The Vendor is required to provide security services consultants to support ongoing operation and development of their security program and systems.
- Security risk assessment and prioritization
• Site and portfolio level assessments
• Threat, vulnerability, and impact analysis; likelihood consequence scoring
• Prioritized recommendation roadmap with 1-3-year
• Alignment with relevant standards
- Policy, standards and procedure development
• Corporate security policy, roles and responsibilities
• Standards for access control, key control, visitor management, badging, contractor security, and screening elected official security.
• Sops, post orders, incident reporting templates, and escalation matrices.
• Training and change-management materials (slide decks, job aids, toolbox talks).
- Incident management and readiness
• Incident response to playbooks (workplace violence, trespass, vandalism, bomb threat, cyber/OT crossover, utility disruptions)
• Tabletop exercises and post incident reviews (RCA, corrective actions, lessons learned).
• Business continuity interfaces (coordination with emergency management).
- Security system design and technology advisory
• Concept of operations and performance requirements for CCTV, card access, intrusion detection, duress alarm, perimeter, and integrations.
• Design drawings and specs, camera layouts and studies, storage calculations, privacy impact considerations, cybersecurity hardening requirements for physical security systems.
• Procurement support (technical specs, evaluation criteria), installation QA, and commissioning and acceptance testing.
- CPTED assessments and design reviews
• Site plans, lighting, landscaping, sightlines, territorial reinforcement, maintenance plans.
• Pre-design, 30/60/90% design reviews; before and after effectiveness measures.
• Cyber-physical security integration (as needed)
o Secure architecture for networked cameras; identity lifecycle coordination with IT/HR.
o Policy alignment with information security (e.g., account management, logging, and patching).
o Interface with SCADA environments for remote sites (advisory level).
- Transition in and transition out
• Onboarding plan (information requests, stakeholder interviews, and site access).
• Knowledge transfer template handover, and cooperation with any successor supplier (if any) at end of contract term.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.