The vendor is required to provide IT professional services as outlined below.
a. Network services:
• This service would include but not be limited to network design, network integration, network support, ethernet, fiber installation, firewall support and maintenance, security software and hardware maintenance, intrusion detection, vulnerability scanning, VPN services, proxy services and incident and response services.
b. Telephony services:
• This service would include but not be limited to design, integration, support, maintenance, security, software and hardware upgrades, voice over IP (VOIP), video conferencing, fax and messaging under a unified communication infrastructure with some PBX, pots and Centrex connected through traditional public switched telephone networks (PSTN).
c. Server administration services:
• This service would include but not be limited to microsoft, Linux, VMware, Citrix, web server support, WebLogic, IBM (WebSphere), Esri (ArcGIS, ARCSDE), LDAP, database server support, load testing and incident and response services.
d. Lotus notes services:
• This service would include but not limited to administration, maintenance, training, application development, smartphone support, and incident and response services.
e. Application development:
• This service would include but not be limited to visual basic, MSSQL and SSRS, MSACCESS, SharePoint, PLI, Cobol, visual age, C++, Apache Lucene core, java and java NIO/JMX/JNDI/JSF/JSP, .net, crystal reports, CAPSIT core, IBM rational (rad, clear case), Esri, eclipse, web services, web applications, json, pdf forms development, xml, servlets, java script and ajax, C++sharp, load testing, Perl, php, jasper soft report server and incident and response services.
f. Business analyst and functional lead:
• This service would include but is not limited to requirements gathering, documentation, learning and documenting systems and applications, preparing training materials and supporting documentation, training, user acceptance testing, regression testing, communications and coordination with technical staff, business owners and users.
g. Database administration services:
• This service would include but not be limited to database administration, monitoring, and implementation for Sybase, db2, oracle, MSSQL, MARIADB, MSSQL and SSRS, Essbase, FOXPRO, MYSQL, IDERA, BMC, stored procedures, indexing and load balancing, microsoft access, PL and SQL, and incident and response services.
h. Project administration services:
• This service would include but not be limited to project management, analysis and coordination through the implementation phase and incident and response services.
i. Disaster recovery and business continuity:
• This service would include but not be limited to business impact analysis, contingency planning and audit and risk analysis.
j. Security audit:
• This service would include but not be limited to network analysis and information gathering in regards to network vulnerability, invasion and penetration from hostile outside factions, endpoint devices and data risk analysis (in storage and in transit).
k. Microsoft:
• This service would include, but not be limited to access management (active directory), desktop virtualization, endpoint application management (SCCM), systems center operations manager (SCOM), SharePoint, MDOP, update and patch management, windows server, and incident and response services, office 365 application implementation planning and support services, azure cloud services, aware services and solutions, azure app services, artificial intelligence, business intelligence, power bi, dashboards, predictive analysis, common data service, common data model, active directory, security center.
• Responding vendors must be able to obtain direct and immediate access to Microsoft’s premier support and product engineering to assist with resolving technical issues and providing guidance on workaround for known bugs and other related issues.
l. Cloud services:
• Planning and implementing solutions: backup, DR, VM, SaaS, IAAS, using for azure, google cloud, AWS, IBM cloud or other cloud services.
m. Data storage administration:
• This service would include, but not be limited to data and storage administration, TSM, SAN, and incident and response services.
n. Website development:
• This service would include but not be limited to website development, website content management, administration, maintenance, training, application development, web server support, and incident and response services.
o. Education:
• This service would include but not be limited to onsite technology classes, onsite certified oracle university training, onsite certified microsoft training and knowledge transfer.
p. Day to day support:
• This service would include but not be limited to windows desktop OS software, windows-based office automation application software, windows-based microcomputer peripheral and driver software, microsoft office suite, adobe products, mobile device client software, browser and internet, anti-malware, pc and laptop repair, Intergraph cad client software support, ELSAG LPR, tracs, and incident and response services.
q. Cyber security strategy:
• This service would include but not be limited to training, consultation, risk assessments, review of existing cyber security tools, recommendations for improvements, configurations and reporting to help improve overall cyber security posture at the county.
r. The selected contractor(s) will work:
• The exclusive direction of the department of information technology, who will determine and approve all services to be performed. all work will conform to the standards set by the department of information technology.
s. Confidentiality and security requirement:
• The contractor will comply with the confidentiality and security requirements of the city and the department of information technology.
• The contractor must submit, upon request by the county, a work experience résumé for each technician who will be working at the city under this contract.
• The signing of a "confidentiality agreement" by each technician and a criminal background check will be necessary.
- Contract Period/Term: 3 years
- Questions/Inquires Deadline: August 20, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.