ENCORE II Information Technology (IT) Solutions


ENCORE II provides information technology (IT) services and solutions to the military services, the Department of Defense (DoD), and other agencies of the federal government with a flexible vehicle for engineering and interoperability of net-centric capabilities. It uses a competitive, streamlined procurement process and is available to all federal agencies.

The contract will support the DoD's transformation to a network-centric environment which seeks to improve situational awareness by enhancing how the military services share information. Under the contract, SAIC will support command, control, communications, computers, intelligence, surveillance, and reconnaissance areas, in addition to all elements of the Global Information Grid. SAIC will deliver a broad range of IT services and solutions including enterprise policy and planning, network engineering, integrated solutions management, security engineering certification and accreditation, custom application development, and analytical support for implementing IT solutions.

  • Contract number: 

Program Management Office

More Information


SAIC's world-class engineering team, including large businesses, small businesses, and historically black colleges and universities (HBCUs), provides innovative global scientific, engineering, integration, technical, and operations support services across all task areas of ENCORE II.

The team brings an established, highly integrated, and proven management infrastructure to ENCORE II. They stand ready to meet the needs of DISA, DoD, and other federal customers. The SAIC team offers people, processes, and technologies that are already closely mapped to the federal government's challenges and needs.



Strong Technical Team—The SAIC ENCORE II team is an experienced team with strong insights on federal agency needs, industry best practices, and state-of-the-art technologies, and has achieved a CMMI-DEV v1.3 ML3 rating.

Cost-Effectiveness—A flexible contract with low administrative costs and highly competitive labor rates. This is an effective use of a web-based tool for task order management.

Broad Scope—Support for the engineering and interoperability of core mission areas.

Flexibility—A ten-year, $12.225 billion contract ceiling with Cost-Reimbursement (CR), Time-and-Material (T&M), and Fixed-Price (FP) task orders.

Quick Turnaround—Highly streamlined task-order process.

Available Worldwide—ENCORE II is available to DISA, the Department of Defense, and all federal government agencies. All government-warranted contracting officers may directly place orders against the vehicle.


SAIC ENCORE II Team (Original)

Small Businesses:

  • Advantage Engineering & IT Solutions, Inc. (VO, SDVO)
  • Aquilent, Inc.
  • Artech Information Systems, LLC (SDB, WOSB)
  • Buccaneer Computer Systems & Service, Inc. (SDB, WOSB)
  • Citizant (SDB, WOSB)
  • Cougaar Software, Inc. (VOSB)
  • Computer World Services Corp. (SDB)
  • Enterra Solutions, LLC
  • FGM, Inc.
  • Future Skys, Inc.
  • Global Broadband Solutions, LLC (GBS) (VO)
  • GBS Government Services, LLC (VOSB, SDVOSB)
  • JAVIS Automation & Engineering, Inc. (SDB, VOSB, SDVOSB)
  • JBISoft, Inc.
  • KeyLogic Systems, Inc.
  • KT Consulting, Inc. (SDB, VOSB, SDVOSB)
  • LGB and Associates (SDB, WOSB, HUBZone)
  • ML Technologies, Inc.
  • Native American Industrial Distributors, Inc. (SDB, VOSB, SDVOSB)
  • Paradigm Technologies, Inc. (SDB)
  • ReliaTrust Technologies, Inc. (SDB)
  • ResQSoft, Inc.
  • System of Systems Analytics, Inc.
  • Systems and Proposal Engineering Company (WOSB)
  • Valdez International Corporation (SDB, WOSB)
  • Vector Planning and Services, Inc. (SDB)
  • Weblayers (SDB)

Categorization of Small Businesses:

  • HUBZone—Historically Underutilized Business Zone
  • SDB—Small Disadvantaged Business
  • SDVOSB—Service-Disabled, Veteran-Owned Small Business
  • VOSB—Veteran-Owed Small Business
  • WOSB—Woman-Owned Small Business

Historically Black Colleges and Universities/Minority Institutions:

  • Alabama A&M
  • Florida International University
  • Prairie View A&M

Large Businesses:

  • Akamai Technologies, Inc.
  • AmberPoint, Inc.
  • F5 Networks, Inc.
  • General Dynamics C4 Systems, Inc.
  • GTSI Corp.
  • IBM
  • Lucent Technologies, Inc.
  • Mercury Interactive Corporation
  • Micromuse, Inc.
  • Microsoft Corporation
  • SPARTA, Inc.
  • Sun Microsystems, Inc.
  • Telcordia Technologies, Inc.



The objective of this contract is to provide global net-centric capabilities, attributes, or services under multiple award, Indefinite-Delivery/Indefinite-Quantity (ID/IQ) task order-type contracts that support the military services, the DoD, and other federal agencies. The scope of ENCORE II includes all activities within the military services and DoD. Other federal agencies may utilize this contract to satisfy their information technology (IT) requirements after making the appropriate Economy Act Determination in accordance with Federal Acquisition Regulation (FAR 17.5). IT solutions encompass a range of capabilities from old legacy systems to new, emerging, net-centric technologies.

As a result, the SAIC team will assist the government in providing IT solutions for activities throughout all operating levels of all customer organizations in support of all functional requirements including command and control (C2), intelligence, and mission support areas, and to all elements of the GIG. The SAIC team will assist the government by furnishing personnel, products, materials, facilities, travel, services, managed services, and other items needed to satisfy the worldwide development, deployment, operation, maintenance, and sustainment requirements of DISA and its customers.

There are 20 task areas within the ENCORE II statement of work:


These task areas provide a comprehensive template for the contracting of all lifecycle phases of net-centric solutions. Although not explicitly stated, this includes providing assistance with the engineering efforts in each task area to provide the net-centric solutions required by the military services, the DoD, and other federal agencies. IT services, hardware, software and enabling products will be obtained on an as-needed basis (i.e., through the issuance of task orders).

The SAIC team is capable of performing both within and outside the United States. An individual task order may relate to a single task area or involve functions from multiple task areas. Task orders can be issued to identify the net-centric solutions required and to provide a specific technical resolution (including the schedule for all deliverables and the identification of any applicable Government-Furnished Property (GFP), Government-Furnished Information (GFI), and/or Government-Furnished Workspace (GFW).

The SAIC team can assist the government by providing net-centric solutions for the acquisition, installation, fielding, training, operation, and lifecycle management of components and systems in the operational environments of Unified Commands and their subordinate components, the military services, defense agencies, OSD, and other federal agencies. This includes providing assistance with the procurement of various products to include hardware, software and licenses and ancillary support products, as applicable. A single solution may be fielded to several sites or across the enterprise. Each of these locations may require site surveys and corresponding site-specific implementation and integration. Fielding documentation, such as "as-built drawings," and acceptance tests and out-briefs may be required at each location, as specified in the individual task order.

ENCORE II will be able to provide assistance to service/agency engineering and other support as they transition legacy systems to use the Core Enterprise Services (CES) of DoD's Net-Centric Enterprise Services (NCES) program. NCES will eliminate duplicative services within DoD by providing a common set of interoperable services supporting users in the warfighter, business, and intelligence domains. ENCORE II will enable both service and data providers on the "net" by providing and managing the underlying capabilities to deliver content and value to end users. ENCORE II will support a broad array of services that will allow implementation of both the NCES enterprise capabilities and Community of Interest (COI) capabilities across the enterprise. Rapid development and deployment of services, used to respond promptly to Program of Record and COI requirements, are needed to enable support of Network-Centric Warfare (NCW). ENCORE II will also be able to support the provisioning of these requirements as managed services.

ENCORE II is flexible and readily adaptable to satisfy the specific requirements of a variety of customers. Enterprise services will be defined independently from specific network and systems technology, as needed. Exploitation of new technology will be made easier by the flexibility of the service architecture, which fits in an environment with multiple providers of services.

The following cannot be obtained under ENCORE II: point to point circuits, transmission (voice/data/video), network management in support of the DISN, and standalone hardware purchase and/or maintenance and standalone software purchase and/or maintenance.

Task Area—Enterprise IT Policy and Planning

This task area provides technical and programmatic support to assist departments and agencies with all aspects of planning, engineering, fielding, and operating IT systems and resources. It provides technical and programmatic support for review, analysis and coordination of processes, policy, doctrine, directives, regulations, and implementation of instructions. The contractor shall assist the government in performing the following:

  • Policy—Review, consolidate, and develop domestic, international, and coalition policy in accordance with the user's requirements. Provide technical support and assistance to customer organizations and assess IT policies, standards, guidelines, or procedures to ensure a balance of security and operational requirements.
  • Planning—Review, develop, and consolidate strategic, tactical and operational plans, including requirements definition and mission planning.
  • Process Management—Review, re-engineer if required, and manage technical and business processes such as acquisition planning, financial reporting, engineering, solution fielding, strategic and operational planning, engineering, training, operations, and customer support. Processes shall be in accordance with the user's guidelines.
  • Program and Project Management Support—The contractor shall provide contract and task order management functions, including:
    • Management Planning—Prepare management plans at task/delivery order initiation. These plans will describe the technical approach, organizational resources, and management controls employed to meet the cost, performance, and schedule requirements throughout the task order period of performance.
    • Task Order Management—Perform the daily activities required for successful program completion. Examples of activities under this task area include management and status reporting, quality assurance monitoring, configuration management, risk management, and security management.
    • Regulatory Compliance—Administer productivity and management methods, such as quality assurance, configuration management, work breakdown structuring, and human engineering. The contractor shall comply with Federal Information Processing Standards (FIPS) and Federal laws and regulations that affect IT systems operations. Examples are the Privacy Act of 1974, the Computer Security Act of 1987 and the Joint Financial Management Improvement Program (JFMIP).
    • Documents—Provide systems engineering support necessary to draft, review, revise, and deliver documents identified within individual task orders.
    • NCES Development Services—Assist service/agencies as they transition information technology Programs of Record to use NCES services. The NCES program will provide a set of core enterprise services that support the exchange of information between producers and consumers (human or information systems) while leveraging information assurance (IA)/security and NetOps capabilities to protect the information from unauthorized use or access. These services will allow users and information systems to find and access relevant information, expose the information they produce for others to discover, and collaborate in a more effective manner. ENCORE II will provide engineering support for service/agency developers to effectively utilize the NCES core enterprise services, including: Enterprise Services Management, Messaging, Application, Discovery, Mediation, Collaboration, Storage, Information Assurance/Security; and User Assistant. The core enterprise services will be invoked from four major NCES product lines: DoD Enterprise Collaboration, Content Discovery/Delivery, Service-Oriented Architecture (SOA) Foundation, and the Defense Online Portal. ENCORE II engineering support will provide assistance in utilizing the NCES capabilities via the four product lines.
    • Data Engineering Services, Assist Service/Agencies—The contractor shall assist services and agencies in implementation of the DOD Net-Centric Data Strategy. The contractor shall provide support to Communities of Interest (COIs) within the department. A COI is one or more activities that need to share data. The contractor shall assist the COIs to identify metadata to be shared, assist in registration of metadata in the DOD Metadata Registry, and attribute or tag metadata with information required for discovery. The contractor shall assist the COI user groups in development of taxonomies, a means for categorizing metadata, and integrating COI taxonomies with the DOD Core Taxonomies developed by the DOD Taxonomy Focus Group. The contractor shall provide technical assistance to the COIs to facilitate use/reuse of registered metadata artifacts in piloting activities and by participating in DOD Data Management forums such as focus groups and working groups.

Top of Page

Task Area 2—Integrated Solutions Management

The requirements of this task area include management and technical support for research, analysis recommendation, and documentation of integration issues and approaches. The issues and approaches considered under this area evolve from a variety of sources, such as external audits, technical reports, federal standards, operational policies and doctrines, technical guidelines, and best practices. The contractor shall assist the government in performing the following activities for services required under this task area:

  • Integration Management Support—Provide support to the government's integration program. This includes conducting management reviews to identify integration issues and problems, such as requirements definition, architecture, and policy compliance and engineering guideline compliance.
  • Cross-Functional Integration Support—Identify cross-functional applications and technical issues from selected symbiotic functional areas and document the opportunities for resolving issues. Recommend opportunities for resolving issues in requirements, data, applications, and infrastructure elements. Also, plan, analyze, and report programmatic impacts on the issues such as costs, risk analysis, return on investment, schedule dependencies, and recommend functional and technical solutions.
  • Analysis and Review—Examine functional, management and technical requirements and/or issues to provide effective solutions for integration efforts that include:
    • Requirements analysis
    • Compliance with legal and regulatory guidance
    • Interoperability
    • Architectures
    • Common infrastructure services
    • Open systems environment
    • Security
    • Standards
    • Data and data sharing
    • Functional and technical integration
    • Benchmarking/baselining
  • Documentation—Develop documentation resulting from studies, analyses, assessments, system implementations and architectures, engineering designs, and information brochures. Documentation may include subject matter originated by the contractor as well as government-provided topics. Data items to be delivered will be identified in each task order.
  • Information Dissemination—Provide information dissemination support relating to the technical requirements and functional areas supported by this contract. Conduct activities such as professional development seminars, demonstrations, trade shows, conferences, and briefings relating to enterprise-wide integration issues or programs. Implement an integrated solutions management capability and identify integration issues and problems such as: requirements definition, architecture and policy compliance and engineering guideline compliance; identification of cross-functional applications and technical issues; examination of functional, management, and technical requirements and/or issues to provide effective solutions for integration efforts, and conduct of activities to facilitate enterprise-wide integration issues and operational employment.
  • User Assistance—Develop user assistance end-user facing services and activities, including analysis and review of compliance with legal and regulatory guidance, architectures, common infrastructure services, security, and standards.

Top of Page

Task Area 3—Performance Benchmarking

This task area includes program, functional, technical, and data benchmarking efforts and development of related benchmarking tools and methods for integration. The contractor shall consider current and emerging technologies, information infrastructures, and ongoing and future IT systems support. This task area also provides for baselining of existing legacy systems, which is the first step in the selection of migration systems supporting functional activities. The contractor shall develop a baseline inventory to show the "as-is" process and underlying information systems and technology. The contractor shall perform the following activities for services required under this task area:

  • Program Benchmarking—Examine and evaluate functional and technical programs for integration implications. Review factors such as operational scope, functional and process relationships, business practices, resource requirements, and cost impacts.
  • Functional Benchmarking—Review and analyze defined work processes and information needs of users within and across the functional area being examined. This includes functional and cross-functional requirements definition, functional descriptions, functional architectures, and requirements validation.
  • Technical Benchmarking—Examine current and emerging technologies for effectiveness and/or potential to support customer needs. These technologies/systems/services may include legacy systems or migration to new technologies.
  • Data Benchmarking—Review and analyze data, databases and cross-functional data sharing relating to the effectiveness of the information support provided to functional elements of the end users.
  • Benchmarking Tools and Methods—Develop new or modify existing tools and methods to enable a disciplined process of benchmarking. Examples include templates, checklists, models, and guidelines.
  • Baseline Definition—Identify the baseline of support for the functional area or activity either being supported or for which support is contemplated. These efforts include business systems analysis of functions and the inventory of support tools and their use. The contractor shall support configuration management of the GIG from the DoD and other end-user perspectives. Perform the initial steps of establishing or reviewing operations, processes, data, and information baseline for the functional activity. Since integration is an iterative process between various elements of the organization and its processes or operations, the contractor shall conduct the recurring steps to define, evaluate, and implement the incremental improvements needed to achieve simplified and streamlined operation of the functional activity. The contractor shall also perform the following tasks:
    • Evaluate Existing Operations or Processes and Data—Document and analyze differences in the way common functional operations or processes are executed or interfaced, benchmark these processes against the best public and private sector achievements, identify existing "as-is" processes and data, and document known problems in existing processes and data that must be corrected to provide a functionally adequate standard. Recommend data processes, interfaces, and data baselines that together meet the process and associated information needs of the functional activity.
    • Establish Operations and Data Baselines—Recommend proposed operations/processes, data baselines, and interfaces based upon peacetime or normal operations and anticipated wartime, mobilization, or emergency operations.
    • Support—Performance benchmarking is needed to meet customer requirements and provide for service-level agreements. Provide benchmarking tools and methods of integration that consider current and emerging technologies, end-user agency information infrastructures and ongoing and future IT systems support. Baselining of existing legacy systems is the first step in the selection of migration systems supporting functional activities, which provides an inventory of the "as-is" process and underlying information systems and technology. Key activities include examination and evaluation of functional and technical programs for integration implications, functional and cross-functional requirement definition, functional descriptions, functional architectures, and requirements validation; examination of current and emerging technologies for effectiveness and/or potential to support customer needs; review and analysis of data, database, and cross-functional data sharing; evaluation of existing operations or processes and data; and recommendation of proposed operations/processes, data baselines, and interfaces. Support the development of service level agreement (SLA) metrics based on benchmark results.

Top of Page

Task Area 4—Business Process Reengineering (BPR)

  • Improved Performance—This task area involves the use of BPR as an approach for improving organization performance and covers the range of BPR activities, including services needed to implement new or revised business or functional processes arising from BPR undertakings. The contractor shall assist the government in examining organization goals, objectives, structures/hierarchies, cultures, systems, and roles for the purpose of executing a ground-up redesign for achieving long-term, full-scale integration required for the GIG or the enterprise-level requirements and standards of end-user agencies. Improving performance and reengineering processes include services in support of, and helping shape, the direction of GIG security, including those applications and approaches to network defense required to protect the GIG from unauthorized entry and intrusions, as well as measures designed to track and prevent future damage to DoD's communication capabilities.
  • Support—Implementation of leveraged web services and the provision of services in a network-centric environment requires business process reengineering. This contractor shall assist the government with the examination of organizational goals, objectives, structure/hierarchies, cultures, systems, and roles for the provision of enterprise-level requirements and standards. For example, existing business processes must be examined and reengineered where necessary to provide for the use of a mediation service, which provides a layer of processing between information producers and information consumers.
  • Computer Network Defense—The contractor shall assist the government with identifying and migrating existing business processes utilizing current GOTS, COTS and by leveraging new technologies in support of net-centric services.

Top of Page

Task Area 5—Requirements Analysis

  • Optimal Solutions—Under this task area, the contractor shall assist the government with design, develop, install, test, and validate applications and databases to determine optimal cross-functional solutions integral to the integration process. The contractor shall develop schedules and implementation plans with definable deliverables, including parallel operations where required, identification of technical approaches and a description of anticipated prototype results. The contractor shall also develop data collection tools, conduct surveys, hold meetings with customers, analyze data, and consolidate, and refine user requirements.
  • Support—The key to satisfying users is the analysis of requirements including the design, development, installation, testing, and validation of applications and databases for enterprise use. The contractor shall assist the government with the development of schedules and implementation plans with definable deliverables, including parallel operations where required, identification of technical approaches, and a description of anticipated prototype results.
  • Support for Computer Network Defense Applications—The contractor shall assist the government with researching, designing, and building, using either or both spiral and incremental technology development approaches, to develop, document, test, certify, and validate various applications to stay on the leading edge of new technologies designed for network operations management and computer network defense purposes. This includes the necessary research and development of deliverables that may, in the course of their lifecycles, change the end product depending on the maturation of technology and addition of new or improved capabilities.

Top of Page

Task Area 6—Market Research and Prototyping

  • Market Conditions—Under this task area, the contractor shall assist the government in researching current market conditions and provide solutions to prevent premature systems obsolescence. Operate and maintain prototype applications and databases to determine optimal cross-functional solutions for integration concepts and problems integral to the integration process.
  • Prototype Support—The contractor shall assist the government in providing definition, development, tailoring, installation, testing, evaluation, operation, and training of prototype systems and services. This support can cover the entire lifecycle of a prototype from initial knowledge engineering and user requirements identification through prototype evolution to provide an operational product that supports evolving mission requirements. This support for prototyping may include use of research to develop new applications, tools, techniques, systems, and processes to support the integrity and defense of the GIG.
  • Support—Leveraging the best commercial off-the-shelf (COTS) solutions, open systems and web services that are National Information Assurance Partnership (NIAP) approved, requires diligent market research and prototyping. In addition, the strategy to provide plug-and-play services requires the operation and maintenance of prototype applications and databases to determine optimal cross-functional solutions for integration concepts and problems integral to the integration process.
  • Technical Conference Support—The contractor shall support regular vendor meetings and industry technology presentations. The contractor shall assist with developing, setting up, and managing technical conferences. The contractor shall participate in research and development efforts and assist in outreach programs to academia, industry, and other government entities.

Top of Page

Task Area 7—Information and Knowledge Engineering

This task area includes development of information flow models across functional domains; functional data models; standardization and implementation of common data elements; prototyping, developing, and implementing shared databases in standard/common/migration system or systems, data mining, and development of data migration strategies to identify the plans and processes for the transition of legacy data to shared data through the utilization of data standards. This task area includes knowledge management support for law enforcement/counterintelligence (LE/CI) activities, technical network analysis and operations support, information dissemination management/content staging, and technical and engineering efforts in support of the DoD GIG. The contractor shall assist the government in performing the following activities for services required under this task area:

  • Interim and Target Functional and Data Architecture Development—Identify and evaluate interim and target functional data architectures including:
    • Applicable open systems standards (data standards) to be implemented.
    • Standard modeling and software engineering tools to be used in functional and data model development.
    • Process and simulation models within a functional area to facilitate data model development and data integration.
    • Logical, functional, and physical data models required for architecture development.
    • Data elements targeted for standardization.
  • Data Management Strategy Development—Identify methodologies for centralized management of distributed database environments, functional processes to identify single data entry points, and opportunities for data reuse by other standard/common/migration systems and applications. The contractor shall also provide data-mining services to sort through data in order to identify patterns and establish relationships. Data-mining parameters include:
    • Association—Search for patterns where one event is connected to another event.
    • Sequence or Path Analysis—Search for patterns where one event leads to another later event.
    • Classification—Search for new patterns (may result in a change in the way the data is organized).
    • Clustering—Find and visually document groups of facts not previously known.
    • Forecasting—Discover patterns in data that can lead to reasonable predictions about the future.
  • Cross-Functional Integration Strategy Development—Evaluate other functional areas and their associated standard/common/migration systems to identify opportunities for cross-functional data integration and data sharing.
  • Implementation Planning—Develop transition plans for the implementation of data migration strategies developed under this task area.
  • Support—Implementation of enterprise services requires the identification and evaluation of interim and target functional and data architectures to support the core services; identification of methodologies for centralized management of distributed database environments; identification of opportunities for cross-functional data integration and data sharing; and the development of transition plans for the implementation of data-migration strategies. Identification of interim and target functional data architectures includes identification and evaluation of open systems standards; standard modeling and software engineering tools; process and simulation models; logical, functional, and physical data models; and data elements targeted for standardization.
  • Knowledge Management Support—The contractor shall provide assistance in developing processes and procedures designed to facilitate increased all source intelligence, law enforcement/counterintelligence (LE/CI), and technical data fusion support. This shall include assisting with the compilation and maintenance of references for intelligence and operational watch-standers, assisting with development of data mining and visualization initiatives to improve situational awareness leading to a common operating picture (COP). Support under this task may include intelligence and LE/CI efforts designed to support information operations and information assurance, intelligence methods, development and maintenance of intelligence web sites and data, and assistance with internal communications and process, including database development.
  • LE/CI Knowledge Management Engineering Support—The contractor shall assist in researching, analyzing, developing, and implementing processes and procedures designed to facilitate increased all source LE/CI fusion support. The contractor shall assist in tracking developments in DOD and LE/CI community architectures and will provide information required by DoD LE/CI center architectures. The contractor shall execute tasking with LE/CI Center Liaison guidance and authority in the areas of LE/CI technologies to support analytical initiatives. Support would consist of research, identification, and development implementation plans for software, hardware, and architectures, assisting with and/or participating in LE/CI community meetings, providing LE/CI systems architecture, engineer, plans, and policy coordination assistance.

    This would include coordinating with civilian and active duty military law enforcement and counterintelligence representatives, government civilians, and other contractors when required to determine optimal information requirements, Request for information (RFI) architectures and dissemination methods. The contractor may also be required to assist with database administration and development in support of LE/CI databases, as well as assisting in the development of database designs, maintenance of backup and recovery plans, performance monitoring, and execution of data migrations. The contractor shall assist in the production of technical manuals and procedural guides at the database administrator (DBA), system administrator, and user levels for LE/CI center-specific architectures. This support shall also include the thorough documentation of data elements and schema for databases, and periodic updates as modifications are made. The contractor shall provide as required tools for importing data from disparate defense component databases of LE/CI interest, and in ensuring data feeds are useable and compatible with LE/CI systems, and provide technical advice on LE/CI architectural transformations to accommodate LE/CI requirements. The contractor shall provide visualization support to aid in analysis of data gathered in the databases and from other sources.
  • Technical Network Analysis and Operations Support—The contractor shall provide assistance in developing processes and procedures designed to facilitate NetOps and information assurance operational support. The contractor shall assist in compiling and maintaining references for operational watch-standers. The contractor personnel will assist in analyzing ongoing information assurance/computer network defense activities on DoD systems and make recommendations for action to protect the DoD Global Information Grid (GIG). The contractor will produce special reports and assessments related to specific cyber incidents and trends when required, which may include employing extensive and advanced open source and intelligence research techniques for developing specific reports. The contractor may develop and present in-depth intelligence briefings and presentations and reports on incidents affecting DoD computer networks. The contractor may also assist with the management of intelligence and LE/CI web sites. The contractor shall provide technical and analytical support on a 24x7 basis to monitor and detect network irregularities and assist with the response, reporting, and briefing of GIG activities.
  • Technical and Engineering Support—The contractor shall provide incident analysis and handling support, to include vulnerability analysis and assessment and incident and vulnerability trends analysis. This will include assisting with the development of bulletins; courses of action (COAs); tactics, techniques, and procedures (TTPs); concept of operations (CONOPS); and response actions for defending the DoD GIG in support of operation plans (OPLAN), concept plans (CONPLAN), functional plans (FUNCPLAN), and support plans. This support will also include assisting with network management functions, which may include technical and analytical computer network defense support, coordination with LE/CI and counterintelligence authorities, assisting with responses and countermeasures for execution in response to exercises, crisis and contingency operations, vulnerability and global network attacks, assisting with development of emerging DoD information assurance policy, computer network defense policy and doctrine, and DoD network operations and programs. The contractor shall also assist with the development of documents and presentations supporting network operations.
  • Information Dissemination Management/Content-Staging Support—The contractor shall provide operational support that includes efforts designed to gather, integrate and disseminate information in support of net-centric solutions for the DoD GIG.

Top of Page

Task Area 8—Custom Application Development

The contractor shall assist the government to design, develop, document, and test custom applications and their infrastructures including the items listed below. Standard/common/migration application development will generally occur through modification of one or several legacy applications and/or will be built primarily by use of COTS or MainLine Commercial Products (MLCP) and services.

  • Application Development—Provide services for custom application design, development, and enhancements and the preparation of detailed systems designs. Detailed systems design include: detailed data and process models, program specifications, interface specifications/documentation, screen and report designs, prototypes, testing, program control specifications, structure charts, module definitions, compile or build units, data-usage definitions, networking or teleprocessing considerations, and hardware and network architecture, as well as lifecycle management and certification (e.g., DIACAP, etc.). The contractor shall:
    • Define and use an integrated Computer Assisted Software Engineering (CASE) technology environment.
    • Establish detailed systems architecture.
    • Design database and file structures.
    • Finalize input and output designs.
    • Define special design considerations.
    • Define program design specifications.
    • Finalize test, conversion, and implementation plans.
    • Simultaneous documentation of development for certification process.
  • Technical Support—Provide technical support in areas that supplement design stage activities, including information and design reports on specialized software (i.e., languages, database management software [DBMS], client-server applications, etc.); analysis and evaluation of existing government and COTS packages; review and evaluation of management, planning, security, audit, and other products; attendance at design sessions and evaluation and modification of previously prepared design stage documents.
  • Documentation Preparation and Control—Provide documentation and control measures to ensure that all systems are properly documented in accordance with approved federal and DoD standards. The contractor shall ensure that the inventory of system documentation and use is correct and up to date, including identification of missing, outdated or invalid documentation. Conduct and/or attend walk-throughs and meetings where contractor-developed documentation is discussed. Provide, at a minimum, responses to issues and questions, modifications to all or part of the documentation, responses to management concerns, and any additional or supporting information where required.
  • Support—Standard/common/migration application development will generally occur through modification of one or several legacy applications and/or will be built primarily by use of COTS or MLCP and services. There is still a need for detailed systems designs, technical support to supplement the design stage activities and documentation of systems in accordance with approved federal and DoD standards, and the control of that documentation.
  • Advanced Application and Software Development—The contractor shall provide support of advanced software and application development in support of GIG defense. This effort will include the necessary research, design, documenting, prototyping, operationalizing, and deployment of tools and analytical capabilities for network management and defense of the GIG.

Top of Page

Task Area 9—Product Integration

Integration strategies are structured processes to reduce the large number of legacy systems to a more manageable, cost-effective, standard number of standard/common/migration applications as end users transition to their target information architecture supporting interoperability and cross-functional data sharing. Integration strategies encompass those functional and operational activities required to develop plans and methodologies for the successful migration of legacy information systems, databases, and infrastructure to an integrated environment. Integration strategies attempt to examine all aspects of change to the organization resulting from functional process improvements and the selection of standard/common/migration applications. The contractor shall choose an integration strategy that considers all integration management components in order to recommend a standard/common/migration system, provide cost and economic analyses supporting the migration strategy, identify and evaluate risks inherent with the proposed strategy and provide a tentative implementation plan. The contractor shall assist the government in performing the following activities for services required under this task area:

  • Definition of Objectives—Define objectives and establish priorities for the migration strategy.
  • Interim and Target Architecture—Identify interim and target architectures, both functional and technical. Also, identify the standards for compliance to include a description of services for managing, formatting, and exchanging data.
  • Integration and Migration Strategy Development—Analyze current support requirements and capabilities in relation to existing functions, operations, technology, and technical trends. Using the resultant information, develop strategies for the migration of support from its current base to an integrated functional and technical structure that meets guidelines. Integration strategy development encompasses consideration of:
    • Number of applications/systems
    • Number of installations
    • Current technical architecture
    • Connectivity
    • Degree of integration
    • Degree of compliance with existing DoD and federal agency standards/guidelines
    • Performance requirements
    • Contract vehicles
    • Functional requirements
    • Current functional process improvements
    • Current system development projects
    • Consequences of lost functionality
  • Support—Product integration efforts are needed to provide integration strategies that consider all integration management components in order to recommend a standard/common/migration system, provide cost and economic analyses supporting the migration strategy, identify and evaluate risks inherent with the proposed strategy, and provide a tentative implementation plan. Product integration support also includes any necessary system and data integration efforts.

Top of Page

Task Area 10—Test and Evaluation (T&E)

  • Technical Tasks—The contractor shall provide technical support to early operational assessments, developmental testing, operational testing, and evaluation of IT systems. The nature of the Testing Directorate (TE) mission is all inclusive and the unique support requirements will be detailed in individual task orders. Specific TE tasks include:
    • General support:
      • Participating in readiness exercises
      • Staffing hotline call centers
      • Publishing:
        • Quarterly lessons learned reports
        • Reports on DoD interoperability
        • Demonstration plans, guidebooks, and
        • Data collection, reduction, and distribution strategies
        • Measures of effectiveness, measures of performance, and test scenarios
      • Managing trained, deployable support teams
      • Maintaining automated information repositories
      • Planning, configuring, operating, and maintaining test environments support property control management
      • Delivering products at any worldwide location
      • Assisting development of Strategic Management System components:
        • Generating work breakdown structures (WBS)
        • Documenting roles & responsibilities
        • Maintaining the master test schedule
        • Generating risk assessments
        • Identifying performance measures
        • Generating performance metrics
        • Identification of end-to-end performance measures
        • Supporting government-integrated product teams
      • Supporting financial requirements:
        • Generating Missile Testing Range Facility Base proposal products
        • Cost estimating
      • Supporting security, marketing, logistics, supply, distribution, and other services
      • Generating mission-thread capabilities
      • Support pre-test readiness reviews
      • Support post-test assessment reviews
      • Altering physical facilities as required of the test mission
      • Assisting NATO, allies, and other government agencies
      • Provide acquisition recommendations
    • Development of developmental, operational, interoperability, conformance, or other test products:
      • User requirements and testing criteria
      • Master test and evaluation process
      • Test and Execution Master Plan (TEMP)
        • Objective(s)
        • Scope
        • Design of appropriate test and environment
        • Strategy
        • Planning
        • Entry & exit criteria
        • Test scenario and case generation test scripting
        • Test automation generation
        • Conducting or executing laboratory testing
      • Test reporting
        • Analysis and summary of test results
        • Test assessment and evaluation
      • Installation and configuration documentation validation
      • Perform Advanced Concepts Test Demonstrations (ACTD)
      • Monitor testing performed by service components
      • Training materials
    • Analytical Support:
      • Analysis of acquisition documents
      • Analysis of test requirements
      • Produce Requirements Traceability Matrix
      • Analysis of available of test methods
      • Interface analyses
      • Develop and manage the stimulation, modeling, and simulation programs
      • Provide hardware and software system engineering
      • Produce Trend Analysis Matrix
      • Support future capabilities, standards, and evaluation
    • Operational Assessment and Testing—T&E efforts will require technical support for early operational assessments, development testing, and operational test and evaluation for IT systems. These efforts will include the test and evaluation of prototype systems and services.

Top of Page

Task Area 11—Asset Management

The contractor shall provide maintenance and support to control the entire asset lifecycle, from procurement to retirement, that includes applications, license agreements, IT systems, and hardware, as well as IT support equipment, such as video teleconferencing (VTC) operations. Provide asset inventory and asset-tracking services that track the financial aspects of an asset to include cost and depreciation, as well as contract management aspects to include leases, maintenance agreements and service contracts.

  • Software License Agreements—Manage software license agreements for leveraged suppliers, exploiting the agreement, and optimizing software expenses, while remaining compliant with the agreement's terms and conditions. Support summary information to include the general terms and conditions, benefits, strategic and tactical directions, license ordering information, internal billing process, pricing, and deployment and support of the products included in the agreement. Respond to questions and issues from the internal customers and, as required, initiate the discussion of issues with the supplier.
  • Software License Agreement Negotiation—Support negotiation of software license agreements with suppliers to obtain favorable terms, conditions, and pricing.
  • Software Direction Policies—Support procurement activities in the direction of software products identified as "approved" or "alternative" and advise which products have been identified as "avoid." Support organizations with the responsibility for determining the strategic use of software products.
  • Hardware Maintenance Agreements—Manage hardware maintenance agreements by soliciting bids from qualified hardware maintenance vendors to determine the lowest maintenance cost while avoiding diminished support and/or productivity.
  • Hardware Disposition—Support the disposition and disposal of assets to include the processing of lost/stolen/destroyed assets and lease expiration activities.
  • Demand Management (Order, Receive, Install, Track)—Support common practices for ordering assets, tracking orders and assets, and (for hardware/equipment), tagging the assets. Interface at various organizational levels in order to support this task.
  • Application Installation, Operation, and Maintenance—Support application installation, application operations, customer support, training, application maintenance and sustainment, and configuration control. This includes the procurement of supporting hardware and software licenses.

Top of Page

Task Area 12—Communications Engineering

This task area addresses network engineering for programs, labs, and command systems, as defined in individual task orders. It includes network design, network policy dissemination, performance monitoring, and fault management, which includes networks, servers, applications, and force generation databases; collection of operational performance statistics, data analysis, identification of potential problems, and recommendation of engineering solutions for these problems; network architecture design and development of implementation options in conformance with specified guidelines; network engineering for Internet protocol (IP) convergence and integrated voice, data, and video communications systems; network technologies and capabilities; and review and update of system and network management CONOPS.

This also includes provision of a control point to resolve and implement local area network (LAN) configuration issues and equipment hookups; analysis, isolation and coordination of corrective action for communications related problems; configuration of communications equipment to satisfy specific test-bed requirements of the user; and provision of networking capability for customers to ensure customers are isolated from each other to prevent unintentional harmful actions of one customer from impacting other customers. This effort may include engineering efforts for defensive actions necessary to prevent unauthorized access that could impact the performance of the GIG and its end users. The contractor may also provide technical coordination for communications engineering requirements, for example in transitioning from LAN to metropolitan area network (MAN) and wide area network (WAN) connectivity.

  • Network Support—Identify networks, servers, applications, and force generation database requirements to support these communications services and environments. Provide a control point to resolve and implement LAN configuration issues and equipment hookups; analyze, isolate, and coordinate corrective action for communications-related problems; and the configuration of communications equipment in support of these environments. Support the identification of networks, servers, applications, and force-generation database requirements to support these services and environments.
  • Analysis, Reports, Briefings—Provide data analysis and report generation to support law enforcement, intelligence, and system provider network authorities. Develop, or assist with the development of a variety of reports and briefings related to network operations and incident handling.
  • Network Monitoring and Response Actions—Provide network attack/intrusion/fault detection, including malicious code analysis, traffic analysis, incident handling, network and host-based technical and vulnerability analysis, and computer forensics.
  • Laboratory Experiments—Assist with set up of laboratory and conduct controlled lab tests experiments as well as develop and maintain demonstration networks.
  • Operations Support—Enables contractors to coordinate, monitor, respond, and detect network events in real time. This would include use and evaluation of analytical tools, including tools for text search, visualization, data manipulation, incident handling, language translation, image management, and other tools as required. The contractor shall provide personnel with the necessary language and translation skills to accomplish this work.
  • Data Storage and Access—Identify networks, servers, and application requirements to support data storage and access methods needs to include network infrastructure impacts.
  • User Assistance/Accessibility—Define how Section 508 standards will be implemented including how interfaces, tool kits, or other common look-and-feel standards will impact the design of the network infrastructure.
  • Security—Identify how basic security capabilities such as access management, identity management, and access enforcement will impact the design of the network infrastructure. Identify the policies and procedures that are needed to support cross-classification connectivity. This includes emerging requirements to provide advanced technology support for security safeguards, for example, the need to tailor security safeguards (e.g., firewalls) for Voice-over-IP and Video-over-IP, and to provide technical support for certification and qualification activities in attaining approval to operate.
  • Advanced Security Measures for GIG—In support of network operations developed to provide uninterrupted continuity of GIG services, the contractor will assist and support with computer network defense operations as identified in the individual task orders.
  • Communications Engineering and Network Operations—Provide communications engineering support for the planning, processes, and procedures needed to enable sound cross-domain activities. Define how service levels will be determined and agreed upon for cross-domain services. Define end-to-end GIG performance monitoring, configuration management, and problem detection/resolution, as well as enterprise IT resource accounting and addressing.
  • Storage—Identify how shared storage, including providing physical and virtual places to host data on the network, will impact the design of the network infrastructure. Determine the optimum storage architecture to provide for increased storage and retrieval requirements to support implementation of other core services.

Top of Page

Task Area 13—Security Engineering Certification and Accreditation

This task area addresses planning, design, development, testing, demonstration, rapid prototyping, integration, site survey, installation, operation, and maintenance of C2 communications, displays, firewall/guards, intrusion detection systems, and information sensors of computer/network systems and infrastructure operations. This includes the protection and sustainment of the information assurance requirements for system and information availability, access control, integrity, confidentiality, and non-repudiation; protection of the operating environments and software, including network, operating systems, and databases; integration and implementation of information assurance features for client-server and web enterprises; participation in the planning and performance of Security Test & Evaluation (ST&E), Modified Developmental Tests (MDT), and other testing scenarios; support for implementation of user, server, and object certificates and other identification and authentication infrastructure elements; and support for DoD public key infrastructure (PKI) implementation strategies.

  • Intrusion Detection and Prevention—Identify how firewall/guards, intrusion detection systems, and information sensors of computer/network systems and infrastructure operations will protect and sustain the information assurance requirements for system and information availability, access control, integrity, confidentiality, and non-repudiation for these environments.
  • PKI Environment—Identify standard data formats, translation responsibilities, data storage and access methods, conversion methods from original formats, governance of authoritative sources for conversion, and identify how that impacts the implementation of the DoD PKI environment.
  • Information Assurance (IA)—Identify information assurance features for client/server and web enterprises; provides for participation in the planning and conduct of ST&E, MDT, and other testing scenarios; and support implementation of user, server, and object certificates, and other identification and authentication infrastructure elements incorporating automated methods.
  • Security Engineering—Provide security engineering support for planning, design, development, testing, demonstration, rapid prototyping, integration, site survey, installation, operation and maintenance of command and control communications, displays, firewall/guards, intrusion detection systems and information sensors of computer/network systems and infrastructure operations.

Top of Page

Task Area 14—Telecommunications Support

The contractor shall provide value-added telecommunications support to improve information technology systems by enhancing form or content or by providing for more efficient storage and retrieval. The contractor shall design and install wireless and microwave technology when appropriate and as specified in individual task orders. Examples of telecommunications integration services include:

  • Online data processing
  • Online database storage and retrieval
  • Electronic data interchange
  • E-mail
  • Voice mail
  • IP convergence
  • Security features
  • Integrated user directory services

Top of Page

Task Area 15—Computer-Telephony Integration (CTI)

The contractor shall provide computer telephony (use of computers to manage telephone calls). This includes computerized services of call centers, such as those that direct phone calls to the correct department or office. CTI also includes the ability to use a personal computer to initiate and manage phone calls. CTI applications provide the ability to do the following:

  • Authenticate callers using one of several standard methods, the telephone number of the caller can be screened against a database.
  • Recognize a voice, either for authentication or for message forwarding.
  • Using live, recorded voice, or touch-tone entered input, determine how to process a call (for example, by forwarding it to the appropriate person or department).
  • Provide interactive voice response (IVR) to callers.
  • Match the number of a caller with a customer record and display it for reference when talking to the caller.
  • Manage voice or video conferences.
  • Collect and display pending live calls or messages that have been left by callers.
  • Receive fax messages and route them to appropriate fax machines.
  • For outbound calling such as telemarketing, pre-dial callers.
  • Based on call input, initiate a smart agent application to provide help with the caller's request.

Support will also be provided for IP-convergence activities, in particular, Voice-over-IP. The contractor shall also provide CTI support such as integrated user directory services and advance security features.

Top of Page

Task Area 16—Web Services

The contractor shall provide web design and maintenance services consisting of programming, data, human resources web services design, development, and maintenance activities. This may also include foundational components for service-oriented architecture (SOA) such as: architecture definition and guiding principles, governance structures and processes, and development tools and methodologies. Web development support may include design and development of web-based tools for enhanced network visibility and defense.

Top of Page

Task Area 17—Operations Support

  • Application Installation—Under this task area, the contractor shall provide support services for all aspects of installing approved standard/common/ migration applications/systems. All services provided under this task area shall use and be integrated with approved DoD and federal standard communications, security, data, and other defined technical specifications. Applications shall be integrated with existing infrastructure or built with new infrastructure in compliance with approved DoD and federal standards and architectures. Tasks within this area include planning, controlling, overseeing, and conducting successful installation, development, and/or conduct of initial training, conversion, and acceptance testing of migration applications. The contractor shall conduct site surveys, site planning, site installation, initial system file and table builds, data acquisition/conversion, and installation tests. Tasks may include support services necessary to convert from one or more legacy systems to the migration applications including steps such as parallel operations.
  • Application Operations—Provide systems operation support services to include technical and administrative support for standard/common/migration applications or systems. Activities include application/system and network administration services, maintenance of documentation related to system and network operations, routine system problem identification, and correction and LAN/WAN administration. Provide applications and systems modification, testing, installation, and ongoing quality assurance activities.
  • Customer Support—Provide support services to operate a customer support function including a help-desk facility; dial-up access to provide information, tools, techniques, and procedures to assist application users at all levels; automated support for management of the customer service function; problem reporting and resolution of customer problems; and support to new and existing customer information and support centers. This effort may be for long-term or short-term needs, which will be determined by the nature of the tools being supported.
  • Training—Provide training services for all levels of information system managers, operators, maintainers, and users to include development of alternative training scenarios, development of recommendations for appropriate training approaches to include centralized, regional, onsite, train-the-trainer, train-the-end-user; preparation of training plans; development of training curricula and materials for information systems managers and users; preparation of materials and schedules; and administration and conduct of training sessions on government and/or contractor sites.
  • Applications Maintenance and Sustainment—Provide support services for maintenance of standard/common/migration applications to include analysis of problem or change requests, preparation of resource estimates and schedules to effect necessary changes, design, and code changes, conduct testing of all changes, complete and/or update of all documentation affected by the required changes, and coordination of change implementation through appropriate approvals and user notifications. Convert and test software to run on new hardware platforms. Maintain application software to run on upgraded system software or upgraded COTS/MLCP applications. Provide both forward and backward compatibility.
  • Configuration Control—Provide configuration control support that includes analysis, tracking, and reporting. The contractor shall identify and document the characteristics of a configuration item, to control changes to a configuration item and to record and report change processing and implementation status.
  • Support—Operations support is needed for application installation, application operations, customer support, training, application maintenance and sustainment, and configuration control.

Top of Page

Task Area 18—Hardware

This task area provides for acquisition of IT equipment including servers, central processing units (CPU), disks, disk drives, display screens, keyboards, printers, boards, memory, chips, tapes and tape drives, secure wireless solutions, hubs, transceivers, terminal servers, desktop and laptop computers, personal digital assistants (PDAs), and ancillary peripheral hardware. Hardware delivered under this contract, as appropriate, shall include all controllers, connectors, cables, drivers, adapters, and other associated hardware and software required for operations, as provided by the original equipment manufacturer (OEM). In accordance with the provisions of FAR 51.1 Contractor Use of Government Supply Sources, the contracting officer has determined it is the best interests of the government for contractors to use General Services Administration (GSA) schedules as sources of supply. Purchases other than through use of the GSA schedules shall be justified and such justification shall be documented for review as a part of the contractor's purchasing system reviews.

Top of Page

Task Area 19—Software

This task area provides for acquisition of software including applications, operating systems, and licenses. The contractor shall provide a complete solution for all software including any component necessary for integration. For large or ongoing programs, where multiple purchases of software are made, typically the latest software version is installed, however the software being delivered must be of the identical version control numbers unless the government agrees that mixed versions are acceptable. In accordance with the provisions of FAR 51.1 Contractor Use of Government Supply Sources, the contracting officer has determined it is the best interests of the government for contractors to use General Services Administration (GSA) schedules as sources of supply. Purchases other than through use of the GSA schedules shall be justified and such justification shall be documented for review as a part of the contractor's purchasing system reviews. Further, in accordance with Defense Federal Acquisition Regulation Supplement (DFARS) 208.7400 the enterprise software agreements (ESA) established by DoD using basic purchasing agreements competitively awarded off of the GSA schedules shall be used to the fullest extent possible.

Top of Page

Task Area 20—Managed Services

This task area provides for acquisition of managed services. Specific service elements may include computer room production capacity, application maintenance, configuration management, network support, performance monitoring and tuning, system backup and recovery, database management, storage management, data protection and management, help desk, system operations, infrastructure facilities, and information security. In the provision of managed services, the components used by the service provider may include facilities, hardware and software, network connectivity, labor, and other infrastructure.