Notice ID: none posted

The contractor shall provide all management, tools, supplies, equipment, and labor necessary to perform information Technology (IT) Support services for Headquarters, 20th Air Force at F.E. Warren Air Force Base, Wyoming, in accordance with applicable federal, state, local laws and regulations, and this performance work statement (PWS).

Scope. The contractor shall provide IT resources to 20th Air Force (20 AF) Headquarters in support of Command, Control, Communications, Computers & Intelligence (C4I) systems, administrative networks, and other systems. Intended support of C4I systems includes such systems and application programs as Non‐classified Internet Protocol (IP) Router Network (NIPRNET), Secret Internet Protocol (IP) Router Network (SIPRNET), Top Secret‐Collateral network, Strategic Automated Command & Control System‐Secure Desktop Terminal (SACCS‐SDT), Joint World‐Wide Intelligence Control System (JWICS) network, Video Teleconference (VTC), Special Access Program (SAP) network/video equipment, Audio/Video Matrix, and other systems. Also included are tasks such as system analysis and engineering, system integration and implementation, IT planning, concept development, modeling and simulation, exercise support, training, Operations and Maintenance (O&M) activities, Communications Security (COMSEC) user, and some Information Assurance duties.

System Administration. The IT Contractor shall support system administration activities for NIPRNET, SIPRNET, Top Secret‐Collateral network, Video Matrix, Audio System, VTC, SACCS SDT, JWICS, SAP, and other C4I based systems (to include hardware, software, and firmware) within the Intelligence Facility. The IT Contractor will also support secure (and non‐secure, when time allows) IT systems (i.e. SIPRNET) within the 20 AF headquarters building. At a minimum, administrator shall have a background in system setup, user maintenance, system security, backups and restores, e‐mail administration, TCP/IP, DNS, network interfaces, connectivity and workstation troubleshooting, client/server technology, disk space management, virus management, user training, help desk support, software patches/modifications, NOTAM compliance, and configuration management. The contractor will manage nine VTC suites within the 20 AF building. This includes providing VTC scheduling services, pre‐conference setup/dial‐in, in‐call monitoring and troubleshooting, and post‐conference tear‐down. The contractor will be appointed as a Cyber Security Liaison (CSL) for Wing collateral systems, to mitigate threats and vulnerabilities, employ appropriate security measures and identify required physical, personnel, and procedural security for information systems.

VTC Administration. The contractor shall perform VTC scheduling and support for the Commander and senior staff. The contractor shall work closely with senior leadership administrative support staff for scheduling VTC support for the headquarters staff to include General Officers. Support shall include ensuring VTC equipment, computers and video matrix systems are functioning properly.

Network Administration. The IT Contractor shall support network administration by troubleshooting/correcting issues when problems arise, conduct modifications, upgrades, and contingency/exercise support to include on‐call support during non‐duty hours. This is considered Tier one type maintenance, which includes maintenance/sustainment of all software products including databases, configurations, NOTAM compliance, troubleshooting and corrective actions of the computer systems located in the Intelligence Facility, and secure …

Cybersecurity Liaison (CSL). The contractor shall ensure all operational systems within the Intelligence Facility adhere to System Program Office (SPO) system security requirements as well as DoD 5200.01, Vol 1, DoD Information Security Program, AFI 17‐130, Cybersecurity Program Management, DoD Information Technology Security Certification and Accreditation (C&A) Process, and the Intelligence Facility Operating Instructions/local procedures. The contractor shall be responsible for all required IT systems technical security certifications and accreditations, such as Authority to Operate (ATO), and will maintain all completed packages on file …

Read more here.

Ad


Want to get involved with OS AI? - A small number of Sponsorship Opportunities are now available here. Starting at $500.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Reply