MODIFICATION
D -- Cyber Security Services
- Notice Date
- 12/30/2014
- Notice Type
- Modification/Amendment
- NAICS
- 541519
— Other Computer Related Services
- Contracting Office
- United States Senate, Office of the Sergeant at Arms, Finance Division, United States Senate, Washington, District of Columbia, 20510-7207, United States
- ZIP Code
- 20510-7207
- Solicitation Number
- SSN_2015-S-022
- Archive Date
- 1/30/2015
- Point of Contact
- Corazon R. Carag, , Jill T Johnson, Phone: 202-224-8498
- E-Mail Address
-
acquisitions2012@saa.senate.gov, jill_johnson@saa.senate.gov
(acquisitions2012@saa.senate.gov, jill_johnson@saa.senate.gov)
- Small Business Set-Aside
- N/A
- Description
- DESC: MARKET SURVEY AND BIDDERS LIST DEVELOPMENT - SOURCES SOUGHT REQUEST FOR CYBER SECURITY SERVICES. The purpose of this sources sought notice is to gain knowledge of potential qualified industry sources for providing cyber security infrastructure support services to the United States Senate, Office of the Sergeant at Arms (Senate or SAA). The Office of the CIO within the SAA has a broad range of responsibilities that includes providing a secure cyber environment in which to carry out Senate business. The current approach for the delivery of these cyber security infrastructure support services incorporates the use of the Senate's Security Operations Centers (SOCs) staffed by Contractor and Senate personnel using Senate furnished equipment (SFE) and systems (Current Approach). The Senate is considering two options for the procurement of cybersecurity support services: Option A Procure all of the cyber security support services using the Current Approach which employs a Contractor providing the support services listed under the Mandatory Service Capabilities section and the Optional Tasks section below and the personnel located in Senate premises to manage and operate the Senate's Security Operations Centers (SOCs) using Senate furnished equipment (SFE) and cyber security systems together with Senate personnel; Option B Procure some of the cyber security support services using the Current Approach as described in Option A with the Contractor providing the support services listed under Mandatory Service Capabilities section and the Optional Tasks section below; and the remaining services delivered as a structured Managed Security Service (MSS) offering with the appropriate Service Level Agreements from the Contractor's premises. The Senate's primary candidates for services to be provided as an MSS are noted with a double asterisks (**) below. For the services provided as an MSS, the Senate must maintain sole custody of its data. The Senate will require access to alert metadata to respond to incidents generated by internal sources. All the services to be provided must be delivered by personnel who are United States (U.S.) citizens working in facilities located in the U.S., and using systems, including, but not limited to, computers, storage arrays, networks and ancillary devices that are also located within the U.S. All requirements listed below are mandatory unless otherwise noted. This sources sought notice is not a request for proposal and in no way obligates the Senate to an award of a contract. This sources sought notice is based on currently available information. This information is subject to change at any time. Requirements are stated in terms of minimum capabilities and characteristics required by the Senate. MANDATORY SERVICE CAPABILITIES The key functional areas under consideration include, but are not limited to, the following: (1) Program Management, Quality Assurance Management, and SOC Contractor Supervision: Provide program management services to organize, manage, and provide regular reporting on contractor-executed services to the designated government staff lead for each of the services described herein. (2) ** Network Security Monitoring / Analysis and Security Incident Reporting: Monitor networks to assist the SAA in ensuring the integrity, availability, and confidentiality of the Senate Information Technology (IT) infrastructure. Provide Tiers 1 and 2 incident reporting and analysis support around-the-clock from offeror's or Senate's facilities under prescribed service levels. All incidents are escalated to a Senate-staffed incident response team. Senate defines levels as: a. Tier 1: A fully automated analytic capability, whereby offeror's analysts review and examine alerts. b. Tier 2: Offeror reports incidents with full assessment ready for Senate staff to carry to resolution. c. Tier 3: Senate staff incident response team carries incidents to resolution. (3) ** Cyber Threat Analysis: Provide enhanced cyber security analytical services to support Advanced Persistent Threat (APT) and cyber operations. Subject Matter Experts (SMEs) with experience and expertise in advanced technology to support this capability are required. Services will include preparation and delivery of analytic reports providing indications and warnings (i.e., situational awareness) of threats and potential threats to the Senate's IT infrastructure using both open and classified sources. Perform analysis of cyber threat intelligence information from internal and external sources, including short and long-term security event trends. Perform advanced technical analyses and operational security analyses of computer and network systems, including malware submissions from Senate users, using network or host security monitoring systems. Perform short and long-term security event trend analysis. APT prevention, integration and assurance efforts shall include, but not be limited to: a. Analysis (security event logs, malware, indicators of compromise, intelligence reports, forensics, media analysis). b. Reporting and sharing threat information (internal and external) c. Threat operations (identify, prevent, detect, contain, deter and resolve threat activity) d. Threat research (open and closed) (4) ** Security Research and Engineering: Research, evaluate, test, and deploy security technologies, products, and integrated systems for safeguarding, monitoring, assessing, and investigating the security posture of Senate IT assets. (5) ** SOC Automation & Monitoring Systems: Optimize existing workflow processes and develop new, effective methods or enhancements to identify, scope, and track potential security events, escalating, as appropriate, to a Senate-staffed incident response team. Streamline monitoring processes using the Security Information and Event Management (SIEM) console and develop and/or assist in development of reporting dashboards. (6) ** Vulnerability Analysis: Support the Senate vulnerability management program through the use of vulnerability assessment tools and other methods. Tasks are assigned and priorities are set by the government staff service lead. Tasks may include operating and maintaining enterprise vulnerability assessment tools, conducting security scans, generating reports, conducting trend analyses, producing risk reduction recommendations for the customer, and other associated tasks as assigned. Vulnerability assessment and analysis may address both internal and external (publicly accessible) systems. Personnel must have demonstrable, working knowledge and experience conducting vulnerability assessments and providing recommendations to reduce IT operational risk in an enterprise environment. Senate staff is responsible for remediation. (2 FTE) (7) ** SOC IT Engineering, Operations & Maintenance: Provide around-the-clock engineering, operations and technical support at the Senate's facilities to maintain mandatory service levels for SOC IT infrastructure and other security technologies as specified. Examples include operating and maintaining Senate network and host monitoring systems, intrusion detection/prevention systems, and SIEM infrastructure, along with all relevant data sources. Use knowledge gained in functional area (2) to optimize, tune, and augment these technologies to enhance security event detection, identification, and investigation. Develop and maintain a testing and development environment to support the deployment of new SOC-related technologies. Develop and maintain automated methods for monitoring and maintaining SOC IT infrastructure and services. (8) **Endpoint Security Infrastructure Support: Support the Senate endpoint client security program through the use of existing endpoint security technologies, tools, and methods. Tasks are assigned and priorities are set by the government staff service lead. Tasks may include operating and maintaining enterprise-wide client security software systems (e.g. anti-virus, anti-spyware, host-based intrusion detection/prevention systems and client firewall components) to sustain prescribed service levels, testing new versions and capabilities, assisting with their deployment, performing second and third level support as assigned, generating and distributing reports using built-in capabilities, performing trend analysis, and other associated tasks as assigned. Personnel must have demonstrable, working knowledge and experience deploying, operating, and troubleshooting advanced endpoint security technologies and tools in an enterprise environment. (2 FTE) OPTIONAL TASKS: EXPERT SERVICES The Senate requires additional on-site expertise and/or FTE to meet desired service levels. At the Senate's request, the Contractor may be required to provide the following support to the Senate's IT Security staff leads: (9) Enterprise Technology Assessment: Conduct security test and evaluation of commercial off-the-shelf (COTS) products and other enterprise-wide solutions to help determine potential operational risks and provide security configuration recommendations. (10) Security Policies and Standards: Develop, or assist in development, of information security policies, standards, and guidelines, as requested. (11) Forensics: Provide media acquisition and analysis as needed. (12) Software Engineering: Provide backend support for SOC operations, to include integration services and/or prototype or customized software solutions and support in the event that Senate COTS hardware and software solutions have substantial shortcomings that introduce current or future operational impact to Senate operations. (13) Application Code Review: Test application and/or review source code using automated and manual processes. (14) **Penetration Testing: Perform penetration testing in support of operations and maintenance activities, including security evaluation of complex systems. (15) Senate Office IT Security Assessments and Special Projects: Perform on-site (Washington, DC) and remote (state office) IT Security assessments as requested. (16) Active Technical Defensive Measures: Collaborate with Senate IT Security Staff leads to apply active technical security controls as authorized by the Senate for cases in which potential or actual threats are made to Senate IT infrastructure above what the existing technical security controls are capable of handling (engineering and operations activities). REQUIREMENTS: 1) The Senate is seeking vendors who qualify to provide the required and optional services under both Option A and Option B described above, not just one or the other. Vendor shall describe how they meet the requirement. 2) The Senate is seeking vendors who qualify to provide the required and optional services under either Option A or Option B described above using commercial practices and COTS solutions (whenever possible) performing under 1) fixed-price, performance-based service orders for support and/or 2) fully burdened fixed labor hourly-rates (inclusive of travel, material and ODCs) to perform services on a time and materials basis. Vendor shall describe how they meet the requirement on using COTS solution. 3) All services to be provided must be delivered by personnel who are United States (U.S.) citizens working in facilities located in the U.S. and using systems, including but not limited to computers, storage arrays, networks and ancillary devices that are also located within the U.S. The Senate is seeking vendors who can provide the qualified personnel described here to perform the services. Vendor shall describe how they meet the requirement. 4) For all services delivered in an MSS environment, the Senate must maintain sole custody of its data. Senate will require access to alert data and metadata to respond to incidents, including those generated by internal sources. Vendor shall describe how they meet this requirement. 5) The services will require some personnel who have or can obtain and maintain Defense Security Systems (DSS) clearances up to and including Top Secret/SCI. Vendor shall describe how they meet this requirement. 6) Vendor shall state their qualifications and experience to perform each of the Mandatory Services Capabilities and Optional Tasks listed above. 7) Vendor responses to each requirement must include paragraph numbering that can be directly mapped to the Mandatory Services Capabilities and Optional Tasks and Requirements listed above. In addition, submissions must include: a) Past performance experience information for a minimum of three contracts of a similar scale that are less than two years old and that involve use of capabilities and products relevant to those necessary for meeting all of the requirements and tasks contained herein, including contract number, company name and address, point of contact name, telephone number and email address, and a brief synopsis of work performed relevant to requirements 1-16 listed above, b) Description of capabilities to support the Senate's ability to continue essential functions that conform to a business continuity plan which is modeled on Federal Preparedness Circular # 65, Federal Executive Branch Continuity of Operations (FPC-65), dated June 15, 2004, and, c) Organizational information including Dun and Bradstreet number, and point of contact with telephone, fax, and e-mail address. After receipt and review of the responses to this notice, the SAA intends to issue a solicitation for these services. The information contained in this notice will be the only information provided by the Senate during the Sources Sought process. All qualified sources should respond to this Market Survey - Sources Sought by submitting an information package in accordance with the instructions provided. Vendors responding to this notice and deemed qualified by the SAA may be requested to submit a proposal in response to a solicitation. Only firms deemed qualified by the Senate will be considered. If suitable responses to this notice are received from one or more qualified sources, the SAA anticipates release of a solicitation during the first quarter of fiscal year 2015-16. Neither the SAA nor the Senate will be responsible for any costs for the preparation of responses to this request. INSTRUCTIONS: Responses to this Market Survey-Sources Sought request are due to the POC no later than January 16, 2015, at Noon EST and shall be submitted electronically via email only, to the attention of Cora Carag at Acquisitions2012@saa.senate.gov. The subject line of the email message shall be: SSN 2015-S-022 Cyber Security Services. No other method of transmittal will be accepted. The response shall not exceed twenty-five pages. Unnecessarily elaborate submissions are discouraged. Pages over the page limitation may be discarded. Access by the SAA to information in any files attached to the response is the responsibility of the submitting party. Neither the SAA nor the Senate is responsible for any failure to access vendor's information. THIS IS NOT A REQUEST FOR PROPOSAL. THIS NOTICE CONSTITUTES THE ENTIRE SOURCES SOUGHT NOTICE AND IS THE ONLY INFORMATION PROVIDED BY THE SAA OR SENATE. ANY REQUESTS FOR ADDITIONAL INFORMATION WILL NOT BE ACCEPTED.
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/spg/Senate/SAA/SAAFD/SSN_2015-S-022/listing.html)
- Place of Performance
- Address: United States Senate, Washington, District of Columbia, 20510, United States
- Zip Code: 20510
- Zip Code: 20510
- Record
- SN03606268-W 20150101/141230234113-cb799c53149269d756299cfdc36fc21f (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |