The vendor is required to provide vendor-based security model, evaluate alternatives— including an in-house staffing model—and provide strategic recommendations and implementation guidance to support an effective, compliant, and sustainable security operation for multiple city-owned facilities.
- To support a data-informed decision that enhances safety, improves service quality, increases operational control, and aligns with long-term fiscal and workforce objectives.
• Security assessment and gap analysis
a. Conduct site visits and security assessments at the following locations:
o City center property
o Civic center
o Englewood public library
o Malley recreation center
o Englewood recreation center
o The farm
o Pirates cove water park
• Evaluate current physical security measures, systems, policies, and personnel deployment.
• Identify vulnerabilities, process inefficiencies, and areas of risk or noncompliance.
• Assess current incident response protocols and coordination with city departments.
2. Comparative model evaluation
• Perform a detailed comparison of in-house versus contracted security operations.
• Analyze costs, staffing levels, training requirements, supervision needs, scheduling, and management structure for each model.
• Identify regulatory implications and impacts on operational flexibility, performance, and community engagement.
3. Benchmarking and financial analysis
• Benchmark current security expenditures against industry standards and peer municipalities.
• Conduct a cost-effectiveness evaluation of the city’s existing model.
• Develop a total cost of ownership (TCO) and return on investment (ROI) analysis for proposed security model options
4. Compliance and regulatory review
• Review applicable local, state, and federal security regulations relevant to municipal operations.
• Evaluate how current and proposed models align with compliance obligations.
• Provide recommendations to ensure continuity of compliance through any transition.
5. Organizational readiness and change management assessment
• HR policies and job classification readiness
• Training and certification frameworks
• Recruitment and onboarding capabilities
• Internal supervision and reporting structure
• Recommend a change management strategy to support the transition.
6. Tiered security enhancement recommendations
• Propose three levels (basic, intermediate, enhanced) of security improvements tailored to each site.
• Include projected costs, staffing impacts, and implementation guidance.
7. Implementation roadmap
• Develop a detailed, phased roadmap for implementing the preferred security model.
• Include projected timelines, milestones, budget impacts, staffing ramp-up, and risk mitigation strategies.
- Pre-Proposal Meeting Date: June 17, 2025
- Questions/Inquires Deadline: June 23, 2025