Type : Bid Notification
The attached document is a redacted Justification and Approval (J&A) for the Defensive Cyber Operations Internal Defense Measures (DCO-IDM) program.
The attached document is a redacted Justification and Approval (J&A) for the Defensive Cyber Operations Internal Defense Measures (DCO-IDM) program.
To accomplish the mission, SSC/SZYO contracted with multiple vendors to prototype key defensive cyber features, through prototype OTA awards under the Space Enterprise Consortium base agreement.
This RFI is conducted to gather information and identify potential sources capable of meeting the requirements for the Space and Missile Systems Center (SMC), Range and Network (RN) Division, Defensive Cyber Operations for Space.The Air Force Space Enterprise requires advanced persistent cyber defenses against nation state threats to operations.
DEFENSIVE CYBER OPERATIONS INTERNAL DEFENSE MEASURES Solicitation ID/Procurement Identifier: NIHJT2010001 Ultimate Completion Date: Thu Oct 31 17:00:00 GMT 2019
This is a sole-source bridge action for DCO Mission Services, which provides support to the 33 NWS to counter network exploits and attacks; to dynamically defend and protect the AFNet and provide mission assurance for the AF and supported combatant commands.
Response to this Sources Sought has been extended to Friday October 16, 2020 at 1:00 Eastern Time.The objective of this requirement is to provide strategic level program management support to PM DCO and its subordinate product offices in implementing laws, regulations, and polices to facilitate evolving PM DCO practices with the intention of meeting critical milestones, delivering of capabilities, and continuously improving performance. The key task areas are delineated below. It is hereby noted that, due to the dynamic nature of a Program Management Office (PMO), specific tasks may vary from one division to another. It is also noted that divisions themselves may change based on ongoing reorganization.
Beginning on 1 October 2024, DAU will begin delivery of cybersecurity training classes using a commercial cyber training range infrastructure. Classes will include foundational and intermediate training on offensive and defensive cyber tactics, techniques, and procedures. The scope of the training includes both network and embedded (Platform IT) computing systems.