word, Adobe PDF, and/or Microsoft PowerPoint on a CD) of the special notice response. All documents and disks must be clearly labeled with Threat CNO Teams Program Request For Information respondents organization, and points of contact. The conventionally mailed special notice response must be submitted to: U.S. Army PEO STRI Acquisition Team, ATTN:SFAE-STRI-PMITTS-S ATTN: Llane McGee, Bldg 4497, Digney Road, Redstone, AL 35898. Responses are due no later than 5:00 PM, Central Standard Time on 16 June 2009. DO NOT PROVIDE ANY PROPRIETARY INFORMATION DO NOT PROVIDE ANY CLASSIFIED INFORMATION TECHNICAL INQUIRIES TO THIS REQUEST FOR INFORMATIONSHOULD BE SUBMITTED TO Bradley Beckman at bradley.beckman@us.army.mil WITH COPY TO Llane.McGee@us.army.mil. MISSION INQUIRIES TO THIS REQUEST FOR INFORMATION SHOULD BE SUMITTED TO Llane McGee at Llane.McGee@us.army.mil. Disclaimers and Important Notes This RFI is issued solely for market research and planning purposes and does not constitute a solicitation. Respondents are advised that PEO STRI is under no obligation to acknowledge receipt of the information received, or provide feedback to respondents with respect to any information submitted under this special notice. Respondents are encouraged to monitor the FedBizOpps website for future business opportunities. In accordance with FAR 15.201(e) responses to this notice are not offers and cannot be accepted by the Government to form a binding contract. Responders are solely responsible for all expenses associated with responding to this Special notice. Submissions may be reviewed by the Government/PEO STRI and Systems Engineering and Technical Assistant (SETA) contractors. As required, non disclosure statements will be established with SETA contractors or any other type of support personnel (such as Federally Funded Research Development Centers personnel) supporting PEO STRI on this program. Point of Contact Llane McGee Contract Specialist ATTN: SFAE-STRI-PMITTS-S Bldg 4497, Digney Road Tel: 256-876-0970 DSN: 974-0970 Llane.McGee@us.army.mil
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/USA/STRICOM/W900KK/W900KK-09-SFAE-KOT-TCNO/listing.html)
 
Place of Performance
Address: Threat Systems Management Office Bldg 4497 Digney Road Restone Arsenal AL<br />
Zip Code: 35898-7461<br />
 
Record
SN01827966-W 20090529/090527235058-d713ee539a271238c8580dd6042731ea (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.