The vendor is required to provide support services for mobile application hosting, software development and by-law and budgeting software system development on an as and when needed basis.
1. Mobile application hosting and support services
2. Software development support services
3. By-law and budgeting software system development and support services
- Mobile application hosting and support services
• Secure web hosting: implement and maintain secure web applications, APIs, and containerized workloads across hosting environments.
o Support for secure web hosting, cloud-native platforms (e.g., docker, Kubernetes), and container orchestration.
• Zero-trust security implementation: design and enforce zero-trust security architecture that controls access without requiring VPNs.
o Expertise in zero-trust principles, network segmentation, and policy-based access enforcement.
• Cloud infrastructure management: manage, optimize, and troubleshoot cloud environments to ensure high availability and
security.
o Experience with major cloud providers performance tuning, cost optimization, and logging and monitoring tools.
• Audit logging and monitoring: provide detailed system logging to track user activity and detect potential security events.
o Familiarity with platforms like azure monitor, elk stack, and Splunk for centralized logging and security insights.
• Air-gapped and isolated deployments: deploy and maintain secure applications in restricted or offline environments.
o Knowledge of isolated network configurations and offline deployment methods for
compliance-sensitive workloads.
• Solution architecture and system integration: design robust architectures that integrate diverse systems securely and reliably.
o Solution design, API integration, system interoperability, and secure communication practices.
• Identity and access management (IAM): configure, manage, and support identity systems to control access and improve security posture.
o Integration with azure ad, okta, google identity, and microsoft single sign-on (SSO); role-based access control (RBAC) and multi-factor authentication (MFA) implementation.
• Federated identity management: enable secure access for external partners and staff using existing credentials.
o Federated identity protocols, cross-domain authentication, and identity provider configuration.
• Role-based and fine-grained access controls: develop and enforce detailed access policies to secure systems and data.
o RBAC, policy enforcement tools, least privilege access design.
• Cybersecurity policy development: define and implement organizational cybersecurity policies aligned with compliance standards.
o Policy authoring, regulatory frameworks (e.g., iso 27001, NIST), and internal security training and support.
• Compliance and privacy assurance: ensure all systems meet privacy laws and audit standards.
o Familiarity with GDPR, PIPEDA, and privacy-by-design principles; audit support documentation.
• Project management and stakeholder coordination: lead and coordinate technical and business teams to implement identity and security solutions.
o Agile project management, stakeholder engagement, and documentation best practices.
- Software development support consultant
• Application development: creating and implementing software applications.
• Application management: optimizing and troubleshooting existing applications.
• Solution architecture design: designing and integrating system architectures.
• Project management: coordinating with stakeholders and managing project timelines.
• Compliance and privacy assurance: ensuring adherence to compliance standards and privacy regulations.
• API integration: developing and integrating APIs to enhance functionality.
• Data analysis and reporting: implementing data analytics solutions and generating reports.
b. The consultant shall have the following skills:
• Full stack development: expertise in JavaScript, .net, c#, html5, and css3.
• Database management: proficiency with oracle database and microsoft SQL server.
• Identity integration: experience with single sign-on (SSO) solutions, including providers such as google and microsoft.
• Front-end frameworks: familiarity with modern frameworks like angular and react.
• Software management and deployment: knowledge of docker and Kubernetes.
• The developed software and application should be deployable in a docker environment.
• API development: experience with restful and GraphQL APIs.
• Version control: proficiency with git and platforms like GitHub or GitLab.
• Testing and quality assurance: knowledge of automated testing frameworks and tools such as jest, mocha, or selenium.
• Cloud services: experience with cloud platforms like AWS, azure, or google cloud.
• Security best practices: understanding of web application security principles and practices. - By-law and budgeting software system development and support consultant
• Software development services: creating and implementing software applications
• Project management coordinator: coordinating with stakeholders and managing project timelines.
• Amps implementation and support: implementing and supporting state amps process
• Onsite support: providing onsite support for officers
a. The consultant shall have the following skills:
• Full stack development: expertise in JavaScript, .net, c#, java, html5, and css3.
• Database management: proficiency with oracle database.
• Testing and quality assurance: knowledge of automated testing frameworks and tools such as jest, mocha, or selenium.
• Cloud services: experience with cloud platforms like AWS, azure, or google cloud.
• Security best practices: understanding of web application security principles and practices.
- Contract Period/Term: 3 years
- Questions/Inquires Deadline: July 29, 2025
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.