DOJ RFI: Insider Threat Office (InTO) Technical Services Support

Notice ID RFI_InTO_Nov_2021


Responses to this Request for Information (RFI) may be used to formulate final requirements and/or to identify qualified vendors capable of meeting those requirements. The description below outlines preliminary requirements envisioned for the Insider Threat Office (InTO) Support. The information gathered may be used to formulate acquisition strategies for competitive solicitations…”


The intent of the RFI is to obtain information that will assist the InTO in determining the market for independent, professional businesses that have specialized experience in providing professional services for: …”

  • “Project Management support –
    • SCRUM Master experience;
    • demonstrated expertise with IT Agile life-cycle development methodology;
    • knowledge management (e.g.,) development and the process of capturing, developing, sharing, and effectively using organizational knowledge; and
    • risk management (e.g., identification and tracking of risk Factors and associated metrics;,and maintains IT risk registry.)
  • Data Management services to ensure:
    • pedigree and lineage of data is accurately and efficiently managed;
    • data and reporting accuracy is high; and
    • data storage, update and retrieval strategies are effective.
  • Implementing and maintaining the hardware and software infrastructure across multiple enclaves, such as Unclassified, Secret and Top Secret;
    • database engineering;
    • provisioning network;
    • operating system, processing, data storage; and
    • data backup services.
  • Designing, deploying, and maintaining inter-agency information systems including frontend functional user interface, database design and application related performance tuning across multiple enclaves, such as Unclassified, Secret and Top Secret.
    • Developing web-based applications and services.
    • Performing data loads with Extract, Transform, and Load (ETL) structured, semistructured, and unstructured datasets enabling availability to meet program objectives.
    • Creation of user-based performance metrics and methods of tracking customer satisfaction related to the Agile process and Software development methodologies.
  • O&M engineering and technical assistance including user account administration and server performance monitoring
  • Providing software engineering with current industry software development framework tools, and software development life cycle (SDLC) process.
  • Test Engineering – Solution testing support services to include peer review of code development, Unit, Regression, and Integration testing
  • System enhancement support for the identification, integration and application of new emerging technologies including data visualization; data analysis; data transformation; high performance computing; new analytical tool integration; Machine Learning (ML) and Artificial Intelligence (AI)
  • Data Science/Analysis
    • insider threat modeling implementations;
    • collaboration with Insider Threat SMEs to deploy threat/risk triggers and thresholds;
    • implementation of statistical modeling techniques;
    • implementation of machine learning solutions, analysis platforms and data structure design.
  • Providing Cloud technology expertise and experience with Cloud adoption
  • Providing System Administration support in a Linux technology environment
  • Configuration management (CM) –
    • Provides visibility and control over the life-cycle of the performance, functional and physical attributes of all information systems and documentation;
    • monitors, tracks and maintains IT software assets and licenses; provides systems engineering for the configuration management database; and
    • Coordination/execution of Technical Exchange Group (TEG) for request for change approvals.
  • IT System Security Engineering (ISSE) experience in the following areas:
    • Ensure the safety of the organizations’ computer and network systems from attack or security threats
    • Establishing and constructing security standards and best practices that an organization should follow
    • Implementing security controls to protect an organization’s infrastructure and computer systems
    • Organizing and conducting scans and testing in order to identify vulnerabilities o Reporting results of scanning and testing and providing security recommendations
    • Collaborate with Information System Security Officer (ISSO) in preparing and documenting protocols…”

Read more here.


This topic contains 0 replies, has 1 voice, and was last updated by  Jackie Gilbert 2 weeks, 6 days ago.

  • Author
  • #141876

    Replies viewable by members only


You must be logged in to reply to this topic.


Questions?. Send us an email and we'll get back to you, asap.


©2021 MileMarker10, LLC all rights reserved | Community and Member Guidelines | Privacy Policy | About G2Xchange FedCiv

Opportunities. Starting Points.

About our Data

The Vault is a listing of expiring contracts, task orders, etc. within a certain set of parameters, to include:

  • Have an initial total estimated contract value of $10 million or above
  • Federal Civilian Only – DHS, Transportation, Justice, Labor, Interior, Commerce, Energy, State, and Treasury Actions
  • NAICS codes include: 511210, 518210, 519130, 519190, 541511,
    541513, 541519, 541611, 541618,
    541690, 541720, 541990
  • Were modified within the last 12 calendar months
  • The data represented is based on information provided by the government

Who has access? Please note that ALL G2Xchange FedCiv Members will receive access to all basic and much of the advanced data. G2Xchange FedCiv Corporate Members will receive access to ALL Vault content (basic and advanced).

Feedback/Suggestions? Contact us at and let us know what you think. 

G2Xchange FedCiv

Log in with your credentials for G2Xchange FedCiv

Forgot your details?