Task Area Definitions
The Contractor shall provide Operations, application support and full lifecycle support for the range of solutions and services supporting DLA’s Business, Operations and Logistics System, including full lifecycle solution and service support necessary to meet requirements of this contract and individual Task Orders (TOs) as related to Enterprise Technology Services.
Operations Support: All solutions and services must meet DLA policies, standards, and procedures as identified by individual TOs (e.g. enterprise architecture, information assurance, and personnel, physical and system security). All contractor solutions and services shall perform routine maintenance during regular periods scheduled in advance and approved by DLA J6. The contractor will ensure that systems will be unavailable during maintenance windows only to the extent necessary for systems maintenance purposes. The contractor may be required to perform the required services as follows:
a. Network Management (Local Area Network (LAN)/Wide Area Network (WAN)) – The contractor shall update/change configuration files, provide support doing refresh of hardware and firmware, research and apply compliance requirements (patch management). Involves preventive and corrective measures, and complies with configuration management documentation requirements. Evaluates the introduction of new network sites, services and products. Plans, designs, implements, tests and/or deploys the new products. Includes Office and Industrial Wireless Network design, installation and support. Supports WAN acceleration to optimize network traffic and reduce latency.
b. Service Desk Support – The contractor shall provide real-time monitoring of DLA’s WAN (both classified and unclassified) using state of the art network monitoring and management tools, responding to anomalies depicted by automated network alerts, and conducting initial triage to resolve errors within the network infrastructure to ensure continuous operation of DLA’s critical applications and business services.
c. Firewall – The contractor shall update/change Access Control List (ACL) rules, Intrusion Detection System/Intrusion Prevention System (IDS/IPS) infrastructure, refresh security hardware and firmware, research and apply compliance requirements (Security Technical Implementation Guide (STIGs), etc.). Involves administration as well as preventive and corrective measures. Performs troubleshooting.
d. Cabling/Wiring – The contractor shall install outside plant (OSP) and inside plant (ISP) network, voice/data and Storage Area Network (SAN) infrastructure platform and products and be required to complete cabling/wiring projects as identified in the individual task orders.
e. VoIP – The contractor shall provide design, engineering, implementation and sustainment expertise to implement, test and/or deploy Government Furnished Equipment (GFE). The contractor shall provide special reports as required on the usage of the system.
f. PBX – The contractor shall maintain PBX/systems, circuits and associated hardware. Interfaces with the commercial carrier(s) to troubleshoot and resolve issues.
g. Video/Video Teleconference (VTC)
1. Video/VTC Engineering – The contractor shall be responsible for planning, engineering, testing, tuning, configuration and support of VTC technologies such as media servers and associated software on both classified and unclassified VTC infrastructure. Additional responsibilities include streaming video engineering. Provides client consulting and training on control, interfaces and use of the Audio/Video, VTC and streaming video equipment and software. Test and register new customer sites, ensure operation and STIG compliance.
2. Video/VTC Support – The contractor shall be responsible for setup and support of VTC technologies such as media servers and associated software. Additional responsibilities include streaming video support. The contractor shall provide technical response and advanced technical response support for incident management and provide touch labor as required. The contractor shall build, launch and support conferences and video streams. The contractor shall monitor, tune, set configurations, and maintain a range of Audio Visual (AV) and VTC components and systems. This will include general housekeeping of the units and facility where equipment is installed. Replacement of bulbs/lamps should be performed and recorded for maintenance purposes. Provides client consulting and training on control, interfaces and use of the Audio/Video, VTC and streaming video equipment and software to include video telecommunications endpoints and facilities for fault isolation, remediation, performance analysis, and other incident management operations as required. The contractor shall utilize monitoring, performance analysis, software and hardware equipment to troubleshoot and isolate problems, gauge performance and record activity. Devise solutions to moderately complex operational problems within the capacity and operational limitations of installed equipment and software. Responsible to report, troubleshoot and escalate to contractors for problems logged.
1. Engineering – The contractor shall provide technical direction and engineering knowledge for communications activities including planning, designing, developing, testing, installing and maintaining large communications networks. Ensures that adequate and appropriate planning is provided for remote hardware and communications facilities to develop and implement methodologies for analysis, installation and support of voice communications systems. Provides complex engineering or analytical tasks and activities.
2. Operations – The contractor shall respond to user complaints to research complex problems associated with the organization telecommunication devices. Performs Adds, Moves and Changes. Monitors and responds to complex technical control facility hardware and software problems. Interfaces with contractor support service groups to ensure proper escalation during outages or periods of degraded system performance.
3. SATCOM – The contractor shall provide Satellite Communications Systems planning, designing, developing, testing, installing, management.
4. Radios/Spectrum Management – The contractor shall provide Radio Communication Systems/Spectrum planning, designing, developing, testing, installing, and management.
a. System Administration – The contractor shall provide administrator oversight on specified IT assets to include Windows and non-Windows (Unix) virtual and stand-alone operating systems, monitoring, and performance measurement software, Linux, zOS and Commercial Off the Shelf (COTS) applications. The contractor shall:
1. Perform system deployment and adherence to DLA lifecycle management policies and procedures.
2. Install GFE, apply patches, manage file systems, monitor performance and troubleshoot alerts from monitoring tools.
3. Perform system failure analysis and recovery; ensuring the consistency and integrity of file systems.
4. Perform system security patching, upgrades, and configuration/policy changes in compliance with all relevant and required Information Assurance (IA) and security implementation/compliance requirements, including DISA Security Technical Information Guides (STIGs), identified during STIG reviews, Gold Disk, vulnerability Scans, etc.
5. Administer accounts user access control to the systems that the contractor administers.
6. Monitor the system logs for growth patterns, trends, and intrusion detection.
7. Provide test support to include supporting integration testing, analyzing test results and assisting in acceptance testing of software components.
8. Conduct research and investigation into technological developments in such areas as operating systems, and software systems for installing, monitoring and maintaining operating systems and executive software.
9. Install, configure and maintain COTS software products that provide operating system support such as Netbackup, McAfee and other products per J6 direction.
10. Configure and maintain system backups to conform to IA controls requirements.
11. Assist with the research and supporting analysis, and design of virtual and standalone server and workstation specifications and configurations that will feed into a Government decision. Also, provide research and analysis to deliver supporting analysis/recommendations for Government use in determining features such as encryption solutions.
12. Assist Government administrators remotely to provide systems management and technical troubleshooting support to DLA for UNIX systems at one or more of the DLA operating locations as needed to include Red Hat Linux (version 5 or higher), HP-UX (version 11.31 or higher) and Solaris (version 10.0 or higher).
13. Resolve UNIX system installation problems and independently work with the contractors until problem resolution.
14. Maintain the integrity of system baselines and provide audit checks of all systems and backups as required.
15. Perform system/application diagnostics through the use of Government-provided maintenance tools to ensure availability and to provide a notification vehicle of problems to administrators.
b. Computer Operations/Batch/Scheduling – The contractor shall provide skilled technical support in the areas of Computer Room Operations, Backup and Recovery, Tape Management, Disk to Disk backup technology, Job scheduling, execution and monitoring.
1. The contractor shall be knowledgeable in the requirements for proper operation of a computer facility and shall monitor climate conditions, commercial power input, emergency power hardware (Uninterruptible Power Supply (UPS), batteries, generator, etc.), Air Conditioning (A/C), and Power Distribution Unit (PDU) normal operations within the computing facility in order to provide situation awareness of operational thresholds. Conducts routine checks to ensure all conditions are within required parameters as well as to ensure the physical security of the facility is maintained.
2. The contractor shall provide support to manage the tape backup and recovery operations including interaction with DLA provided backup software such as CA-1, Symantec Netbackup or Veeam virtual server backup software. The contractor shall ensure that backups occur as scheduled and that tape read/write errors do not occur and reschedule backups as required. The contractor shall ensure that tapes are kept in the designated areas and that offsite tapes are available to the offsite storage contractor and shall receive returning tapes as required.
3. The contractor shall provide oversight for the scheduling of jobs supporting computer operations and application functionality. Ensures that jobs execute in the sequence that was scheduled with a satisfactory return code. Alerts technical personnel if issues arise for the appropriate resolution.
4. DLA J6 operates multiple products that monitor facility operations, network, server, application and disk performance and availability, and performance thresholds monitored for a wide range of operations. A computing environment can include network (LAN/WAN), server (operating system/resource utilization, etc.), storage area network (disk, tape and switching), facility and application operations. The contractor shall provide expertise that will monitor these software products to ensure that the computing environment is operating within thresholds and that it is available to customers. Ensures that incident tickets are being generated, technicians are responding to incidents or that incidents are escalated as needed until the identified issue is resolved.
5. The Contractor shall provide monthly server/database utilization reports and configure scripts where necessary to manage/provide notification of storage, file system, and database thresholds when needed. Upon request, the Contractor will participate in the evaluation of new products, and will develop requirements documents and criteria spreadsheets as required. The Contractor will provide management of accounts, network rights, and access to systems and equipment. The Contractor will maintain the integrity of system baselines and provide audit checks of all systems and backups as required.
c. Storage Area Network (SAN) Support – The contractor shall support storage planning, data migrations and problem solving activities across various distributed disk environments. The contractor shall help resolve advanced technical response storage issues reported within the DLA enterprise. Tasks shall include configuration on multiple platforms, data migration planning and execution, support planning and migration, storage virtualization technology implementation, storage mirroring and replication, storage equipment replacements and system monitoring. Problem solving shall include troubleshooting connection problems, equipment failures and outages, issues raised by customers, performance issues and provide technical response and advanced technical response. Manages the day-to-day allocation and management of Logical Unit Number (LUN) and volume groups.
d. COTS Application and Administration – The contractor shall assist with developing the strategy to test, tune, configure, implement, setup and support common enterprise third party tools/applications. Once the Government has approved the strategy, the contractor shall assist in testing, tuning, configuring, implementing, setting up and supporting those tools and application. Additional applications may include, but are not limited to, products such as OCS/Lync, SharePoint, CITRIX, webMethods, WebLogic, Websphere MQ, IIS, Apache, Vontu, Remedy, etc. as identified within the Task Order.
e. Asset Management and Inventory
1. Physical Inventory – The contractor shall assist with the physical inventory and accountability of all IT hardware assets within an operating location. All assets shall be tracked from receipt of hardware to the disposal of the equipment which includes the management of all tracking forms.
2. Licensing Management and Compliance – The contractor shall provide support to manage commercial software licenses obtained by the Government. The contractor shall assist the government in assembling documentation packages for internal use software (software developed by the Government for its own use) and recording and maintaining the audit documentation packages for that software. Commercial software is often divided into application software and system software (which includes operating systems and any program that supports application software) and both must be managed and recorded in automated systems used by the Government for asset management and audit compliance. Commercial software licensing includes any follow-on maintenance/license to use software in DLA. All procurement documentation such as purchase order, Military Interdepartmental Purchase Requests (MIPRs), as well as other pertinent information for each software license shall be collected and maintained in the appropriate automated tool.
f. Database Administration
1. Database Administration/Support – The contractor shall monitor health and maintenance of databases. The contractor may be responsible for the following:
i. Troubleshooting, applying patches, dealing with exceptions and escalating problems in meeting Service Level Agreements.
ii. Installing and configuring Database Management System (DBMS) software, and performing upgrades.
iii. Managing volume and performance.
iv. Ensuring high availability, backup and recovery of production databases.
v. Performing planning, scaling and capacity planning etc.
2. Data Architecture & Modeling – The contractor shall design and develop architecture for data models and integration solutions for the enterprise’s integration strategy or initiatives. Research and provide to Government personnel modeling standards, guidelines, best practices and approved modeling techniques. Support the creation of all conceptual, logical and physical data models.
3. Data Analysis – The contractor shall provide support for data services, Business Intelligence, data quality, data integration and data warehouse. Assist and/or provide recommendations to define the requirements for analysis within a given business area. Perform root cause and detailed data analysis, identifying trends and anomalies. Database Backups – The contractor shall be responsible for the implementation of products such as Oracle Recovery Manager (RMAN) and ensuring adequate backups are performed within IA controls.
4. The Contractor shall provide database management support for the enterprise DLA operating environment to include Oracle (version 11g or higher) and MS SQL (version 2008 R2 or higher) platforms. The Contractor shall be proficient in Oracle Real Application Cluster (RAC), Oracle Enterprise Manager (OEM), Oracle Advanced Replication, Oracle Dataguard, and Oracle Recovery Manager (RMAN) software.
g. Automated Identification Technology Support
1. Industrial Equipment – The contractor shall provide support to maintain, operate, and repair all industrial equipment associated with the automated identification technology (AIT) operations at all DLA locations where this technology is in use, including DLA Distribution sites worldwide, and Recruit Depots associated with the military services. This includes Wireless/Radio Frequency (RF), and Radio Frequency Identification (RFID) equipment and the printing equipment associated with AIT. The contractor shall:
i. Ensure that the staff provided to support this task are fully accredited, licensed, and certified to perform the duties and functions associated with this task. The contractor shall provide expertise in electrical and network standards and specifications.
ii. As specified in the task order, the contractor shall provide the necessary supplies and hardware to perform the assigned tasks. Supplies and hardware include stanchions for wireless equipment, cable trays, brackets, and supporting hardware such as nuts, bolts, and screws.
iii. The contractor shall perform AIT industrial equipment support at DLA distribution centers and recruit centers. In addition, the contractor will be tasked to travel to other DLA or military recruit depots such as Fort Leonard Wood, MO; Great Lakes, IL; Fort Jackson, SC; Fort Benning, GA; and Fort Sill, OK, to perform AIT industrial equipment support at those locations on a short-term basis. When the task order requires that the contractor travel to a site, the contractor shall arrange for all transportation, tools, and materials required to reach the location and to perform the specified support. The contractor shall provide any specialized AIT industrial equipment and tools required for such radio frequency identification (RFID) tasks as spectrum analysis and LAN validation. Travel may be required to CONUS and/or OCONUS destinations. The contractor shall ensure that the personnel sent to the locations have completed the required training and certifications to be permitted to work at the location. An example is the OSHA safety training that is required prior to entering a distribution facility or military depot to perform industrial equipment operations, maintenance, or repair.
iv. The contractor shall provide consultation and analysis support for AIT industrial equipment, Wireless/Radio Frequency (RF), and Radio Frequency Identification (RFID) projects and assist the Government in developing plans for AIT, RF, and RFID projects. Examples of consultation and analysis include specialized uses of AIT and recommendations for using AIT in multiple or varied environments. The contractor shall assist in the design, comparison analysis, implementation, and maintenance of all AIT wireless equipment, such as hand held scanners, RFID Reader technologies comparison, or middleware comparison, as examples.
v. The contractor shall provide maintenance, operations, and repair services for Wireless/Radio Frequency and Radio Frequency Identification equipment. The contractor shall maintain the physical and virtual servers supporting the active and passive RFID equipment and printers. The contractor shall submit a project plan prior to beginning work under the task order. The project plan shall detail, at a minimum, the resources, time, schedule, and any special requirements that must be supported to successfully perform the task. The project plan will be reviewed and approved by the Government prior to the contractor beginning the work. The contractor shall provide detailed reports of work accomplished that associate the proposed resources, time and schedule in the project plan to the results of the work accomplished.
vi. The contractor shall manage the assets used in maintenance, operations, and repairs for AIT/RF/RFID equipment. The contractor shall record serial numbers, asset tags, locations and assigned property holders for all government owned equipment utilized management. The contractor shall assist the Government in recording this asset information in the automated tools that DLA uses for this purpose. Those tools are ITAMS and EBS.
vii. Active RFID and passive RFID are both in use at DLA distribution centers and at military service depots where DLA has a presence. The ability to print transportation documentation and active and passive RFID tags, and the capability to write and read those tags are essential to operating the distribution centers and depots. The contractor shall provide expert analysis support for active and passive RFID print devices and strategies for more efficient use of said print devices and for uses for those devices that DLA is planning but has not yet implemented. The contractor shall have the knowledge and ability to transfer information captured from the active and passive RFID devices to printed tags, reports, and other documents. The contractor shall provide maintenance, repair, and operations support for the print devices.
2. Local Area Network (LAN) and Electric Service – The contractor shall provide support to install and maintain the wireless network and electrical infrastructure supporting the active and passive RFID devices used in the DLA locations where this technology is in use, including DLA Distribution sites worldwide, and Recruit Depots associated with the military services. This includes the network and electrical infrastructure supporting Wireless/Radio Frequency (RF), and Radio Frequency Identification (RFID) equipment and the printing equipment associated with AIT. It does not include the wireless and electrical infrastructure for the building where the AIT equipment is housed. The contractor shall:
i. Install wireless/RF network, LAN, and electrical infrastructure supporting RFID and AIT equipment in accordance with all applicable military, DOD, and professional standards including:
(1) DOD 5220.22M, Industrial Security Manual for Safeguarding Classified Information
(2) MIL-STD-188-124B N3, Grounding, Bonding, and Shielding for Electronic Common Long Haul/Tactical Communications Systems including Ground based Communications – Electronics Facilities and Equipment
(3) NFPA 70, National Electrical Code; current edition
(4) MIL-HDBK-419A, Vol. 2 Grounding, Bonding, and Shielding for Electronic Equipment and Facilities
(5) ANSI/TIA/EIA-568B; Commercial Building Telecommunications Cabling Standard
(6) ANSI/TIA/EIA-569A, Commercial Building Standard for Telecommunications Pathways and Spaces
(7) ANSI/TIA/EIA-606, Administrative Standard for the Telecommunications Infrastructure of Commercial Buildings
(8) Occupational Safety and Health Act (OSHA), Code of Federal Regulations Title 29
(9) Occupational Safety and Health Act (OSHA), Code of Federal Regulations Title 40
(10)NEC 2005, National Electric Code
ii. Maintain and monitor the health of the RF, RFID, and print databases. This includes, but is not limited to, troubleshooting, applying patches, and handling exceptions. The contractor shall escalate to the appropriate Government point of contact any problems encountered in meeting Service Level Agreements (SLAs) supporting RF/RFID IT services.
3. Wireless and RFID Support – The contractor shall provide support to install and maintain the wireless/RF hardware and software supporting the active and passive RFID devices used in the DLA locations where this technology is in use, including DLA Distribution sites worldwide, and Recruit Depots associated with the military services. The contractor shall:
i. Maintain the existing wireless/RF hardware and software. The contractor shall troubleshoot user problems and equipment failures for wireless/RF and RFID. The contractor shall resolve wireless/RF and RFID equipment related problems using enterprise and /or third-party tools such as Stay-Linked and Soti Mobi Control (example) plus all the tools that those enterprise/third-party tools encompass, such as Mobi scan, and Mobi control manager (example). The contractor shall perform basic network troubleshooting and repair for wireless/RF and RFID networks and devices in all DLA locations utilizing AIT technology.
ii. Monitor and report on the RF/RFID wireless network connection between the building’s wireless network and the wireless equipment that performs RF and RFID. This includes checking for intrusions, security compliance, and rogue detection on the wireless network connection. The contractor shall provide expertise to determine the point of failure between the RF equipment and the network. The contractor shall perform this work in compliance with all applicable licensing, training, and certification requirements, including those listed in section 2.a of this task.
iii. Maintain and repair all wireless/RF and RFID handheld wireless devices, to include but not limited to: vehicle mounted terminals (VMT) hand held terminals (HHT); mounting solutions; mobile carts; active and passive RFID portals and scanners; wired bar code scanners; Blue tooth barcode scanners, printers; antennas; wireless LAN controllers. The contractor shall install, configure, and maintain software related to the terminals, devices, or RF system. The contractor shall process requests for warranty service from the equipment manufacturer as needed.
iv. Perform remote and on site software updates to the handheld devices and terminals. The contractor shall assist the Government in controlling and managing the software licenses and maintenance agreements.
v. Ensure that the personnel performing the duties in this task have completed the required training and have current licenses and certifications required to be permitted to work at the DLA or military service location.
vi. Perform problem reporting and problem resolution for the end users utilizing the wireless network supporting the RF/RFID devices, and the devices themselves.
vii. Assist end users with access and usage problems.
viii. Prepare and install new equipment.
ix. Assist with development and documentation operating procedures and EHD Knowledge articles.
x. Perform site surveys and prepare configuration designs for the site’s wireless/RF network and devices.
xi. Develop management reports providing information regarding such items as usage, problems and resolutions, and performance, as examples.
h. Email and Mobile Device Support:
1. Email migration and sustainment services:
i. Migration responsibilities: The contractor shall assist with the creation of architecture and design diagrams for a high availability solution for improving the existing DLA-Wide Enterprise email service. The contractor shall assist with the planning and expected migrations of existing DLA legacy MS Exchange Server to new locations as necessary and for the upgrade of services to current versions of the chosen solution. The contractor shall recommend a migration strategy including milestones and deadlines for migration activities. Contractor shall assist with the development of a plan for the migration and configuration of the system and assist in implementing the designated solutions.
ii. ii. Sustainment responsibilities: The contractor shall provide sustainment support for the installation, configuration and maintenance of the DLA-Wide Enterprise Email services as identified in Migration Responsibilities as identified by the specific task order.
2. Mobile Device (e.g. iOS, Android, Windows, etc.) Migration and Sustainment Services.
i. Migration responsibilities: The contractor shall provide support with the development of architecture and design diagrams for a high availability solution for the Mobile Device services. The contractor shall assist with the migration of existing DLA legacy Mobile Device Servers to new locations as necessary and for the upgrade of Mobile Device services to current versions of the software or to new contractor selections. The contractor shall recommend a migration strategy including milestones, needed resources and deadlines for migration activities. The contractor shall ensure the project plan clearly articulates the scope, schedule, assumptions, and risks. The contractor shall provide status checks and risk mitigation strategies for the completion of the project. The contractor shall develop a plan for the migration and configuration.
ii. Sustainment responsibilities: The contractor shall provide sustainment support with product analysis and selection, development of architecture and design diagrams, and the installation, configuration and maintenance of the DLA-Wide Mobile Device services.
iii. Active Directory Support: The primary responsibility of the Microsoft Active Directory Administrator will be to provide the highest quality/availability Active Directory environment for the DLA Enterprise. The contractor may be required to make recommendations for the development and institution of Enterprise-wide group policies, and assist in the implementation of the selected recommendation for Active Directory consolidation, integration with identity management products, and domain operation troubleshooting. Applicable requirements to be considered include:
iv. Centralized management of very large Windows networks
v. The ability to eliminate resource domains, including the hardware and administration they entail
vi. Policy-based desktop lockdown and software distribution
vii. The ability to delegate administrative control over resources where appropriate
viii. Simplified location and use of shared resources
ix. Group Policy
x. Email (e.g. Exchange) Support
xi. Integrated public key infrastructure (PKI) services
xii. Domain-based DFS
a. Customer Support. The contractor shall provide for a range of customer support model (CSM) functions to include the following:
1. Customer Liaison
i. Business Relationship Management: The contractor shall assist with all levels of customer communications to include Enterprise Business System (EBS) Customer Relationship Management (CRM) documentation/management, Memorandum of Understanding/Agreement (MOU/MOAs), Service Level Agreements (SLA), Organization Level Agreement (OLAs) and related metrics; includes all aspects of managing relationships to include customer satisfaction, escalation management, customer communications and customer requirements management to include defined VIP liaison standards.
ii. Integration Project Management: The contractor shall manage the integration of IT services, as directed, with effectively orchestrated solutions aligned to customer requirements and problems that cross multiple IT service areas.
iii. Situational Awareness: The contractor shall provide agency senior IT leadership with sustained situational awareness of incidents, problems, projects, and any events that have real or potential mission impact.
iv. Local Team Coordination: The contractor shall coordinate with multiple J6 service functions/organizations
2. End User Support
The DLA IT Management process is handled in a tiered approach. Support services consist of three tiers as described below:
Initial Response Support is the initial support responsible for customer issues or requests. It is synonymous with first-line support, level 1 support, front-end support, support line 1, and various other headings denoting basic level technical support functions. Currently, the Initial Response Support is provided by the DLA Enterprise Helpdesk (EHD). The EHD provides a Single Point of Contact (SPOC) serving approximately 36,000+ DLA users/customers/activities globally.
Initial Response Support will gather as much information as possible from the end user to determine the customer’s issue or request. They will analyze the symptoms, assess the impact, severity, and priority of the incident; and attempt to resolve the problem during the initial customer contact. Initial Response Support will log all trouble tickets into a service desk management solution. The Initial Response Support level handles requests for service from a variety of sources, e.g., incoming calls, emails, faxes, walk-ins, web submissions, reports, letters, and radio requests.
Initial Response Support supports a variety of Commercial-Off-The-Shelf (COTS), Government-Off-The-Shelf (GOTS), and custom developed applications as well as network triage support. Initial Response Support performs hardware and software diagnostic procedures on all IT assets. The Initial Response Support level is responsible for procuring and maintaining their telephone/fax numbers, Internet connections/addresses, and postal addresses.
Initial Response Support is provided via a contractor provisioned, configured and managed technologies. The technology is configured and managed by the contractor. DLA and the Initial Response Support team will work together to establish a list of Technical Support Services contacts that are used to ensure the smooth transition of trouble tickets that need to be elevated. All contacts are tracked in the service desk management solution. The Technical Support Service provider shall maintain current/accurate information within the Initial Response Support system.
If Initial Response Support cannot assist or resolve a user’s request/incident, they are responsible for escalating the request/ticket to an appropriate expert at the Technical Support Service level for specialized, expert analysis, support, and resolution. All requests/tickets are to be tracked from identification of the problem to the solution/resolution. Technical Support Service is a more in-depth technical support level than Initial Response Support; Technical Support Services is more experienced and knowledgeable on particular products or services. It is synonymous with level 2 support, support line 2, administrative level support, and various other headings denoting advanced technical troubleshooting and analysis methods. Technical Support Service technicians are responsible for investigating elevated issues by confirming the validity of the problem or request and seeking solutions related to these more complex issues. The most common Technical Support Service is desktop management, but may include other IT support personnel such as application support, systems administration, and network management.
Advanced Technical Support Service is the highest level of support in a three-tiered technical support model responsible for handling the most difficult or advanced problems. Advanced Technical Support Service providers are most often commercial hardware or software manufacturers or vendors. IT support will be escalated to Advanced Technical Support Service at the direction of the COR or PM COR.
Single Vender Integrator (SVI) manages the execution of IT support services across DLA and DLA service providers in order to ensure all the individual components that make up the IT services are managed in an end-to-end manner.
SVI will ensure that Information Technology Infrastructure Library (ITIL)-based processes effectively integrate with the processes, functions and roles deployed within and used by DLA, DLA customers, and DLA service providers. Assist with the developing, documenting, and managing processes regarding interfaces, interaction and responsibilities between Initial Response Support, Technical Support Service and Advanced Technical Support Service and any other internal or external persons or entities that may either submit or receive an IT Incident or Service Request.
b. Change Management: The contractor shall assist the Government with change management strategy and implementation for all DLA information operations in accordance with ITIL (v3) processes.
1. Front door process: The contractor shall assist the government to evaluate proposed investments to change existing systems or add new systems or products to the DLA portfolio, or identify already existing solutions to requirements, to include evaluation and assessment of all technical requirements and specifications including related funding.
2. Enterprise Infrastructure Operations Board (EIOB) Process: The contractor shall be responsible for the configuration management and change evaluation process covering the enterprise infrastructure.
3. Enterprise Application Operations Board (EAOB) Process: The contractor shall be responsible for the configuration management and change evaluation process covering enterprise applications.
4. Change Project Management: The contractor shall be responsible for management of large scale change projects to ensure a deliberate, standardized enterprise approach to the change.
c. Provider Management: The contractor shall support DLA information operations planning, to include strategic planning and alignment to Future Year Defense Plan (FYDP) budget as well as alignment with DLA information operations CTO technology planning. Support Includes advising the Government in strategic planning in vendor and customer relationship enhancement; Facilitate meetings, capture and track action items and prepare briefings and reports for Government Executives on tasks and schedules; Maintain Work Breakdown Structure; and Monitor DISA activities and advise the Government of issues. Recommend improvements/actions. The contractor shall:
1. Support the DISA Liaison in their role to manage the DLA-DISA relationship at a strategic level.
2. Support the Contractor Liaison in their role to manage the DLA relationship with large commercial IT product and service providers at a strategic level.
3. Support Service Level Agreement (SLA) Management by updating documents and consolidating SLA reports as directed.
4. Support Operating Level Agreement (OLA) management by updating documents as directed.
TASK AREA 4 – DEFENSE BUSINESS SYSTEMS (DBS) LIFE CYCLE MANAGEMENT: ACQUISITION, SUSTAINMENT, MAINTENANCE AND TECHNICAL SUPPORT
The contractor shall provide full lifecycle management support for the range of solutions and services stated below, which are necessary to meet requirements of this contract and individual Task Orders as related to DLA’s DBS acquisition, development, sustainment, maintenance, and technical support.
a. Current State Assessment
1. The contractor shall identify and document the application landscape, including applicable DLA standards.
2. The contractor shall evaluate DLA production, test, and development environments in conjunction with DLA’s contractors.
3. The contractor shall validate application technical architectures.
1. The contractor shall assist the Government in developing, updating and maintaining lifecycle support documentation which:
i. Meet the Agency’s Gold Documentation standard
ii. Utilize the Agency’s documentation templates
iii. Identify the business requirement
iv. Include Internal and External Interface requirements
v. Include Information Assurance (IA) impacts/requirements
vi. Include requirements for error handling or unexpected system/data conditions
vii. Include System Resource Requirements (hardware impacts and performance considerations)
viii. Document Training requirements
ix. Permit Requirements Traceability
x. Include analysis of required changes to other objects impacted by the change to the primary object
xi. Address 508 compliance requirements
2. The contractor shall assist the Government in developing, updating and maintaining Enterprise Architecture models commensurate with DOD Architecture Framework (DODAF).
c. The contractor shall participate in Work Breakdown Schedule (WBS) development and execution.
1. WBS Completion Dates: The contractor shall meet or exceed estimated completion dates for each assigned WBS task unless special circumstances approved by DLA project manager permit missing the completion date
d. The contractor shall assist the Government in updating and maintaining Technical Specifications (TS) which
1. Meet the Agency’s Gold Documentation standard
2. Utilize the Agency’s documentation templates
3. Follow Standard Naming Conventions
4. Allow for proper testing
5. Document design considerations
6. Document application or data base components
7. Document interface designs
8. Document requirements traceability
9. Address section 508 compliance requirements
e. The contractor shall develop Code and Configuration Rationales which
1. Support Configuration Management
2. Capture all requirements
3. Are efficient (do not contain unnecessary looping or internal data tables)
4. Provide sufficient performance based on existing database table indexes
f. The contractor shall develop Test Plans which
1. Map to each requirement in the government approved functional specifications
2. Include both positive and negative test conditions
3. Address error handling and atypical system/data conditions
4. Include performance stress testing as applicable
g. The contractor shall execute Required Tests (Unit, System, Functional, Interface, Regression, Performance, Integration and/or Interoperability and section 508 testing)
1. Generate necessary test data and transactions in the test environments to exercise all applicable data values which enables execution of required tests.
2. Coordinate testing with selected end users in test environment as applicable
h. The contractor shall fully document the process required to integrate New/Revised Software Modules into the Production Environment.
1. Correctly prepare migration documents, transport and installation instructions for migrating new code to the production environment
2. Resolve questions regarding transports in a timely manner
i. Training – The contractor shall:
1. Provide usage level training for new and existing or reassigned Authorized User personnel.
2. Develop, document, maintain, manage, archive, and provide all training materials.3. Provide all training facilities as required by the Task Order.
3. Provide all training facilities as required by the Task Order.4. Establish, maintain, schedule, and manage delivery of continuous training programs.
4. Establish, maintain, schedule, and manage delivery of continuous training programs.5. Provide functional use and operation of each of the application components/modules.
5. Provide functional use and operation of each of the application components/modules.6. Provide Train-the-Trainer classes for personnel designated by DLA.
6. Provide Train-the-Trainer classes for personnel designated by DLA.7. Conduct skills assessments of DLA-designated personnel, such as executive managers, project team members, and Authorized Users.
7. Conduct skills assessments of DLA-designated personnel, such as executive managers, project team members, and Authorized Users.8. Perform the appropriate skills development and transfer in the most efficient manner.
8. Perform the appropriate skills development and transfer in the most efficient manner.
j. Testing – The contractor shall:
1. Perform initial component/module testing and implementation; upgrade and enhancement testing; capacity, interface and site expansions testing prior to go-live.2. Perform performance, regression, stress, and integration testing, and document and report on the results.
2. Perform performance, regression, stress, and integration testing, and document and report on the results.3. Identify and resolve issues identified during testing.
3. Identify and resolve issues identified during testing.
k. Knowledge Warehouse – The contractor shall:
1. Provide, support, maintain, update, and manage
i. A knowledge management environment and a data archiving system that is consistent with the Enterprise Data Strategy as referenced in Task Area 19ii. A business warehouse, as applicable, and
ii. A business warehouse, as applicable, andiii. Data standardization and modeling.
iii. Data standardization and modeling.
l. Technical Advisory – The contractor shall:
1. Provide DLA assistance in the sizing of application components, usage, configurations, and technical support requirements.2. Provide recommendations on appropriate hardware and interfaces, processes, and procedures.
2. Provide recommendations on appropriate hardware and interfaces, processes, and procedures.3. Provide assistance in demand management planning and forecasting for future growth.
3. Provide assistance in demand management planning and forecasting for future growth.4. Provide quality assurance and security advisory services.
4. Provide quality assurance and security advisory services.5. Provide recommendations on scheduling product upgrades consistent with Technology Roadmap planning.
5. Provide recommendations on scheduling product upgrades consistent with Technology Roadmap planning.6. Identify COTS component incompatibilities and recommend solutions for seamless integration for technology upgrades and projects requiring technology upgrades.
6. Identify COTS component incompatibilities and recommend solutions for seamless integration for technology upgrades and projects requiring technology upgrades.7. Assist in evaluating customer requirements and assist in determining the best approach for fulfilling those requirements using core COTS functionality (instead of customization) to the largest extent possible.
7. Assist in evaluating customer requirements and assist in determining the best approach for fulfilling those requirements using core COTS functionality (instead of customization) to the largest extent possible.
m. Technical Change Support – The contractor shall:
1. Support implementation of additions and changes to user environment.2. Provide and perform application performance measurement and reporting.
2. Provide and perform application performance measurement and reporting.3. Provide release management, transport management, and configuration management support.
3. Provide release management, transport management, and configuration management support.
i. Provide administration support for the release management and configuration management toolii. Update and maintain code using existing software suites, such as but not limited to Visual Basic, Java, Perl, HTTP, XML, and IBM
ii. Update and maintain code using existing software suites, such as but not limited to Visual Basic, Java, Perl, HTTP, XML, and IBM Rationale, to support the release management and configuration management tool4. Provide Post-Production Support
4. Provide Post-Production Support
i. Ensure code changes were correctly installed 100 percent of the time
ii. Perform post-maintenance window operational checkpoints in the production environment to verify continued system operations within the required time threshold
iii. Participate in conference calls or meetings to address user questions as needed after migration of new/revised code
iv. Develop and review solution alternatives, and perform impact analysis with customers and system users for fixes, enhancements and other changes
v. Elicit customer requirements through facilitation sessions, joint application development sessions, or one-on-one meetings and interviews
vi. Analyze operational problems, develop solutions and take corrective action as appropriate to ensure continued Automation Information System (AIS) operation. Assist specialists in analysis and corrective action. Assist with problem identification and resolution in existing applications by analyzing system processes, interrelationships, interfaces, and data
vii. Coordinate SCR and problem solution deliveries with interface partners, to include, but not limited to DLA Transaction Services, DLA Logistics Information Services, Integrated Data Environment, other Enterprise Business System (EBS) Sustainment sites, and the EBS Build teams
viii. Train additional contractor resources, without impact to other ongoing Sustainment activities/deliverablesix. Ensure that applicable updates to the Enterprise Architecture model are completed as required by current DLA policies
ix. Ensure that applicable updates to the Enterprise Architecture model are completed as required by current DLA policies
n. Environment Software Support
As required by the task order the contractor shall perform the following tasks:
1. Provide DLA project managers with estimated completion dates for each software development lifecycle phase to meet DLA deadline for completion of the WBS. Meet or complete before estimated completion dates for each assigned WBS task unless special circumstances approved by DLA project manager permit missing the completion date.
2. Prepare and/or assist in the preparation of New/Revised Software Modules into Production Environment
i. Correctly prepare migration documents, transport and installation instructions for migrating new code to the production environment.
ii. Resolve overwrite and dependency checks for objects.
iii. Resolve questions regarding transports in a timely manner.
3. Review Technical Specifications
i. Review how changes impact current Sustainment Environments
ii. Identify and resolve application conflicts
4. Provide Integration Support
i. Establish sustainment environments (Development, System Test, Stage)
ii. Review and update install documentation
iii. Perform application installs in the sustainment environments
iv. Assist with production installs
v. Support regression test activities (defects, problem tickets)
vi. Provide on-the-job training to other environment support team members
5. Provide Product Delivery Support
i. Provide on-site implementation support
6. Provide Post-Production Support
i. Support post-maintenance window activities in the production environment
ii. Validate transports and ensure code changes were correctly installed 100 percent of the time
iii. Participate in conference calls or meetings to address user questions as needed after migration of new/revised code
7. Produce and Provide documentation
i. Produce and provide documentation as required to document component construction and maintenanceii. Document how-to aides, guides or manuals to support the migration fixes, code, patches, updates to application components/modules
ii. Document how-to aides, guides or manuals to support the migration fixes, code, patches, updates to application components/modules
iii. Provide problem analysis, activity reports and white papers as required
8. Provide Technical/Application Support
i. Resolve technical/application related issues
ii. Coordinate with system/database administrators to resolve Production & Sustainment operational issues
iii. Respond to production issues and assist in initiating recovery or restart services
iv. Recommend application performance improvements
v. Install security patches in the sustainment environments
vi. Support sustainment environment refreshes, “hot packages”
vii. Provide Root Cause Analysis (RCA) for problem situations impeding operations.
viii. Support implementation of mandated security patches and configuration changes
ix. Support and provide subject matter expertise for functionally driven sustainment support projects, technical must-do projects, new function and /or technology implementation projects
o. Data Management
1. System Database Administration
i. Install and upgrade the database server and application toolsii. Perform database backups and restores
ii. Perform database backups and restoresiii. Work with the application administrators to resolve database related problems
iii. Work with the application administrators to resolve database related problemsiv. Coordinate and assist production Database Administrators (DBAs) with database upgrades and changes
iv. Coordinate and assist production Database Administrators (DBAs) with database upgrades and changesv. Ensure compliance with database license agreements
v. Ensure compliance with database license agreementsvi. Perform database security hardening including quarterly patch installations
vi. Perform database security hardening including quarterly patch installationsvii. Ensure that production databases have satisfactory performance and operational characteristics (including data integrity and security)
vii. Ensure that production databases have satisfactory performance and operational characteristics (including data integrity and security)viii. Recommend shared data strategies
viii. Recommend shared data strategiesix. Allocate system storage and assess and recommend future storage requirements for the database
ix. Allocate system storage and assess and recommend future storage requirements for the databasex. Review any development project deliverables at turnover that directly affect production database design implementation or performance (e.g., action diagrams)
x. Review any development project deliverables at turnover that directly affect production database design implementation or performance (e.g., action diagrams)xi. Assist the Government in establishing database standards
xi. Assist the Government in establishing database standardsxii. Review needs for duplicate production data structures
xii. Review needs for duplicate production data structuresxiii. Perform stress-testing on databases (i.e., ensure adequate response time with larger databases and/or high hit rates on the tables)
xiii. Perform stress-testing on databases (i.e., ensure adequate response time with larger databases and/or high hit rates on the tables)
2. Application Database Administration
i. Work with development team to install/configure applicationsii. Resolve database related problems
ii. Resolve database related problemsiii. Create primary objects (tables, views, indexes)
iii. Create primary objects (tables, views, indexes)iv. Modify primary objects, as necessary, from information given by the application developers
iv. Modify primary objects, as necessary, from information given by the application developersv. Enroll users and maintain system security
v. Enroll users and maintain system securityvi. Control and monitor user access to the database
vi. Control and monitor user access to the databasevii. Monitor and optimize the performance of the database
vii. Monitor and optimize the performance of the databaseviii. Update and maintain database standards and conventions with respect to the application
viii. Update and maintain database standards and conventions with respect to the application
ix. Analyze impact of data changesx. Resolve scheduling, operational and change control problems and procedures
x. Resolve scheduling, operational and change control problems and proceduresxi. Assist developers in application performance tuning
xi. Assist developers in application performance tuningxii. Provide database response and availability as needed to support database applications
xii. Provide database response and availability as needed to support database applications
The contractor shall provide full lifecycle support and services for DLA Defense Business Systems and IT Project Planning and Management.
a. Project Services – The contractor shall:
1. Assist the Government in planning, initiating, executing, and closing out programs and projects as directed.
2. As directed, provide analysis and recommend topics associated with project/program objectives, to include but not limited to:
i. Project leadership and communications with stakeholders
ii. Project planning and scheduling
iii. Earned value management support
iv. Project management, including performance monitoring and measurement
v. Stakeholder briefings, talking points for required meetings, and related documents.
vi. Program integration services; and
vii. Project close-out services.
b. Planning Assistance – The contractor shall:
1. Prepare documents in support of business planning meetings.
2. Recommend appropriate IT services and projects as requested.
3. Prepare draft proposals and plans for projects for review by Government personnel
4. Prepare draft project cost estimations and accounting documents for Government review.
5. Analyze the impact of new and changed requirements on current projects/resources and recommend resourcing options to the Government.
6. Provide planning support and make recommendations regarding Functional Priority Lists (FPL), Project Development Plans (PDP), and Preliminary Cost Estimates (PCE).
c. Management Support – The contractor shall:
1. Employ a project management methodology that shall be used as a tool to consistently plan, initiate, control, and implement all projects for all services related to the IT Solution.
2. Provide experience with the methodology and have a proven track record of success in using it to manage similar projects.
3. Make any and all changes associated with the project in compliance with approved Change Management procedures.
4. Communicate project status as part of standard Change Management meetings.
d. Implementation – The contractor shall:
1. Manage assigned tasks and resources associated with the project.
2. Coordinate activities with DLA, affected Authorized Users, and affected Third Party Contractors.
3. Develop site survey reports as directed.
e. Compliance – The contractor shall:
1. Comply with DLA policies and standards and regulations applicable to DLA for information, information systems, personnel, physical and technical security.
2. Conform to changes in laws, regulations and policies.
3. Propose major changes on a project-by-project basis to alter the environment to conform to the new requirements.
f. Technical Advisor Support – The contractor shall:
1. Continuously monitor technical trends through independent research.
2. Document and report on products and services with potential use for DLA as it aligns with DLA’s business and technology strategy.
3. Evaluate new technologies for the implementation of new technologies that best meet DLA business needs and meet cost, performance and quality objectives.
4. Make recommendations for enterprise level and program-specific project management policies, procedures and requirements (e.g. project feasibility analysis, cost benefit analysis, scheduling, costing, resource planning, communication planning, procurement, risk management and quality management).
5. Conduct technical reviews and provide recommendations for improvements to the infrastructure that increase efficiency and effectiveness and reduce costs per the planning and analysis policies and procedures.
g. Project Benchmark: The contractor shall examine and evaluate functional and technical programs for integration implications. Review factors such as operational scope, functional and process relationships, business practices, resource requirements, and cost impacts.
h. Functional Benchmark: The contractor shall review and analyze defined work processes and information needs of users within and across the functional area being examined. This includes functional and cross-functional requirement definition, functional descriptions, functional architectures, and requirements validation.
1. Technical Benchmark: The contractor shall examine current and emerging technologies for effectiveness and/or potential to support customer needs.
i. Data Benchmark: The contractor shall review and analyze data, databases, and cross-functional data sharing relating to the effectiveness of the information support provided to functional elements of the DOD, other Federal agencies, state and local Governments, and U.S. allies.
j. Benchmark Tools and Methods: The contractor shall assist in the development of new tools and methods or modifications to existing tools and methods to enable a disciplined process of benchmarking. Examples include templates, checklists, models, and guidelines.
k. Baseline Definition – The contractor shall:
1. Determine and recommend the level of support required for the functional area or activity being supported or for which support is contemplated. These efforts include business systems analysis of functions and the inventory of support tools and their use.
2. Support configuration management of the DODIN from the DOD perspective.
3. Perform the initial steps of establishing or reviewing operations, processes, data and information baseline for the functional activity. Since integration is an iterative process between various elements of the organization and its processes or operations, the contractor shall conduct the recurring steps to define, evaluate, and implement the incremental improvements needed to achieve simplified and streamlined operation of the functional activity.
4. Evaluate Existing Operations or Processes and Data
i. Identify existing “as-is” processes and data
ii. Document and analyze differences in the way common functional operations or processes are executed or interfaced.
iii. Benchmark these processes against the best public and private sector achievements
iv. Document known problems in existing processes and data that must be corrected to provide a functionally adequate to DOD or Federal standards.
v. Recommend data processes, interfaces and data baselines that together meet the process and associated information needs of the functional activity.
5. Establish Operations/Process and Data Baselines
i. Recommend proposed operations/processes, data baselines, and interfaces based upon peacetime or normal operations and anticipated wartime, mobilization, or emergency operations.
l. Support – The contractor shall:
1. Provide support to the DLA Project Manager and technical leads in developing the initial rough cut project plan and the work breakdown structure (WBS).
2. Ensure projects meet Capability Maturity Model Integration (CMMI) guidelines.
3. Prepare, revise, and/or update required program lifecycle products and documents, including the coordination, review and archival of such documentation for current and emerging DBS systems of all Acquisition Category (ACAT) levels (DOD 5000.x series, Chairman of the Joint Chief of Staff Instruction (CJCSI) 6212, and CJCSI 3170, throughout all phases of the DBS lifecycle (pre-Milestone A through Decommissioning activities).
4. Ensure support plans cover all lifecycle elements (early planning, requirements, design, development, and integration deployment/delivery and post product delivery).
5. Identify deviations from standards and from Preliminary Cost Estimate (PCE)
6. Identify potential issues with critical path, project tracking and oversight, to include analysis, recommendation on changes, potential impact on project cost and schedule.
7. Analyze impact on project and recommend options that will allow project to meet mandated dates.
8. Gather and analyze historical and best practice information on identified project risks and recommend options/course of action to the cognizant government representative.
m. Analysis including Risk Assessment and Impact – The contractor shall:
1. Provide analysis of, and/or suggestions and recommendations for input to: program management and financial documentation, such as program management baselines, work breakdown structure, program management reviews, master program schedules, performance measures, and program plans.
2. Conduct Pre and Post Investment Analysis to capture the actual costs and benefits.
3. Conduct Risk Assessment.
4. Provide an analysis of mitigation efforts.
n. Business Case Analysis (BCA) Support – The contractor shall:
1. Draft cost estimates and provide analysis and documentation for all phases of current developmental, or modification, programs or projects. These estimates should consider the benefits and return on investment (ROI) associated with the various approaches. This shall include the Cost Analysis, Program Office Estimate (POE), and Economic Analysis (EA); Lifecycle Cost (LCC) estimates, and “what-if” analysis for any programs as identified by DLA.
2. Provide estimates for alternatives, given various budget, schedule and /or technical parameter variations.
3. Assist with Business Case Analysis (BCA) documentation in coordination with the project team.
4. The contractor shall assist the Government in development of an Executive Summary, which identifies the project; summarize the opportunity, recommendation and business impact.
5. The contractor shall provide the required support defining assumptions, constraints, and conditions having major influence on the analysis and its conclusions. The following should be considered as a minimum: the assumed remaining service life of the currently fielded capability, the assumed required operational date for the proposed investment, the assumed economic service life of any proposed investment, and the operational framework within which any new investment must function.
6. The contractor shall provide alternatives analyzed as part of the business case analysis.
7. The contractor shall provide analysis on alternatives by using the government approved evaluation criteria and their relative weighting. Such items as payback periods, assumed lifecycle, cost and benefit ratio, risk/sensitivity analysis, and return on investment should be considered.
8. The contractor shall provide general assumptions regarding the schedule for each alternative. Summarize the schedule analysis results of each alternative’s schedule or the proposed investment program schedule. The summary should include a discussion of activities taken to generate risk-adjusted schedules for each alternative or the proposed investment program schedule.
9. The contractor shall summarize the cost analysis conducted to generate high-confidence lifecycle cost estimates for each alternative. Include the lifecycle cost estimate for each alternative. Cost estimates will be presented in base-year and in out-year dollars. Summarize sensitivity analysis performed on cost drivers and the effect of technical, schedule and cost risk on program cost and schedule.
10. The contractor shall summarize benefits analysis activities conducted to generate high-confidence lifecycle benefit estimates for each alternative. Include the lifecycle benefit estimates for each alternative. For an initial investment decision, the summary should provide enough information to show the differentiation and relative merits of each alternative. For the final investment decision, the summary should provide more detailed, possible site-specific information, based on a greater definition and understanding and less uncertainty about the proposed investment. The contractor shall include at a minimum the ground rules and assumptions, relevant measures for the program, a description of the pre-investment baseline, quantified and non-quantified benefits impacts, user benefits, and an overall summary of benefits.
11. The contractor shall summarize the economic analysis conducted for each alternative or proposed investment. Include the designated discount rate per guidelines to calculate the present-value cost and benefits based on risk-adjusted estimates for benefits and costs. Include passenger value of time; benefit cost ratio, net present value, and payback period at a minimum. l. The contractor shall summarize risk assessment activity and results. Include the overall risk ratings for each alternative or for the proposed investment program. Identify major risks and planned mitigation strategies for each alternative. Discuss the comparative risk assessment for the initial investment decision.
12. The contractor shall identify the recommended alternative, if any, and summarize the rationale for the recommendation.
o. Transition Services (Those services required to address impacts to operations due to relocation, deployment, and breakdown)- The contractor shall:
1. Provide transition services associated with the consolidation or divesture of DoD and/or DLA workload or uninterrupted operations. Assist DLA in planning, preparing, and implementing any transition or change services.
2. Provide approved changes to DLA equipment, software, processes, and overall environment to support such consolidation or relocation.
3. Take into account economies of scale and other synergies between the acquired operations of DLA.
The contractor is responsible for performing preventative and analytical activities aimed at enhancing the overall IA posture of DLA networks, information systems, and applications. The contractor shall provide full Information Assurance support for the range of solutions and services as stated below, which are necessary to meet the requirements of this contract and individual TOs as related to DLA’s Information Assurance. The contractor shall ensure compliance with Federal, DOD and DLA information technology and security requirements, policies, procedures and standards as applicable. Information Assurance support will include:
- IA Certification and Accreditation (C&A) Services
- IA Policy Services
- IA Plan of Action and Milestones (POA&M) Services
- IA Workforce Management
- FISMA Tracking and Reporting
All solutions and services must meet DLA policies, standards, and procedures as identified by individual TOs (e.g. enterprise architecture, information assurance, and personnel, physical and system security). All contractors supporting Information Assurance Tasks are required to be certified in accordance with the specific IA certification identified by the individual TO PWS. The contractor shall provide support for the following IA Support solutions and services Subtasks:
a. IA C&A Services
1. The contractor shall provide IA program support to assist DLA in ensuring compliance with DOD and DLA IA policy and perform the daily activities required for successful C&A program completion.
i. C&A Process Support
ii. C&A Analysis Support
iii. C&A Coordination Support
iv. C&A Security Documentation Support
b. IA Support Services
1. The contractor shall provide technical support in the review, analysis and development of IA processes, policy, doctrine, directives, regulations, and implementation of instructions for DLA.
i. IA Policy Process Support
ii. IA Policy Analysis Support
iii. IA Policy Coordination Support
iv. IA Policy Documentation Support
c. IA POA&M Services
1. The contractor shall be responsible for monitoring and tracking the status of all Plans Of Action & Milestones (POA&M) weaknesses through to a resolution for DLA.
i. POA&M Process Support
ii. POA&M Analysis Support
iii. POA&M Coordination Support
iv. POA&M Documentation Support
d. IA Workforce Management
1. The contractor shall provide IA Workforce program support to assist DLA in ensuring compliance with DOD and DLA policies to include the DoD Directive 8570.01-M, Information Assurance Training, Certification, and Workforce Management and perform the daily activities required for successful IA Workforce program completion.
i. IA Workforce Training Process Support
ii. IA Workforce Training Analysis Support
iii. IA Workforce Training Coordination Support
iv. IA Workforce Documentation Support
e. FISMA Tracking and Reporting
1. The contractor shall be responsible for validating, compiling, tracking and reporting information in the Federal, DOD or DLA approved Federal Information Security Management Act (FISMA) tracking tool.
i. FISMA Process Support
ii. FISMA Analysis Support
iii. FISMA Coordination Support
iv. FISMA Documentation Support
The contractor is responsible for performing preventative and analytical activities aimed at enhancing the overall IA posture of DLA networks, information systems, and applications. The contractor shall provide full Information Assurance support for the range of solutions and services as specified in respective Subtask as stated below, which are necessary to meet the requirements of this contract and individual TOs as related to DLA’s Information Assurance. The contractor shall ensure compliance with Federal, DOD and DLA information technology and security requirements, policies, procedures and standards as applicable. Information Assurance support will include:
- Enterprise Architecture Support and Compliance Support
- IA Engineering Support
All solutions and services must meet DLA policies, standards, and procedures as identified by individual TOs (e.g. enterprise architecture, information assurance, etc.). The contractor shall provide support for the following Information Assurance Support solutions and services Subtasks:
a. Enterprise Architecture Support and Compliance
1. The contractor shall provide Enterprise Architecture Support and Compliance to assist DLA in ensuring compliance with DOD and DLA IA policy and perform the daily activities required for successful IA Architecture.
i. Document the current “as-is” DLA IA Architecture.
ii. Develop and revise DODAF models
iii. Deliver Implementation Plan for Target Information Assurance Architecture
iv. Provide Architectural Development Support to Current (programs in sustainment) and emerging DLA Programs
b. IA Engineering Support
1. The contractor shall be responsible to provide systems engineering and engineering support as identified in individual tasks. This effort may include, but not be limited to:
i. Developing network models
ii. Providing technical support in assessing the function, security vulnerability, usefulness, and potential applications of current and future technology
iii. Participating in modifications and improvements to existing IA products
iv. Support for Information Assurance Scanners (Retina/Rem and Assured Compliance Assessment Solution (ACAS) as well as Proxy Analysis
v. Supporting and engineering IA solutions for the upgrade of programs to conform to Federal, DOD, or DLA initiatives such as Defense-in-Depth (DID) and DODIN Joint Information Environment (JIE);
vi. Providing advice during technical reviews and selection, development, and testing of IA components;
vii. Providing technical support in assessing the function, security vulnerability, usefulness, and potential applications of current and future technology, available from commercial, Government, or other sources.
c. IA General Support
1. The contractor shall provide general IA engineering capabilities and services per individual tasks. General support includes:
i. Quality Assurance Support
ii. Program Reviews Support
iii. Centralized administrative, clerical, documentation and related Support
iv. Progress/status reporting Support
DLA relies on information systems to carry out its mission and business functions in a global setting. These systems are susceptible to exploitation through targeted attacks, natural disasters, and human and system errors. Compromise of any information system could jeopardize DLA’s logistical operations and endanger other organizations and national interests. To combat these threats, the Department of Defense utilizes cybersecurity as its first line of defense.
Cybersecurity is the collection of tools, policies, security concepts and safeguards, guidelines, training, and best practices, used to protect the cyber environment, and organizational assets. These assets include connected computing devices, applications, services, telecommunications systems, and the transmitted or stored information in the cyber environment. Cybersecurity strives to ensure the confidentiality, integrity, or availability of such information.
DLA has developed, documented, and implemented the Cybersecurity Assessment Program (CAP) to ensure the confidentiality, integrity, and availability of its information. CAP consists of two major subprograms: the COMSEC Assessment and Assistance Program (not part of this SOW) and the Cybersecurity Compliance Review Program (CCRP). CAP was designed to improve the cybersecurity posture of DLA activities; ensure compliance with DOD and DLA cybersecurity policies; and to assist in the discovery and resolution or mitigation of cybersecurity vulnerabilities before they are exploited. CAP was not designed to fix all identified problems but to assist users, systems administrators, network managers, program managers, et al., in the remediation of current and prevention of future problems. This includes, but is not limited to, technical, administrative, and training assistance.
DLA will continue the enhancement of the CAP to protect its myriad networks, systems and applications. The two objectives of this task are to improve the cybersecurity posture of all DLA activities and to enforce compliance with OMB, DOD, DLA, and other applicable cybersecurity policies. The Government requires certified, highly knowledgeable and skilled personnel with proper security clearances to augment audit staff in performing cybersecurity assessments in order to meet these objectives.
The CCRP uses innovative technology and techniques to test, evaluate and analyze cybersecurity. It is built on repeatable standard processes to improve DLA’s cybersecurity posture and decrease the Agency’s window of exposure through increased awareness and accountability. The contractor shall assist DLA in developing, maintaining and refining the methodologies used in the CCRP as well as participating in the onsite evaluations.
The contractor’s TO project manager is a key person and must have demonstrated leadership experience in a work environment of similar size and complexity to this project. The contractor shall serve as a senior subject matter expert in the risk managemet field. Contractor employees assigned to this task are required to possess a DOD Secret Clearance, and be eligible for an IT-II as well as a certification meeting the DOD 8570 IAM level III; hold a project management certification such as Project Management Professional and possess a Risk Management Professional credential.
Proof of certifications/credentials must be presented at time of task order proposal. The contractor’s Facility Security Officer shall provide a visit authorization request (VAR) on company letterhead to include all key personnel’s clearance status at time of proposal.
a. The contractor shall provide Cybersecurity Compliance Review (CCR) Support. DLA’s Cybersecurity Compliance Reviews (CCR) consists of several types of assessments:
- Cybersecurity Vulnerability Assessment (CVA) to determine a Field Activity’s security posture
- Cybersecurity Controls Validation (CCV) assessment to validate the implementation of Information Assurance (IA) controls assigned to an enclave or application
- Command Cyber Readiness Inspection (CCRI) staff assistance visit to assist a site in its preparation for a CCRI
- Formal USCYBERCOM CCRIs
- Penetration testing to evaluate the security of a computer system or network by simulating an attack from outside and inside DLA’s network boundary
Contractor personnel supporting the CCV checks are required to possess a certification meeting the DOD 8570. Specific certification requirements will be provided at the task order level.
b. The contractor shall provide Cybersecurity Vulnerability Assessment (CVA) Support
The CVA identifies, quantifies, prioritizes and suggests the best method for eliminating or mitigating the vulnerabilities that exist in systems and enclaves. Moreover, they point out which systems are noncompliant with DOD and DLA security policies. The contractor shall assist DLA in its CCRI efforts by developing and/or updating the DLA CVA methodology that defines the approach, actions and appropriate responses used in conducting a review. Additionally, the contractor shall develop a user awareness training campaign using a tool such as the Simple Phishing Toolkit. Contractors shall assist in conducting training exercises, gathering and analyzing metrics and updating the curriculum. The contractor(s) shall participate in CVAs, as directed by the Primary or Alternate CORs.
c. The contractor shall provide Cybersecurity Control Validation (CCV)
The CCV program determines the level of accuracy and compliance with Federal, DOD, and DLA regulatory policy by testing IA controls of the system, application or enclave thereby ensuring due diligence was done to protect assets and data integrity. The contractor shall assist DLA in its compliance assessment efforts by developing and/or updating the CCV methodology that defines the approach, actions and appropriate responses used in conducting a review. The findings gathered during these assessments will be shared with the CVA team and analyzed against the IA controls baseline; any discrepancies shall be reported to IA Management Support for tracking. The contractor(s) shall participate in CCVs, as directed by the Primary or Alternate CORs.
d. The contractor shall provide Command Cyber Readiness Inspections (CCRI)
CCRI inspections utilize the DISA FSO Security Technical Implementation Guides (STIGs), checklists, USCYBERCOM Communication Tasking Orders, and USCYBERCOM CCRI contributing factors as the evaluation criteria to validate compliance with DOD IA policy, best practices, and configuration requirements. DLA performs two types of CCRIs; staff assistance (SA), and formal. Formal CCRIs are performed as prescribed by the USCYBERCOM published schedule. SA CCRIs are generally performed in conjunction with CVAs. The same methodology is used for both types of CCRI. The contractor shall assist DLA in its CCRI efforts by developing and/or updating the DLA CCRI methodology that defines the approach, actions and appropriate responses used in conducting an inspection. The contractor(s) shall participate in CCRIs, as directed by the Primary or Alternate CORs.
e. The contractor shall provide Penetration Testing Support
DLA employs Penetration testing to evaluate the security of a computer system or network by simulating an attack from outside and inside DLA’s network boundary. The contractor shall assist DLA in its compliance assessment efforts by developing and/or updating, the Penetration Testing methodology that defines the approach, actions and appropriate responses used in conducting a test. The contractor(s) shall participate in Penetration testing, as directed by the Primary or Alternate COR. Testing done outside DLA’s network boundary will be accomplished from a safe, secure facility under the contractor’s control.
f. Cybersecurity Assessment Tool Identification and Selection
The contractor(s) shall identify CCR software tools and assist in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA Security Requirement Guide (SRGs) if needed. The contractor(s) shall test each newly selected tool, ensuring that each tool meets its objective; it is safe for use; and shall not adversely affect DLA operations. The contractor shall provide a safe and secure testing environment to assess all tools to be utilized. The contractor shall be responsible for maintaining the tool set and keeping it current.
a. Overall IA Support
The contractor shall review, coordinate, and recommend IA standards and protocols for cost effective application in accordance with the Department of Defense’s (DOD) Defense in Depth (DID) strategies and supporting documentation as specified in the individual task orders. The contractor shall ensure compliance with Federal, DOD and DLA information technology and security requirements, policies, procedures and standards as applicable. Any task order requirements involving IA support will require that all personnel have their DOD 8570 certifications as listed in DOD 8570 personnel qualifications. All contractor personnel filling those positions must be certified at the appropriate level, prior to performing work on any resultant task order.
b. Certification and Accreditation Process Execution
The contractor shall provide IA program support to DLA to ensure compliance with DOD and DLA IA policy. Contractor personnel performing under this task order will have extensive knowledge of the DOD Information Assurance Certification and Accreditation Process (DIACAP)). In addition, to support DLA’s Federal Information Security Management Act (FISMA) reporting requirements, contractor program and project management personnel will possess an in-depth knowledge of general Certification and accreditation principles as stated in the NIST 800-37 Risk Management Framework (RMF), and NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems and Organizations.
c. Process Support
The contractor shall provide support to include, but not be limited to:
1. Support DLA in the implementation of the DIACAP and transition to RMF
2. Recommend processes in accordance with the DIACAP and/or RMF
3. Participate in the process’ activities
i. Document the results of those activities
ii. Track the expiration of all Accreditation Decisions and the submission of DIACAP packages throughout the system’s development lifecycle.
iii. Track incomplete DIACAP packages and completed accreditations (IATO &ATO) through the HQ DLA review and approval process until signed by the Designated Approving Authority (DAA).
iv. Maintain status tracking and vulnerability information in the DLA approved status tracking tools.
d. Analysis Support
The contractor shall perform analyses to validate established security requirements and to recommend additional security requirements. This will include, but not be limited to:
1. Analyze the DIACAP and/or RMF package, assess the adequacy of the required protective measures, assess residual risk, and provide support to DLA to determine the readiness of the system for accreditation.
2. Recommend, for detected vulnerabilities that could preclude accreditation, management, operational, or technical controls to include human procedures, software configuration parameters, system changes, or combinations thereof to mitigate the risk associated with the vulnerability.
3. Perform technical reviews of documented security certification results normally submitted in the DIACAP and/or RMF format to assess their completeness and identify system vulnerabilities and weaknesses.
4. Perform security Certification and Accreditation reviews, and verify and validate implementation of DODI 8500.2 controls based on the Mission Assurance Category (MAC) and data sensitivity levels.
5. Verify compliance with DODI 8510.01 (DIACAP), NIST Special Publication 800-37 (RMF) and DLA policy requirements.
6. Analyze vulnerability scans and Security Readiness Review (SRR) results, STIG compliance and deficiencies of all forms identified during internal and external IA reviews. Contractor support personnel shall ensure that deficiencies and vulnerabilities are included in a Plan of Action and Milestones (POA&M) and are tracked until the Government has implemented adequate mitigation measures.
e. Coordination Support
As directed, the contractor will assist the Government to:
- Coordinate with or participate in meetings, with other Federal, DOD, and private/ industry organizations in support of the Certification and Accreditation efforts for the Programs under their purview.
f. Security Documentation Support
The contractor will:
1. Document DIACAP and/or RMF packages, and provide accreditation recommendations that are supported by the identified vulnerabilities, weaknesses and status of packages
2. As required, develop inputs for the update of policy, guides, handbooks, and training material on the DOD and Defense Logistics Agency Certification and Accreditation (DLA C&A) process, operating procedures and best practices
The contractor will:
- Support DLA in its compliance assessment efforts by developing, implementing and operating an IA Control Validation (IACV) compliance assessment program. The evidence gathered and archived during these IACV assessments will be analyzed against the security findings detailed in the target system’s C&A package to determine the level of adequateness with which the developed DIACAP and/or RMF packages are authored.
g. Information Technology Integration
The contractor may be required to:
1. Provide technical support in developing and integrating IA Tools solutions, incorporating emerging technologies;
2. Provide technical support in demonstrating technology and prepare and give briefings, and provide copies of the briefings,
3. Produce technical reports describing the demonstrations. Information technology security is dynamically changing; therefore, an incremental strategy to securing DLA’s Net Centric Environment is required.
h. General Support
The contractor shall provide general IA engineering capabilities and services per individual task orders. General support includes:
1. Participating in Integrated Product Teams (IPTs), working group meetings, design reviews, specific project meetings, other meetings
2. Providing minutes of meetings
3. Providing recommendations
4. Responding to action items
5. Reviewing documents and providing comments
6. Providing informal consultation
7. Providing briefings at meetings or to specific audiences
8. Supporting other regular program activities
i. Information Assurance Policy Support
This task area provides technical support in the review, analysis and development of IA processes, policy, doctrine, directives, regulations, and implementation of instructions for the DLA enterprise.
1. The contractor shall provide technical expertise for the review, consolidation, and development of policy in accordance with DOD and DLA requirements.
2. The contractor shall provide technical support to DLA and assess DOD and DLA information technology policies, standards, guidelines, or procedures to ensure compliance with DOD Directives, to include collecting, consolidating and providing documentation input to taskings from other DOD entities.
j. Information Assurance Manager (IAM) Contractor Duties
1. Provide oversight of all appointed Information Assurance Officer (IAOs) under your purview ensuring they follow established IA policies and procedures to include meeting all access requirements
2. Develop and maintain an IA Program, subject to Government approval, for the applicable business area or information system that identifies the IA architecture, requirements, objectives, and policies.
3. Ensure that information ownership responsibilities are established for each information system under your purview to include accountability, access approvals, and special handling requirements.
4. In conjunction with the applicable program/system manager, ensure all corresponding C&A documentation is maintained in a repository to include any dates and/or modifications to all relevant documented artifacts Support.
5. Support the program/system manager in implementing the DLA C&A process for information systems under your purview.
6. Act as a primary IA technical advisor to your respective enterprise PM/SM and, when necessary, formally notify the Designated Accrediting Authority (DAA) of any changes impacting any information system’s IA posture under your purview.
7. Ensure that continuous IA compliance monitoring is conducted to include periodic reviews of the results of any such monitoring activities for all information systems under your purview.
8. Ensure the DLA Computer Emergency Response Team (CERT) is immediately notified of any anomalous or suspicious event that may be a suspected computer incident using the required DLA incident reporting format.
9. Ensure all IA/Information Technology (IT) personnel (e.g. IAO, and system/network/database administrators, etc.) under your purview review Information Assurance Vulnerability Management (IAVM) weekly alerts, bulletins, and advisories that impact the security posture of the information systems.
10. Monitor implementation of security guidance and direct appropriate action to resolve identified deficiencies.
11. Serve as a member of the Configuration Management board or delegate this responsibility to an appropriate IAO. Ensure that Configuration Management (CM) procedures are developed and implemented in accordance with DOD and DLA policies.
12. Ensure audit trails and system logs are reviewed periodically (e.g., as required) and audit records are archived and maintained for future reference in compliance with DOD and DLA policies and practices.
13. Ensure vulnerability scans, utilizing approved DOD and DLA tools, are conducted and assessed on at least a monthly basis for all information systems under your purview. Ensure that monthly vulnerability scan results are stored and archived.
14. Analyze identified IA strategies and report concerning the best approach or practice for all information systems under your purview.
15. Evaluate and report concerning development efforts to ensure that baseline security safeguards are appropriately implemented.
16. Evaluate and report to the Government, vendor responses and/or proposals IAW the requirements contained in Acquisition IA Strategy or other acquisition documents.
17. Take action as needed to ensure that acceptable products meet Common Criteria requirements as stated in DODI 8500.2 and NIST Special Publications 800-37 and 800-53.
18. Perform as an advisor to a Source Selection Panel, when directed by a Source Selection Authority.
Task Order (TO) Management: Applicable to each contractor performing a task order, regardless of which task area(s) is/are involved in the task order.
a. The contractor’s Task Order Project Manager is a key person on this project and shall have demonstrated leadership experience in a work environment of similar size and complexity of the Task Order. Contractor’s Project Manager shall serve as a senior subject matter expert.
b. The contractor’s Task Order Project Manager shall coordinate work carried out under this contract with the Contracting Officer Representative (COR) and Contracting Officer on all contractual and business issues. The contractor’s project management effort shall continue for the entire term of the contract.
c. The contractor’s Task Order Project Manager shall provide the planning, direction, coordination, and control necessary for effective and efficient accomplishment of all requirements contained in the individual task order.d. The contractor’s Project Manager shall verify and validate the level of effort and deliverables for each task, on the monthly status report, and Project Plan.
d. The contractor’s Project Manager shall verify and validate the level of effort and deliverables for each task, on the monthly status report, and Project Plan.e. The contractor’s Project Manager shall prepare the Task Order Management Plan describing the technical approach, organizational resources and management controls to be employed to meet the cost, performance and schedule requirements throughout the Task Order execution. The contractor shall provide a monthly status report monitoring the quality assurance.
e. The contractor’s Project Manager shall prepare the Task Order Management Plan describing the technical approach, organizational resources and management controls to be employed to meet the cost, performance and schedule requirements throughout the Task Order execution. The contractor shall provide a monthly status report monitoring the quality assurance.f. The contractor’s Project Manager shall provide the technical and functional activities at the Task Order Level needed for the Program Management of this SOW. Include productivity and management methods such as Quality Assurance, Progress/status reporting, and Program Reviews at the Task Order level. Provide the centralized administrative, clerical, documentation and related functions.
f. The contractor’s Project Manager shall provide the technical and functional activities at the Task Order Level needed for the Program Management of this SOW. Include productivity and management methods such as Quality Assurance, Progress/status reporting, and Program Reviews at the Task Order level. Provide the centralized administrative, clerical, documentation and related functions.1. The contractor shall provide a monthly status report consisting of routine and special difficulties encountered under this SOW and a detailed listing of all work performed by
1. The contractor shall provide a monthly status report consisting of routine and special difficulties encountered under this SOW and a detailed listing of all work performed by task in electronic format and hardcopy.2. The contractor shall submit a monthly invoice of dollars billed per month by Contract Line Item Number (CLIN).
2. The contractor shall submit a monthly invoice of dollars billed per month by Contract Line Item Number (CLIN).3. Upon task order award contractor shall be required to submit a Project plan to the COR. The contractor shall also be required to update the staffing plan that was submitted with the task order proposal on a quarterly basis.
3. Upon task order award contractor shall be required to submit a Project plan to the COR. The contractor shall also be required to update the staffing plan that was submitted with the task order proposal on a quarterly basis.4. The contractor shall provide a compliance tracking report quarterly which identifies that contractor employees are certified in accordance with DOD 8570.01.
4. The contractor shall provide a compliance tracking report quarterly which identifies that contractor employees are certified in accordance with DOD 8570.01.5. All documentation will be in the latest version of the Government-supplied Microsoft Office format unless another format is required and agreed to by the COR, the contractor and Contracting Officer.
5. All documentation will be in the latest version of the Government-supplied Microsoft Office format unless another format is required and agreed to by the COR, the contractor and Contracting Officer.
a. Evaluation of the Organizational Environment. – The contractor shall evaluate and provide analysis, review and explanation of the most critical virtual workforce skills at DLA for all leaders and employees as needed.
b. The contractor shall establish and conduct leadership training plans based on the extent and mix of leaders and employees for both internal employees and customers of J6 relying on technology and focusing on the greatest challenges for leaders and employees managing distance.
c. The contractor shall conduct training as directed for approximately 3,000 employees in the Information Operations Department in the CONUS and OCONUS locations.
d. The contractor shall identify best practices for developing the requisite skills needed to effectively lead in a virtual environment such as communication, team building and ground rules.
e. The contractor shall provide training in the form of multiple sessions at the executive, managerial and employee level in the form of Seminars, Webinars, teleconferencing, video teleconferencing, individual and group meetings.
f. The training shall be tailored to ensure the desired outcomes of providing effective virtual leadership training to DLA Information Operations.
The contractor shall provide research, coordination, and facilitation support to the Chief Technology Officer (CTO) in the following areas:
a. Researching IT products proposed for integration into the DLA enterprise through the J6 Front Door process, including compliance with the approved enterprise architecture, capability overlap with already approved products, and the availability of alternative products.b. Coordination, facilitation, planning, and support of CTO meetings, including technology meetings with the J6 Enterprise Support Areas, meetings with strategic IT contractors, and annual strategic contractor roundtable events.
b. Coordination, facilitation, planning, and support of CTO meetings, including technology meetings with the J6 Enterprise Support Areas, meetings with strategic IT contractors, and annual strategic contractor roundtable events.c. Support in maintaining and revising the DLA IT Solutions Document (ITSD), managing the documentation of approved IT products for use in the DLA enterprise, and of strategic roadmap documents that describe
c. Support in maintaining and revising the DLA IT Solutions Document (ITSD), managing the documentation of approved IT products for use in the DLA enterprise, and of strategic roadmap documents that describe strategy for movement toward “to be” IT environments.d. Enterprise Architecture (EA) support, including BEA/DODAF training and advisory support to J6 program managers, EA documentation and planning, data modeling and data dictionary management, and data strategy development and tracking.
d. Enterprise Architecture (EA) support, including BEA/DODAF training and advisory support to J6 program managers, EA documentation and planning, data modeling and data dictionary management, and data strategy development and tracking.e. Provide access to technology market expertise to provide background information on products and contractor capabilities.
e. Provide access to technology market expertise to provide background information on products and contractor capabilities.
The contractor shall provide technical support to the Program Executive Office (PEO) Investment Portfolio Management Acquisition and Operations oversight offices. This support may include the following areas:
a. Assisting with development and maintenance of PEO policies, processes and procedures.
b. Prepare, revise, and/or update required program lifecycle products and documents, subject to Government direction, review, and approval, including the coordination, review and archival of such documentation for current and emerging IT systems of all Acquisition Category (ACAT) levels (DOD 5000.x series, Chairman of the Joint Chief of Staff Instruction (CJCSI) 6212, and CJCSI 3170 as required) throughout all phases of the acquisition lifecycle to include, but not be limited to:
1. Acquisition Strategies
2. Business Case Analysis
3. Business Process Reengineering Plans
4. Analyses of Alternatives
5. Economic Analyses
6. Initial Capability Documents
7. Capability Development Documents/Capability Production Documents
8. Test and Evaluation Master Plans
9. Acquisition Program Baseline
10. Information Assurance Strategies
11. Information Support Plans
12. IT 300s
13. Communications Plans
14. Change Proposals
15. Performance Work Statements/Statements of Work/Statement of Objectives
16. Work Breakdown Structures Schedules
17. Service Level Agreements and related documentation.
c. Support by providing strategic direction and objectives recommendations for the program, including development and recommendations of dynamic key business elements such as:
1. Technology enhancements
2. Program organization and communications, functions, staffing
3. Program schedule updates
4. Recommend enhancements to risk management, testing, deployment, and training.
d. Develop overarching marketing/public relations plans and assist in the development of program marketing and educational products, as required.
e. Provide technical support to the Acquisition Director in preparing for Defense Business Systems reviews to include, but not be limited to:
1. Milestone reviews
2. In-progress reviews (IPRs)
3. Integrated Product Team meetings (IPTs)
4. Site assessments
5. Office of the Secretary of Defense (OSD) reporting requirements
6. Office of Management and Budget (OMB) reviews
7. Government Accountability Office (GAO) reviews
8. Department of Defense-Inspector General (DOD-IG) reviews.
f. Provide technical support to the Acquisition Director in reporting to various DLA, DOD and Federal entities, to include, but not be limited to:
1. Other DLA J-codes
2. The Military Services
7. Other external partners.
g. Provide review and analysis of Acquisition Program documentation (DOD 5000.x series, CJCSI 6212, and CJCSI 3170).
h. Provide support in ensuring DLA’s continuing compliance with Federal and Department of Defense Information Technology and Acquisition related regulations and directives (e.g., Clinger-Cohen, DODD/DODI 5000.x series, Defense Business Systems policy, etc.).
i. Provide support in the preparation of and maintenance of schedules, including activities, constraints, durations, etc. to carry each effort to completion.
j. Support the Operations Director in various administrative responsibilities to include, but not be limited to:
1. Provide support to management at DLA’s off-site location in processing system authorization access requirements to record names, signatures, and other identifiers for the purpose of validating the trustworthiness of individuals requesting access to DOD systems and information.
2. Facilitate meetings, working groups, integrated program teams, as well as provide support in the setup of same.
k. The contractor shall provide maintenance and technical support for the DLA IT Investment Portfolio tool, to include:
1. ProSight and other DLA approved applications.
2. Management and/or production of all tool-related documentation, such as maintenance of the user training guide and other functional/technical documentation.
3. Routine collaboration with J6 analysts to assist in devising strategic plans for accomplishing specific DOD Acquisition Management (DOD 5000.x series) program objectives.
l. Facilitate the translation and implementation of OSD DOD IT Portfolio Repository (DITPR) requirements to the DLA IT Investment Portfolio.
m. Provide technical support for DLA DITPR related data collection and reports used for the investment review meetings to ensure accurate information is being reported for each DLA investment in DITPR.
n. Attend DITPR work group meetings, training sessions, and technical design meetings, as required.
o. Support requirements gathering, analysis and implementation of data input forms and web reports for various functions supporting the DLA IT Investment Portfolio.
p. The contractor shall support technical issues encountered with the following: ProSight/or other Portfolio Management tools, as well as, installation and configuration of software upgrades and corresponding documentation of those changes.
q. The contractor shall support the DLA IT Investment Portfolio through data gathering/coordination, compilation and inputting/uploading materials, tool configuration, product development, and user account management.
r. Provide technical advice and recommendations to DLA Logistics functional experts specifically in the areas of IT supply chain management, transportation, and distribution functions. The contractor shall support a variety of forums, working groups and meetings where subject expertise will be required.
s. Provide knowledge of trends and principles in market analysis, providers in the market analysis for information technology industry, pricing for all types of services in this industry, and the direction of electronic market analysis as applied to advance business and workflow processes.
1. Workflow Solutions Consulting
i. The contractor shall perform ad hoc analyses of IT service organizations across the industry related to the effective, efficient and profitable delivery of document solutions and business communications services. This includes defining, tracking and analyzing the document outsourcing and market analysis markets as well as the hardware and software technologies that enable those markets, to provide an understanding of the competitive environment as well as methodologies for creating and sustaining positive and cost-effective customer relationships.
2. Software Strategies Consulting Service.
i. The contractor shall perform specific consulting services to provide information and advice to monitor and stay aligned with industry and DOD applications and other providers in the industry. This will focus on the technologies, products and markets that present significant opportunities and threats to equipment/solution providers, software solution providers, eBusiness enablers, distributors, and supplies manufacturers. This service shall be delivered in two means; as published information, preferably delivered through web-access, and custom consulting/inquiry access.
3. Published Information will include:
i. Daily reports of activities in the industry
ii. Published reports of analysis in the industry performed for any client
iii. Reports of all independent research
iv. Market forecasts.
4. Custom Consulting & Inquiry Access
i. The contractor shall provide consultation through one-on-one interaction with team members to provide information, insight, and advice, customized for the unique and changing needs of DLA’s business, including opportunities in growing information technology business. This consulting shall also include briefings to personnel on industry trends. Some requests will be for information as may be available in the contractor’s knowledge (not primary research) and may be required within the day of request. Examples of inquiry access may include:
(1) Ongoing questions related to published service deliverables
(2) Identifying partnerships/opportunities/industry networking
(3) Interpreting forecasts and research and applying information to DLA’s business.
The contractor shall provide administrative support as requested. Work closely with the Information Operations office to accomplish assigned responsibilities. The contractor shall perform the following, or similar, activities as directed:
a. Administrative Basic Level Functions – The contractor shall provide administrative basic level support listed below.
1. Assist in preparing invoices, reports, memos, letters, financial statements and other documents, using word processing, spreadsheet, database, or presentation software.
2. Conduct research, compile data, and prepare papers for consideration and presentation by executives, committees and boards of directors.
3. Prepare, spreadsheets, designing forms, templates, and briefing charts.
4. Support the facilitation and usage of Smart boards, multifunction printers, facsimile machines, and scanners.
5. Receive and process all incoming telephone calls; interact with senior military and civilian officials on behalf of the Information Operations office.
6. Facilitate communication with staff and external agencies.
7. Maintain calendar and schedules key events (e.g., meetings, conferences, VTCs).
8. Make travel arrangements as requested, and prepare travel vouchers for signature; and provide support to other staff.
9. Distribute and route incoming material (e.g., mail, packages, direct delivery of staff actions) to appropriate staff.
10. Refer to a variety of manuals, regulations, established correspondence policies, and software manuals. Use facsimiles, local area network, and Internet communications techniques to obtain information and conduct routine research and coordination of activities.
11. Prepare and review executive correspondence, reports, and other documents.
12. Ensure that all office correspondence is prepared in the proper format and in accordance with staffing procedures.
13. Establish and maintain an efficient filing system.
14. Maintain Staff personnel folders documentation, as required.
15. Ensure supplies are on hand to meet executive needs; coordinates for re-supply.
16. Coordinate reservations and schedules conference rooms to support all Operation Directors requirements
17. Set up conference rooms for meetings.
18. After meetings, clean-up, and return conference rooms to original condition, if necessary.
19. Serves as backup to other offices within DLA J6 when necessary.
20. Provide special event coordination and support, as requested.
b. Administrative High Level – The contractor shall provide support on all administrative basic level activities as listed above under Administrative Basic Level Functions as well as the activities described herein. Provide high-level administrative support by conducting research, preparing statistical reports, handling information requests, and performing clerical functions such as preparing correspondence, receiving visitors, arranging conference calls, arranging travel, and scheduling meetings. May also train and supervise lower-level contractor clerical staff within contractor team.
1. Attend meetings to record minutes.
2. Greet visitors and provide administrative support for meeting requests for government personnel.
3. Read and analyze incoming memos, submissions, and reports to determine their significance and plan their distribution.
The contractor shall provide technical support to J6 in all aspects of the programming, planning, budgeting, and execution (PPBE) processes with the refinement and tracking of cost data and provision of cost analyses. The contractor shall provide support for the updating of financial program reports and support the Government lead with the preparation of presentations and staffing of costing documents and analysis. The contractor shall provide support for the following sub-tasks:
a. Cost/Financial Management Support
1. The contractor shall support Cost Analysis, Risk Management, and Earned Value Management (EVM) processes and procedures to include, but not be limited to:
i. Developing, recommending for Government approval, and, following approval, maintaining program and cost tracking methods for Defense Acquisition Executive Summary (DAES) reporting requirements.
ii. Identifying, developing, and recommending risk and cost mitigation strategies.
b. Provide support for the maintenance of key program budget/cost products including but not limited to:
1. Economic Analysis updates
2. Affordability Assessment
3. Analysis of Alternatives
4. Earned Value Assessments
5. Acquisition Program Baseline
6. Program Budget Review (PBR), DLA, and Corporate Program and Review Process (CPRP)
7. Budget Estimate Submission (BES).
c. Program Budget Review/IT PBR support
1. The contractor shall provide Program Budget Review (PBR) Support to include:
i. Preparing draft IT PBR Guidance
ii. Exhibit Preparation and Execution to include completion of the IT-1 in SNAP-IT, the IT Capital Justifications – 9bs, the IT 300s, and the IT Overview
iii. Supporting IT Strategy Meetings with the CIO or designee(s)
iv. Maintaining the Financial Operations Information Technology (FOIT) database
v. Maintaining the source information for IT PBR briefing to the Director/Vice Director of DLA.
vi. Creating Annual Operating Budget Backup spreadsheets for field activities
vii. Validating end of year actuals for all IT funding
viii. Provide support for the resolution of IT program funding issues.
d. Budget Execution Support
1. Provide budget and cost analysis support for all billing accounts related to J6 programs by communicating cost-related issues, concerns, and requests to required and appropriate entities.
2. Provide support for financial programming, tracking, and execution.
3. Track costs incurred against predictive models and investigate deviations from the models. Provide results for further investigation as needed.
4. Update, reconcile, and maintain budget, cost-related spreadsheets and reports and provide these to the Government.
5. Review, monitor, and track costs for estimating purposes and to ensure accuracy, analyze charges, and seek ways to reduce costs.
6. Seek resolutions and provide cost-related recommendations and reviews.
7. Participate in meetings, conference calls, and IPRs, as needed.
8. Support the Government Lead by providing financial reporting support used in monthly reports required by the Program Executive Office (J62).
9. Draft and route funding requests to the appropriate office.
10. Assist government personnel with analysis of trends, causes and probable impacts for related billing accounts.
a. The contractor shall provide Configuration Management expertise and support in planning, documenting, implementing, executing, and monitoring configuration management processes and procedures for Configuration Identification, Configuration Status Accounting, Configuration Verification and Auditing, and Configuration Change Control.
b. The contractor shall provide support in gathering functional, technical, and interface requirements and ensure all requirement changes are included in final design documentation.
c. The contractor shall support the Business Intelligence Center of Excellence (BI COE) processes for verifying and analyzing requests from customers, to include, but not be limited to:
1. Scoping requirements
2. Coordinating with engineering staff
3. Developing draft Rough Order of Magnitude (ROM) cost/schedule estimates and providing feedback to customers.
d. The contractor shall provide support in developing, implementing and administering Configuration Management in accordance with DLA Enterprise CM process and Configuration Control Working Group (CCWG) framework , a significant component of the requirements gathering and development processes.
e. The contractor shall support maintaining overall configuration control of the project and its deliverables, work products, and configuration items.
f. The contractor shall provide change management consultation to DLA, as required to ensure control and record-keeping is maintained of transitions in infrastructure, organization, responsibilities, and products.
g. The contractor shall develop, recommend implementation for Government approval, maintain, and employ appropriate Configuration Management (CM) applications and tools to manage the system change control process, properly identify all requirements, track all changes to the requirements and provide system test status reports for the program.
h. The contractor shall coordinate Configuration Management (CM) inputs with Integrated Process Teams (IPTs), to explain any deviations from expectations, regarding capabilities delivered.
i. The contractor shall update CM databases and generate management reports and metrics.
j. The contractor shall support creation and maintenance of program CCWG charters and CM related procedures.
k. The contractor shall support the DLA enterprise CM plan and program CCWG implementation actions and reporting requirements.
l. The contractor shall provide support in maintaining control and visibility of customer functional and technical requirements for the program.
m. The contractor shall support program information, system program reviews, system design reviews, system audits and system tests.
The contractor shall support the Systems Engineers and programs/projects in meeting the Defense Acquisition Guidebook’s Systems Engineering Technical and Technical Management processes, to include, but not limited to, the following activities:
a. Stakeholder Requirements Management – The contractor shall:
1. Provide ongoing SE expertise and support to the SE Working Integrated Product Teams (WIPTs) and/or other SE related meetings.
2. Provide Systems Engineers/Program Managers (PM) updates on SI implementation progress, technical review entrance/exit criteria, CM assessment criteria and general SE matters as it supports the PM’s decision making process.
3. Assist in the requirements definition process to elicit inputs from relevant stakeholders and translate the inputs into technical requirements including performance parameter objectives and thresholds, affordability constraints, schedule constraints, and technical constraints.
b. Technical Planning – The contractor shall:
1. Create/maintain program System Engineering Plans (SEP) and other SE related documentation.
2. Assist in the planning of technical processes to develop, field, and sustain the system in compliance with the DOD 5000 Series guidance and other DOD regulations, and industry best practice.
3. Assist the Government in ensuring that SE processes are applied throughout the system’s lifecycle.
4. Support process development/improvements and related documentation for SE processes.
c. Decision Analysis – The contractor shall:
Recommend, implement, and monitor SE processes, procedures, methods and tools to ensure that decision analysis has identified, represented, and formally assessed the alternative options to select an optimum decision.
d. Technical Assessment – The contractor shall:
1. Perform periodic program/project technical assessments evaluating program status, technical progress, work product quality, and schedule and cost management.
2. Support Engineering Technical Review (e.g. System Requirements Review (SRR), Preliminary Design Review (PDR) and, Critical Design Review (CDR) Entrance and Exit criteria. Work with the Program Management Office (PMO) and SI to communicate expectations and successfully achieve Entrance and Exit criteria prior to each review.
e. Configuration Management related to the System Engineering process ¬- The contractor shall:
1. Establish and control product attributes and the technical baseline across the total system lifecycle.
2. Identify, document, audit, and control the functional and physical characteristics of the system design; track any changes; provide an audit trail of program design decisions and design modifications.
3. Provide oversight review and support of Configuration Control Steering Group (CCSG) and Configuration Control Working Group (CCWG) activities and processes.
f. Technical Data Management – The contractor shall:
Assist the Government in ensuring that SE discipline is applied to the policies, procedures and information technology to plan for, acquire, access, manage, protect, and use data of a technical nature to support the total lifecycle of the system.
g. Requirements Management – The contractor shall:
1. Review the definition, loading and approval of requirements by the Functional community and Program Office.
2. Monitor the System Integrator (SI) progress in implementing and ultimately validating the program requirements through the Testing phase.
3. Document all requirements changes and the rationale for those changes (via the configuration management process).
4. Account for the traceability of system requirements throughout the software development lifecycle and confirm at each technical review.
h. Requirements Analysis – The contractor shall:
1. Support the definition and refinement of system, subsystem, and lower-level functional and performance requirements and interfaces to facilitate the Architecture Design process.
2. Support the development of measurable and verifiable requirements.
i. Architecture Design – The contractor shall:
Assist the Government in ensuring that SE discipline is applied to the translation of the Stakeholder Requirements Definition and Requirements Analysis processes into alternative design solutions and the selection of a final solution.
j. Implementation – The contractor shall:
Assist the Government in ensuring that adequate testing and configuration control occurs during the implementation process (e.g. software coding).
k. Risk Management – The contractor shall:
1. Support the overarching risk process that includes identification, analysis, mitigation planning, mitigation plan implementation, and tracking.
2. Provide assistance to the Government in integrating risk management with systems engineering and program management processes.
3. Identify risk drivers, dependencies, and root causes, and perform consequence management.
l. Interface Management – The contractor shall:
1. Provide interface definition and compliance support among the elements that compose the system, as well as with other systems with which the system or system elements interoperate.
2. Provide support to document all internal and external interface requirements in accordance with the Configuration Management (CM) Plan and communicate these to all affected configuration items.
m. Integration – The contractor shall:
Assist the Government in ensuring that individually developed components (e.g. RICE objects) are correctly tested, documented, and integrated into releases.
n. Verification – The contractor shall:
1. Provide support to confirm that adequate verification processes exist to ensure that the system element meets the design to or build-to specifications as defined in the functional, allocated, and product baselines.
2. Assist the Government in ensuring that the following verification activities occur throughout the lifecycle, and are phase appropriate: verification planning, verification execution, and verification reporting.
o. Validation – The contractor shall:
1. Investigate and document that validation processes exist to confirm that the correct solution was selected to solve the stated problem.
2. Ensure that SE processes support user and functional community input and solution validation/acceptance.
p. Deployment – The contractor shall:
Assist the Government in deploying the solution to the end users. The contractor shall provide on-site support to install the solution and train the users.
Enterprise Architecture (EA) is an explicit description and documentation of the current (as-is) and desired (to-be) relationships among DLA business and management processes and the IT that supports those processes. It also includes a roadmap to migrate the agency from the current to the target Enterprise Architecture. Enterprise refers to DLA, recognizing that the agency exists within the larger Department of Defense (DOD) and Federal enterprises. The DLA EA includes all Agency mission areas, administrative functions, systems, and technical infrastructure, as well as external interfaces. The DLA EA is comprised of four components of architecture; 1)Business Architecture, 2) Information and Data Architecture, 3) Applications Architecture, and 4) Infrastructure Architecture. Each component will need to be defined to reflect DLA enterprise current and future architecture. The defined architecture will need to be documented in architectural products that comply with the DOD Framework (current version).
The contractor shall provide support for the following sub-tasks:
a. Support DOD Business Enterprise Architecture (BEA) compliance requirements.
b. Support the continued development and sustainment of DLA’s Enterprise Architecture.
1. Support or provide training and advise the Agency users on Enterprise Architecture, the DOD Architecture Framework (DODAF) and, the Enterprise Architecture tools and repository in accordance with architecture development guidance.
2. Support Enterprise Architecture modeling, to include Data Architecture models, and other documentation development. This may involve travel to locales where the business experts are located and holding sessions with those experts to capture their knowledge in the architecture models.
c. Provide Program Support Services for overall investment / requirements management efforts within the context of Enterprise Architecture.
d. Support efforts related to resolving technical issues encountered with architecture development tools and repositories, and documentation of those changes.
e. Provide assessment of the DLA Enterprise Architecture relative to Enterprise Architecture Maturity Models and make adjustments to improve maturity.
f. Interact with the Business Cycle Teams and other business units in DLA, J-62, and J-64 at DLA Headquarters, as well as remote sites to capture current business processes and technical/infrastructure architecture to ensure they are compliant with the latest version of the BEA and document the current or as-is DLA enterprise architecture.
g. Analyze various DOD and DLA IT strategies, objectives, requirements and current technology trends and provide recommendations for developing a five-year target/desired end state for the DLA Enterprise Architecture.
h. Develop and maintain a roadmap/transition plan for DLA to migrate from the as-is architecture to the target/desired end state for the DLA Enterprise Architecture developed in paragraph g. above.
i. For both the as-is and the target/desired end state for the DLA Enterprise Architecture, develop architectural products and document the products in the DLA architecture repository. The architectural product shall be consistent with the current version of the DOD Architecture Framework and DLA architecture development guidance.
j. Facilitate the management of various Enterprise Architecture working groups and boards.
k. Provide support in the assessment of programs and their architectural products to verify their compliance with the DLA Enterprise Architecture and the DOD BEA.
l. Provide support in the development of various architecture models required for maintaining Audit Readiness.
The contractor shall provide support for the following sub-tasks:
a. Support the Development of Enterprise Data Strategies
1. Analyze various approaches on data strategy and provide recommendations for DLA approval on the most appropriate strategy to implement at the enterprise level.
2. Support the development of a prioritized list of actionable objectives and tasks and include them in an integrated Enterprise Data Strategy Plan of Action and Milestones (POA&M) for DLA approval. Ensure that the Enterprise Data Strategy POA&M is consistent with industry methods and practices and DLA guidelines.
3. Upon DLA approval of the POA&M, coordinate with action office to monitor progress and identify and assist in resolving issues which arise in the course of the implementation process.
b. Support the Development of Enterprise Data Strategy Implementation Plans.
1. Propose an Enterprise Data Strategy Implementation Plan for DLA approval.
2. Upon approval of the plan, implement a methodology for collecting, capturing, storing, and presenting those data artifacts identified as critical for management oversight by the data stewardship organization. Focus will be on:
i. Proposing actions consistent with the DLA Enterprise Data Strategy intended to promote and institutionalize best data management practices throughout the Agency.
ii. Recommending metadata management structure, based on engineering concepts, industry standards, procedures, and best practices that are needed to comply with DLA and DOD requirement;
iii. Collecting and integrating data elements and associated metadata used within DLA;
iv. Developing, recommending, and implementing procedures for populating and managing a data / metadata repository;
v. Developing, recommending, and implementing mechanisms for data artifact browsing and retrieval as required to support DLA and DOD data management and data usage policies and procedures, to include development and implementation of the Net-centric Enterprise Services standards and capabilities, and the DOD Metadata Repository capability.
vi. Identifying enhancements to life-cycle documentation and recommending changes to organizational roles and responsibilities to enable data governance and accomplish compliance monitoring;
vii. Proposing communications activities designed to increase awareness of and adherence to data management goals, policies, and procedures.
3. This data strategy implementation effort shall be carried out in collaboration with members of the DLA stewardship organization, and is likely to require liaison and collaboration with Government and other contractor personnel who manage various DLA programs, systems, and applications and oversee DLA policy development and implementation.
c. Provide support to the DLA data stewardship organization.
1. Support the leading member of the DLA data stewardship organization in facilitating the activities of the various working groups by scheduling meetings, developing agendas, collecting and distributing materials to be presented, and capturing and publishing minutes and action items.
2. Provide recommendations for periodic status briefings to senior managers and other interested parties.
3. Collaborate with members of the working group or other interested parties as required to enable effective and efficient operations.
d. Provide advice and guidance to resolve problems to meet performance and financial objectives.
The Contractor shall support Test and Evaluation of programs/projects in accordance with the Defense Acquisition Guidebook’s Testing and Evaluation Technical and Technical Management processes, to include but not limited, to the following activities:
a. Testing and Evaluation Master Plan (TEMP) – The TEMP documents the overall structure and objectives of the Test and Evaluation (T&E) program required to demonstrate the Defense Business System (DBS) has met its design and performance requirements. The contractor shall provide support to include, but not be limited to:
1. Revising and updating the TEMP in accordance with DOD 5000.2-R, as required and subject to Government approval.
2. Ensure that the TEMP is synchronized with all other relevant program acquisition documents when necessary in support of specific program milestones.
3. Ensure that the TEMP is updated using the most relevant, current, and accurate information obtained from field organizations, integrated product teams, and DLA staff as well as industry standard practices, procedures, and requirements.
b. Integrated Product Team (IPT) – IPTs are composed of representatives from appropriate functional disciplines working together to build successful programs, identify and resolve issues, and make sound and timely recommendations to facilitate decision making, Working-Level Integrated Product Team (WIPT), Working level team of representatives from all appropriate functional disciplines.
The contractor shall provide support to include, but not be limited to:
1. Supporting and providing technical support to assigned IPT and WIPT meeting and discussions as necessary.
2. Provide support in the development and production of material for presentation to the Testing WIPT and other internal and external oversight organizations (e.g. Supply Chain Integration Group, Transformation Executive Board Integrated Product Team, and Overarching Integrated Product Team).
c. Developmental Test and Evaluation (DT&E) Support
The contractor shall provide support to include, but not be limited to:
1. Provide support to the Testing Team during the conduct of the Developmental Test and Evaluation (DT&E) execution phases for all DBS
2. Develop crosswalk plans, scripts and test results to ensure compliance with regulatory requirements, acquisition memorandum requirements, the TEMP and the Operational Requirements Document/Capability Development Document (ORD/CDD)
3. Provide a compliance matrix that documents test results with EBS program and acquisition program requirements
4. Monitor test events to ensure results will achieve EBS testing objectives, ORD/CDD and Milestone requirements
5. Work closely with Joint Interoperability Test Command (JITC) assessors to ensure EBS releases achieve required interoperability approvals and certifications as appropriate
6. Maintain traceability of requirements (e.g. Reports, Interfaces, Conversions, and Extension (RICE) objects) with DT&E test conditions and test cases
7. Produce reports throughout DT&E phases for all EBS releases that reflect the status of Traceability audits and analyses
8. Maintain configuration control of documents and test results in a database
9. Provide consultant services to enable the early identification and solution of problems and provide recommendations to improve the testing process
10. Provide analyses of discrepancies found during testing and provide recommendations for resolution
11. Provide support to the PMO by producing the draft DT&E report for each release and with preparation materials for the Test Readiness Reviews (TRR) at the start of each DT&E phase.
d. Operational Readiness Testing Support
The contractor shall provide support to include, but not be limited to:
1. Provide support to the Test Team during the conduct of the Operational Test Readiness Reviews (OTRR) phase
2. Perform reviews to ensure the system complies with regulatory requirements and the approved TEMP requirements and produce reports as necessary
3. Provide support in the development of artifacts that document the readiness of the system to proceed to the next test event
4. Provide support to identify problems and recommend solutions as required
e. Operational Test & Evaluation (OT&E) Support
The contractor shall provide support to include, but not be limited to:
1. Provide support during preparation and conduct phases of all Operational Test and Evaluation (OT&E) events for each release as scheduled
2. Produce a report of lessons learned from previous Operational Assessment or OT&E events in preparation for the next OT&E event
3. Participate in OT&E planning activities with the Testing Team and JITC and produce minutes for each event
4. Support working closely with JITC prior to and during OT&E events to help clarify operational requirements, identify issues/problems and recommend solutions as required
5. Support OT&E activities at each of the designated DBS test sites (e.g. DLA Headquarters, DLA Land and Maritime, DFAS, DLA Troop Support, DLA Aviation, DLA Distribution, and DISA
6. Support the maintenance of the OT&E documentation (e.g. plans, scripts, Measures of Performance (MOP’s) and test results) and track each iteration against baseline documents and TEMP/ORD/CDD requirements and ensure consistency with regulatory and milestone requirements, using the Requirements Traceability Matrix
7. Provide an OT&E monitor report including analyses of problems / issues and recommended solutions
8. Maintain configuration control of documents and test results in the EBS Workbench
9. Prepare a Lessons Learned Report for use in preparation for the next OT&E Event
IT Process Management – Definition
a. The contractor shall provide support for developing J6 process management framework documentation that defines the strategy, structure and purpose of J6 process management within the J6 organization and includes elements such as all J6 process/service relationships, compliance needs, roles, definitions, measures, reporting, sustainment and governance.
b. The contractor shall manage and maintain J6 process and service alignment to Federal/Department of Defense (DoD)/DLA policy requirements via a law, regulation and policy (LRP) Matrix. This includes reviewing, validating and updating the LRP and the IT Control Matrix data sources as needed throughout the period of performance.
c. The contractor shall develop templates for supporting process documentation, to include J6 internal procedures, training, and job aids.
d. The contractor shall provide support to all Enterprise Service Areas (ESAs) for J6 process and service development and sustainment.
e. The contractor shall define and manage the J6 Process Inventory process with definitions and clear identification of J6 process owners, including conceptual architecture depiction.
f. The contractor, upon direction by the government, shall assist with articulating and defining the key process, service relationships and dependencies with J6 and non-J6 parties. The government will provide business rules for how these defined service relationships and dependencies will be managed.
g. The contractor, upon direction by the government, shall define and manage controls processes and services within J6.
h. The contractor shall develop concept of operations for J6 process management working groups to manage J6 processes and services across the J6 enterprise to measure performance and manage J6 process and service inventory.
i. The contractor shall implement and maintain the “IT Process Inventory” and “IT Service Inventory” capability in eWorkplace (Microsoft (MS) SharePoint) to manage all documentation for J6 processes and services; to include an organizational view and metrics/performance for each J6 process/service.
j. The contractor shall develop processes and training presentations for J6 using the DLA templates.
k. The contractor shall facilitate J6 process management working groups through development of monthly briefings on progress/actions for J6 process management capability, including minutes for all working group meetings and posting artifact to eWorkplace.
l. The contractor shall develop monthly status briefing to J61 on J6 process management performance, highlighting risks and accomplishments.
m. The contractor shall support the development of a J6 process and service integrated catalog for customer and stakeholder viewing in eWorkplace (Microsoft SharePoint); to include process and service page views.
IT Process Management – Measurement
a. The contractor shall assist in defining and managing J6 process and service alignment with best practice frameworks (i.e. Defense Enterprise Service Management Framework (DESMF), Information Technology Infrastructure Library (ITIL) Capability Maturity Model Integration (CMMI), Control Objectives for Information and Related Technology (COBIT), Federal Information System Controls Audit Manual (FISCAM) controls).
b. The contractor shall recommend metrics and key performance indicators (KPI) for J6 processes and services.
c. The contractor shall develop and, subject to Government approval, provide guidance to all ESAs for metric development and reporting.
d. The contractor shall recommend best practices/benchmarks to ESAs to incorporate into J6 processes/services.
e. The contractor shall develop a standard operating procedure to measure J6 process compliancy, facilitate and coordinate process with ESAs, and report compliancy with laws, regulations and policies.
f. The contractor shall manage and maintain key process internal controls inventory and testing status for J6 processes.
g. The contractor shall develop, recommend, and, following approval, implement IT requirements for the automation of IT Process Management-related tools and procedures to be made available via eWorkplace (Microsoft SharePoint) including:
1. IT Service Inventory
2. IT Service maturity questionnaire and rating capability
3. Internal control compliance assessments
4. Dashboard reporting of maturity scores, and internal control compliance
5. Performance metric identification, and measurement input capability for each service by organization
6. Dashboard reporting of performance measurements and relationship to maturity scores.
h. The contractor shall manage J6 annual operating plan performance with ESAs and develop capability for current status view in eWorkplace (MS SharePoint).
i. The contractor shall complete compliance reviews for a specific J6 ESA process within the period of performance of the task order.
IT Process Management – Improvement
a. The contractor shall manage and maintain J6 process improvement standard operating procedures, templates, examples, checklists, tools and policies.
b. The contractor shall provide guidance, subject to Government approval, to all ESAs for structured (Define, Measure, Analyze, Improve and Control (DMAIC)/Rapid Improvement Event (RIE)) and unstructured (Just Do It (JDI)) process improvement projects/events.
c. The contractor, upon government direction, shall revise the J6 Continuous Process Improvement (CPI) Deployment Plan, DLA Manual (5309.02) and IT Process Improvement Standard Operating Procedure.
d. The contractor shall schedule, facilitate and manage a J6 Executive Planning Session to identify and gain approval for J6 Enterprise process improvement projects/events.
e. The contractor shall manage all J6 projects and resources in the DLA J5 process improvement repository, to include ensuring required documentation and deliverables are completed and are of acceptable quality; Powersteering is the tool solution.
f. The contractor shall deliver process improvement training to J6 workforce. Training events include Awareness (two-day events), Champion/Project Sponsor (one-day event), Green Belt (five-day event), Black Belt (five-week event).
g. The contractor shall provide mentoring and project coaching to J6 process improvement facilitators for J6 process improvement projects.
h. The contractor shall assist the government staff with continuous process improvement projects in the following manner: reviewing CPI forms for completeness; assisting CPI candidates with meeting coordination and communications; providing subject matter expertise relating to CPI; helping CPI candidates stay on track for project completion; and assisting CPI candidates with obtaining data for project deliverables such as SIPOC (Supplier, Input, Process, Output, Customer) process flow charts.
i. The contractor shall identify, support and manage benefits for non-Lean Six Sigma (LSS) structured initiatives.
j. The contractor shall prepare and conduct value stream mapping and analysis as required to support process improvement projects and events.
k. The contractor shall manage and track process improvement savings and benefits for J6.
l. The contractor shall develop monthly status briefings to J61 for status on J6 process improvement activities, including projects, resources, benefits, and training.
m. The contractor shall support the process for DLA CPI certification requirements for J6 employees.
a. The contractor shall maintain the Technical Infrastructure Architecture (TIA) systems database. The contractor shall provide quarterly change reports reflecting changes in the information and ad hoc reports based on specific inquiries. The contractor shall manage the TIA tools in accordance with DOD and DLA information policies.
b. The contractor shall provide support for the Risks and Controls Management Program (RCM). The RCM (also known as the Management Internal Control program) is a program that prepares a Statement of Assurance (SOA) of the J6 Chief Information Officer/Director, Information Operations (J6). The SOA represents the agency’s informed judgment as to the overall adequacy and effectiveness of internal control with the agency. The contractor’s task may include:
1. Preparing the initiation and overview material for dissemination to J6 Enterprise Service Areas (ESA) and annual compliance testing.
2. Prepare templates for use by the ESA to describe and define their critical control activities.
3. Maintain a schedule of testing performed by the ESAs to validate their internal controls.
4. Consolidate all test results and feedback into the appropriate documentation for the SOA, which include Internal Controls Over Financial Systems (ICOFS).
5. Support the development of the SOA/ICOFS submission and supporting materials in accordance with DLA requirements.
c. The contractor shall manage and maintain the J6 Risk Management profile, which includes both Enterprise-wide and specific risks focused on organizational or operational areas. The contractor’s task may include:
1. Collecting and reporting to DLA management the current risks with risk mitigation POAMs.
2. Develop and deliver supporting briefings that define the J6 Risk Management profile.
3. Provide risk mitigation recommendations for J6 risks.
d. The contractor shall prepare and deliver audit readiness and sustainment training material relevant to DLA Audit Readiness.
e. The contractor shall review, update, and maintain the DLA IT Audit Readiness Communication Plan and deliver methods to enable DLA to effectively communicate system audit readiness requirements, schedule, and approach across the DLA enterprise and with customers.
f. The contractor shall coordinate and support the management of all DLA system related corrective action plans.
g. The contractor shall manage and update DLA System Assertion Work Products in alignment with OSD Financial Improvement Audit Readiness (FIAR) Guidance.
h. The contractor shall evaluate the System PMOs’ audit readiness preparedness using the OSD FIAR Guidance and applicable DLA targeted assertion dates on a monthly basis and provide DLA a synopsis as to the status.
i. The contractor shall review and update “Other” DLA Systems and Micro Applications, as defined by OSD FIAR, to determine criticality against DLA and customer assertion requirements.
j. The contractor shall provide pre-implementation assessments of system upgrades for systems or micro applications.
k. The contractor shall support the identification and transition of DLA information sources supporting audit readiness and the sustainment of the audit environment.
l. The contractor shall develop, recommend, and following approval, maintain the J6 Audit Readiness Plan which outlines all activities with owner and or executor relevant to J6 preparing itself for DLA’s Annual Financial Statement Audits.
m. The contractor shall support DLA’s Access, Monitoring, and Verification (AMV) activities that include Segregation of Duties (SoD) business rules and Enterprise Process Documentation (EPD) analysis. This support shall help ensure completeness, identification of potential risk, and alignment with DLA Audit Readiness efforts.
n. The contractor shall provide support and guidance, subject to Government approval, to J6 audit readiness and system personnel for audit engagements, which may include SSAE16 independent audits. This support shall include reviewing requirements and providing DLA with recommended solutions with risk considerations.
o. The contractor shall identify the scope of controls applicable to J6’s annual system compliance testing in accordance with Office of Management & Budget (OMB) Circular A-123, and DLA’s automated control requirements which include business process controls and interfaces. This support shall include the discovery, scheduling and testing of controls identified as in scope and may include both system-level and Entity-wide controls.
p. The contractor shall assist in reviewing and updating MOUs related to audit readiness, and follow the DLA Audit Readiness Guidance.
q. The contractor shall review the DISA (infrastructure) provided controls and report whether or not controls are in-place and operating effectively, and identify omitted controls that should be added to the DISA MOU. In addition, the contractor shall support the development of the DLA/DISA Audit Readiness MOU utilizing the approved DLA MOU template to ensure responsibilities between stakeholders are accurately described and the agreement contains the proper audit readiness language.
r. The contractor shall support the development and sustainment of system management assertion packages by ensuring all updates are timely and accurate, coordinate approval within DLA, and confirm documents are loaded to the OSD(C) FIAR website utilizing the FIAR Tool.