DOS RFI: Applied Cyber Support

Notice ID 19AQMM21N0053

“1) Background and Purpose

The Bureau of Diplomatic Security (DS) is responsible for providing a safe and secure environment for the conduct of US foreign policy…”

“Applied Cyber Support is focused on integrating Federal, Department and DS IT security policies, standards and practices in a manner that injects analysis, review, reporting and mitigation within the earliest stages of the development of an IT solution. This is accomplished through close coordination and planning among CTO units for Applied Cyber Security (ACSU), software development units within the Systems Solutions Division (SSD), and security and operational components of the Enterprise Production Services Division (EPS)…”

“2) Objective

Provide the DS Bureau with expertise in enterprise level cyber security policy and technical analysis, reporting and identification of mitigation solutions in support of the Bureau’s worldwide security and law enforcement missions.

The CTO has a requirement to augment the existing contract support capabilities that provide software engineering support services for the execution of IT projects. The CTO manages fifty (50) concurrent IT projects at any given time, the vast majority of which rely on software engineering. Cyber security is a primary component of all IT solutions developed by CTO, implementation of security controls in the lifecycle of an IT solution is critical to effective cyber security management and is core to meeting federal requirements as detailed within the FISMA and other IT security related regulations. CTO requires contractor expertise to support federal staff and CTO processes to better support cyber security requirements and improve the overall cyber health of CTO developed IT solutions.

3) Scope of Work

DS seeks IT support services to ensure the Bureau is applying necessary cyber security controls into IT solutions developed and maintained by CTO. Cyber security support may include requirements analysis, reporting, collaboration and the design, development, and implementation of cyber security mitigation strategies and component level controls for CTO developed and maintained IT solutions. The work, as defined below, shall be performed as a part of a matrix development team including other contractor as well as government personnel.

CTO requires cleared contractor staff that can provide analytic and technical cyber policy and software engineering support for applications in use within the DOS and specifically DS. CTO envisions that the cyber security support shall include activities throughout the systems development lifecycle including project management, requirements gathering/analysis, design and “user experience” support, software engineering, testing, and system support. Areas of focus for this order include correlating cyber policy requirements with federal standards to support defining or deployment of cyber security controls at various stages of the IT system life cycle; analysis and review of software packages during development and engineering; project management; support for the development of program related briefings and reports; and other technical analyses needed to support applied cyber security initiatives within CTO.

The work efforts conducted by the vendor shall be documented in accordance with existing CTO project management processes and summarized in regular status reporting to CTO management…”

Read more here.


This topic contains 0 replies, has 1 voice, and was last updated by  Jackie Gilbert 2 months, 3 weeks ago.

  • Author
  • #131388

    Replies viewable by members only


You must be logged in to reply to this topic.


Questions?. Send us an email and we'll get back to you, asap.


©2021 MileMarker10, LLC all rights reserved | Community and Member Guidelines | Privacy Policy | About G2Xchange FedCiv

Opportunities. Starting Points.

About our Data

The Vault is a listing of expiring contracts, task orders, etc. within a certain set of parameters, to include:

  • Have an initial total estimated contract value of $10 million or above
  • Federal Civilian Only – DHS, Transportation, Justice, Labor, Interior, Commerce, Energy, State, and Treasury Actions
  • NAICS codes include: 511210, 518210, 519130, 519190, 541511,
    541513, 541519, 541611, 541618,
    541690, 541720, 541990
  • Were modified within the last 12 calendar months
  • The data represented is based on information provided by the government

Who has access? Please note that ALL G2Xchange FedCiv Members will receive access to all basic and much of the advanced data. G2Xchange FedCiv Corporate Members will receive access to ALL Vault content (basic and advanced).

Feedback/Suggestions? Contact us at and let us know what you think. 

G2Xchange FedCiv

Log in with your credentials for G2Xchange FedCiv

Forgot your details?