The vendor required to provide IT security audit services for include:
• Identify vendors with expertise to perform an extensive IT security audit.
• Understand the methodologies and tools used by vendors to conduct security audits.
• Gather information on the scope, timeline, and estimated costs associated with the audit.
• Assess the capabilities of vendors in identifying and mitigating security vulnerabilities.
- Requirements
1. External assessment
• Perform external vulnerability scanning, penetration testing, and risk assessment across xx public IP addresses.
2. Internal assessment
• Conduct internal vulnerability scanning, penetration testing, and risk assessment across both/a/24 and two/21/21 internal network segments.
• The awarded vendor will be provided with VPN access and an organizational user account to facilitate this portion of the engagement.
- Questions/Inquires Deadline: November 20, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.