The Vendor is required to provide for managed security operations center.
- Implement the Security Operations Centre (SOC) infrastructure and tools. This will include establishing secure access control and authentication mechanisms for SOC personnel.
- Primary objectives and must haves for the SOC:
• Unlimited log sources: the proposer has no limit on the number of log sources, log volumes, or configurations, allowing for scalability and flexibility.
• Agnostic syslog: the vendor is able to ingest syslog from physical or virtual devices including but not limited to firewalls, switches, access points, or software
• Compliance with relevant security frameworks and regulations.
• Show a commitment to continuous improvement to security mechanisms, including but not limited to regularly update security tools, threat intelligence sources and procedures.
• Continuous vulnerability scanning: the proposer conducts continuous vulnerability scanning inside the network, outside the network, on endpoints, virtual machines, and cloud posture.
• It also includes dark web scanning, comparing threat intelligence information for relevancy and prioritization.
• Physical security operations center (SOC): the proposer operates a physical SOC staffed by security engineers 24/7.
• The proposer offers continuous monitoring of network traffic and alerting for security threats, events and incidents ensuring rapid detection and response.
• No outsourcing: the proposer does not outsource investigation or after-hours response, ensuring direct and consistent support.
• Agnostic technology support: the vendor is agnostic to all technology investments in the customer organization and can support environments without a wide array of specific tools being added, offering flexibility and compatibility.
• The toolsets should be limited to an agent and/or physical device scanner.
• Integration with leading security tools: the vendor integrates with leading security tools and platforms, allowing for seamless integration into existing security infrastructure.
• Scalability and flexibility: the vendor's platform is scalable and flexible, allowing it to grow with the organization and adapt to changing security needs.
• Ticketing system: the proposer must have a ticket system for historic purposes, communication with customer and be able to trigger alerts via e-mail in customer.
- Contract Period/Term: 3 years
- Questions/Inquires Deadline: April 25, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.