PROVIDING TREASURY ENTERPRISE CYBERSECURITY TECHNOLOGY SERVICES PROTECTS HIGHLY ADAPTIVE CYBERSECURITY SERVICES (HACS)

The Department of the Treasury, Office of the Chief Information Officer has a requirement for cybersecurity services.

Solicitation Summary

The Department of the Treasury, Office of the Chief Information Officer has a requirement for cybersecurity services

Solicitation in a Nutshell

Item

Details

Agency The Department of the Treasury, Office of the Chief Information Officer
Solicitation Number 2032H524Q00009
Status Pre-RFP
Solicitation Date 04/2024 (Estimate)
Award Date 07/2024 (Estimate)
Contract Ceiling Value $300,000,000.00
Solicitation Number 2032H524Q00009
Competition Type Undetermined
Type of Award Task / Delivery Order
Primary Requirement IT Services
Duration 10 year(s) base
Contract Type Task Order
No. of Expected Awards Multiple – Number Unknown
NAICS Code(s):
X

Not Reported

Place of Performance:
  • United States
Opportunity Website: https://sam.gov/opp/5ad1df67873d44e4add3a600a359fbde/view

Background

The Treasury is the national treasury of the federal government of the United States where it serves as an executive department. The Treasury collects all federal taxes; manages U.S. government debt instruments; licenses and supervises banks and thrift institutions; advises the legislative and executive branches on matters of fiscal policy; oversees the printing and circulation of all paper currency and coins in the domestic fiscal system. The Treasury is unique that it is not only a federal agency, but it is a large financial institution.

Established by an Act of Congress in 1789 to manage government revenue, the first secretary of the Treasury was Alexander Hamilton, sworn into office on September 11, 1789. The Treasury

has grown from its offices at 1500 Pennsylvania Ave N.W. to a diverse worldwide organization of 120,000 employees with offices in every State and Territory and operational presence in Africa, Asia, Europe, and Latin America.

Treasury is organized into two major components: the DO and the operating bureaus. DO is primarily responsible for the formulation of policy and management of the Treasury as a whole, while the operating bureaus carry out the specific operations.

The Office of the Chief Information Officer (OCIO) resides within the Treasury’s DO. The OCIO provides leadership to the Treasury and its Bureaus in all areas of information and technology management and supports Treasury’s Mission by implementing strategies that improve the efficiency and performance of Treasury information technology (IT) systems and business processes. OCIO has Treasury-wide responsibility for the direction and development of Treasury’s IT strategy, management of IT investments, and leadership of key technology initiatives. As a pillar of Treasury OCIO, the Associate Chief Information Officer for Cybersecurity (ACIO/CS) is a service provider of cybersecurity solutions through shared and scalable products, platforms, and services. ACIO/CS offers all Treasury Bureaus, Offices, and leadership with a variety of cybersecurity services and solutions for securing and protecting Treasury systems and associated sensitive business data. ACIO/CS works in collaboration with the various programs of the Treasury to ensure the cybersecurity of the Treasury networks, information, and information systems used in performance of Treasury’s mission. ACIO/CS operates and maintains several security applications and platforms with which it fulfills its mission of protecting the Treasury IT Infrastructure/Network. This mission not only supports the need for operation of services but also ensures the safe and effective processing of transactions and data of one of the world’s largest financial institutions. Implementation of advanced and comprehensive cybersecurity protections around the clock are required to stop the evolving treats and malicious activities in cyberspace. Treasury PROviding Treasury Enterprise Cybersecurity Technology & Services (PROTECTS) program serves as tool to meet Treasury’s needs and ensure that the Treasury bureaus and those Federal Government agencies who depend on Treasury for its financial management have the best cybersecurity services possible. The purpose of Treasury’s Cybersecurity Support Services Blanket Purchase Agreement (BPA) under the General Service Administration (GSA) Highly Adaptive Cybersecurity Services (HACS) Special Item Number (SIN) is to provide an enterprise -wide cybersecurity services

Requirements

  • Functional Area 1: Core Operational Framework
  • Functional Area 2: Information Security Incident Management
  • Functional Area 3: Vulnerability Management
  • Functional Area 4:  Adversary and Advanced Operations
  • Functional Area 5: SOC Architecture, Engineering, Deployment and Management
  • Functional Area 6: SOC Support Activities

How can GDIC Help?

As a consulting firm that specializes in helping companies prepare winning proposals for government contracts, GDIC can provide a wide range of services to help offerors prepare their C2E proposal, including capture management, proposal writing, proposal management, and proposal review. GDIC can also provide training and support to help offerors understand the technical and administrative requirements outlined in the solicitation, and can provide guidance on how to structure the proposal to maximize its chances of success.

Our business development and proposal professionals have several decades of experience and expertise in construction proposals and contracts for government. By working with GDIC, offerors can increase their chances of winning the C2E contract and can position themselves for long-term success in the federal marketplace.