The Contractor shall provide best effort support based on a Firm Fixed Price-Level of Effort (FFP-LOE). The Government Task Manager (GTM) will provide schedule and priorities and will monitor hours at the overall STAR level. The Contractor shall provide ample warnings to the GTM when resource utilization approaches annual, hourly maximums.
Contractor personnel serving in designated High Risk Roles (HRR) are required to comply with the Sponsor’s screening program, whereby completion of a medical screening process to obtain a medical clearance is required. The Sponsor will determine the appropriate level of medical screening based on the High Risk Roles specifically identified by the GTM.
introduction
The Sponsor requires support for technical assessments, forensic analysis and vulnerability documentation of various commercial applications, websites, tools, and internet capabilities in order to make informed risk-based decisions for Sponsor operations.
Work requirementS
- The Contractor Team shall provide in-depth security and product assessments reports based on the analysis of technologies using expertise in cyber security and network forensics.
- The Contractor Team shall analyze websites, application processes, and mobile applications for appropriate security settings and configurations.
- The Contractor Team shall provide recommendations for secure operation of websites, application processes, and mobile applications in each report.
- The Contractor Team shall possess an in-depth knowledge of the latest computer trends to include network analysis, cyber security standards and protocols.
- The Contractor Team shall possess knowledge of foreign and domestic social media networking sites and mobile communication applications.
- The Contractor Team shall be required to travel regularly to a Sponsor site to perform work duties.
required skills and demonstrated experience
The Contractor Team shall have the following required skills, certifications and demonstrated experience:
- Demonstrated experience using industry-standard forensic analysis tools.
- Demonstrated experience performing forensic analysis on internet-based and online services and applications, includes but not limited to websites, VPNs, Cloud Services, and cryptocurrency wallets.
- Demonstrated experience performing forensic analysis on mobile applications and services, includes, but is not limited to, mobile emulators, commercial messaging applications, social media applications, and crypto currency applications.
- Demonstrated experience with Android O/S and iOS to include an understanding of the security settings and vulnerabilities.
- Demonstrated experience documenting forensic analysis results to include security vulnerabilities and mitigations.
- Demonstrated experience documenting forensic analysis results for both technical and non-technical audiences.
Highly Desired skills and demonstrated experience
Skills and demonstrated experiences that are highly desired but not required to perform the work include:
- Demonstrated experience providing security recommendations for using online or mobile services and applications.
- Degree or educational experience in computer science, information science, computer or network forensics, or a related discipline.