STATE OF FLORIDA Department of Management Services

Similar documents
Exhibit F. VA CAI - Staff Aug Job Titles and Descriptions Effective 2015

performs a variety of complicated tasks, may lead and direct the work of others, may report directly to a project

Special Item No Information Technology Professional Services. Government Site GSA Rate Effective March 6, 2015

General Dynamics One Source, LLC Alliant GS00Q09BGD0030 Labor Category Descriptions April

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

ADMINISTRATIVE SUPPORT AND CLERICAL OCCUPATIONS SIN 736 1

Department of Management Services. Request for Information

Certified Information Systems Auditor (CISA)

B.Sc (Computer Science) Database Management Systems UNIT-V

RFP Attachment C Classifications

Information Technology Specialists, #39110 Occupational Family: Engineering and Technology Pay Band Range: 4-8. Concept of Work

APPENDIX C TABLE OF CONTENTS

Appendix A-2 Generic Job Titles for respective categories

SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description. DEPARTMENT: Technology Services SALARY: Range 13 Salary Schedule A

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

SENIOR INFORMATION SYSTEMS MANAGER

Business Continuity Position Description

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

POLAR IT SERVICES. Business Intelligence Project Methodology

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

JOB DESCRIPTION CONTRACTUAL POSITION

Domain 1 The Process of Auditing Information Systems

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Human Resource Services PO Box Classification and Compensation Gainesville, FL Fax

Cybersecurity The role of Internal Audit

Sample Career Ladder/Lattice for Information Technology

Injazat s Managed Services Portfolio

Microsoft Training and Certification Guide. Current as of December 31, 2013

Labor Category Descriptions

Data Security Incident Response Plan. [Insert Organization Name]

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led

How To Manage Security On A Networked Computer System

Labor Category For MOBIS SIN 874-1:

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

A McKnight Associates, Inc. White Paper: Effective Data Warehouse Organizational Roles and Responsibilities

The Protection Mission a constant endeavor

Big Data Engineer Position Description

Knowledge Base Data Warehouse Methodology

HELP DESK SUPERVISOR

Defending Against Data Beaches: Internal Controls for Cybersecurity

GEARS Cyber-Security Services

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

External Supplier Control Requirements

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Information Technology Solutions

INFORMATION SYSTEMS SPECIALIST

Updating the International Standard Classification of Occupations (ISCO) Draft ISCO-08 Group Definitions: Occupations in ICT

Law Enforcement Commercial Price List ManTech International Corporation January 2015

Vistara Lifecycle Management

Enterprise Computing Solutions

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Exhibit to Data Center Services Service Component Provider Master Services Agreement

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Microsoft Training and Certification Guide. Current as of March 16, 2015

SECTION J. List of attachments. 1. Labor Category Descriptions (29 pages) 2. List of Acronyms (2 pages) 3. Experience Format (1 Page)

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Managing and Maintaining Windows Server 2008 Servers

min exp years min educ

Appendix M INFORMATION TECHNOLOGY (IT) YOUTH APPRENTICESHIP

Workflow Templates Library

ao consult Basic Experience: Must have 7 years of experience in the development and maintenance of database systems.

Data Management Policies. Sage ERP Online

IT Risk & Security Specialist Position Description

05.0 Application Development

Security Management. Keeping the IT Security Administrator Busy

T141 Computer Systems Technician MTCU Code Program Learning Outcomes

Cybersecurity and internal audit. August 15, 2014

Labor Category Descriptions

Managed Services. Business Intelligence Solutions

Qlik UKI Consulting Services Catalogue

Labor Category Descriptions

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Risk Management Guide for Information Technology Systems. NIST SP Overview

CLOUD SERVICES FOR EMS

Vulnerability Management

FEDERAL BUSINESS SYSTEMS CORP. (FBSCGov) RIDING PLAZA #200 CHANTILLY VA Ph: Fax:

P-20 Longitudinal Data System Project Roles and Skills

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

CERULIUM TERADATA COURSE CATALOG

Cost of Doing Government Contract Jobs

Payment Card Industry Data Security Standard

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011

Cisco Network Optimization Service

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

SRA International Managed Information Systems Internal Audit Report

POSITION QUALIFICATIONS. Minimum Experience (Yrs)

Der Weg, wie die Verantwortung getragen werden kann!

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Enterprise Cybersecurity: Building an Effective Defense

Transcription:

STATE OF FLORIDA Department of Management Services Request for Information Cyber- Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services Prepared by: TRINCO Technologies LLC & CENTERPOINT Inc. (team TRINCO- CENTERPOINT )

A B C Table of Contents Introduction... 3 Background... 3 Contact Information... 4 D Response to section IV... 5 1 Pre- Incident Services... 5 a) Incident Response Agreements - Terms and conditions in place ahead of time to allow for quicker response in the event of a cyber- security incident.... 5 b) Assessments - Evaluate a State Agency s current state of information security and cyber- security incident response capability.... 5 c) Preparation - Provide guidance on requirements and best practices.... 6 d) Developing Cyber- Security Incident Response Plans - Develop or assist in development of written State Agency plans for incident response in the event of a cyber- security incident. 6 e) Training - Provide training for State Agency staff from basic user awareness to technical education.... 7 2 Post- Incident Services... 7 a) Breach Services Toll- free Hotline - Provide a scalable, resilient call center for incident response information to State Agencies.... 7 b) Investigation/Clean- up - Conduct rapid evaluation of incidents, lead investigations and provide remediation services to restore State Agency operations to pre- incident levels.... 8 c) Incident Response - Provide guidance or technical staff to assist State Agencies in response to an incident.... 8 d) Mitigation Plans - Assist State Agency staff in development of mitigation plans based on investigation and incident response. Assist State Agency staff with incident mitigation activities.... 9 e) Identity Monitoring, Protection, and Restoration - Provide identity monitoring, protection, and restoration services to any individuals potentially affected by a cyber- security incident.... 9 f) Attachment: Service Catalog - GSA Schedule Price List... 10 PAGE 2

A Introduction Two leaders in the cybersecurity and information technology field have joined forces to address the future Cyber- Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services needs of the great State of Florida. TRINCO Technologies LLC and CENTERPOINT have joined forces as TRINCO- CENTERPOINT. B Background TRINCO Technologies, LLC is an information technology services provider focused on the public service sector. With offices around the country, Trinco Technologies was formed to help both government and non- profit organizations address their unique IT challenges. As a IT service provider Trinco Technologies offers value to our clients in terms of cost efficiency, delivery excellence, and leadership. Our clients include Fortune 100 companies, state and local governments, federal agencies and non- profit organizations. CENTERPOINT Inc. is a team of experts built to face modern cybersecurity challenges, and deliver end- to- end secure mobile solutions. Our mission is to protect our nation and our way of life. CENTERPOINT enables information superiority by developing, integrating and managing all- encompassing cybersecurity and mobile solutions that provide secure, reliable access to critical information any place, any time, on any device. PAGE 3

C Contact Information Shiva Sathasivam, CEO, TRINCO Technologies LLC 618 S. Park Street Madison, WI 53715. Telephone: (608) 274-6653 FAX: (608) 277-7770 E- mail: trinco@trincotech.com Alternate Contact: Ed Silva Telephone: (304) 671-2861 Email: ed.silva@centerpoint.biz PAGE 4

D Response to section IV 1 Pre- Incident Services a) Incident Response Agreements - Terms and conditions in place ahead of time to allow for quicker response in the event of a cyber- security incident. TRINCO- CENTERPOINT provides incident response services to ensure that responding to threats and breaches is quick and effective. Our staff participated in creating the recently released NIST privacy risk management framework, an update to NIST s main security risk management guidance, which includes incident response guidance. We have established incident response procedures with defined charters, roles and responsibilities, actions, time frames and escalation points, reporting and after action reviews for the US Drug Enforcement Administration (DEA), the US Department of the Treasury s HRconnect system. HRConnect is an HR system used by multiple Federal agencies, and the Federal Deposit Insurance Corporation (FDIC), where we created fully defined processes for security incidents and a focused process for losses of personal privacy information including management of restoration and monitoring services to consumers throughout the US. Our approach to incident response centers on the classification and prioritization, so that we address the incidents with the greatest business impact first. We classify by incident type, criticality, severity, and scale. o Types - perimeter breach, internal breach, corruption, network o Criticality primary system, essential function, secondary system o Severity enterprise outage, localized impact, network performance o Scale enterprise, regional, location, system b) Assessments - Evaluate a State Agency s current state of information security and cyber- security incident response capability. TRINCO- CENTERPOINT senior security consultants are well versed and experienced in the review and assessment of the cybersecurity posture of organizations. Our staff has performed all phases of the cyber assurance life cycle, including hands on penetration testing, identity and access, security processes and policies, and the establishment and monitoring of incident response programs. Our senior security experts have served in the role of ISSO, auditors, assurance testers, and incident response team leaders. Our senior staff have performed senior management functions such as the CISO and Chief Privacy Official for the Federal Deposit Insurance Corporation (FDIC). We have participated in senior level Office of the Director of National Intelligence (ODNI) cyber intelligence coordination and sharing PAGE 5

activities. The US Government Accountability Office (GAO) recognized our work as a model for federal civilian agencies. Our security assessment services include: Penetration testing white box / black box Identity and Access user accounts and privileges Public Interfaces web services, APIs, direct connections Data Security encryption and transport (data at rest/in motion) Security Processes on boarding, off boarding, granting privileges, suspend, external consultants Security framework physical, perimeter, internal systems (XSS, SQL injection) c) Preparation - Provide guidance on requirements and best practices. TRINCO- CENTERPOINT senior security experts have created, implemented and managed business- focused solutions utilized Control Objectives for Information and Related Technology (COBIT), National Institute of Standards and Technology (NIST), and the Health Information Trust Alliance Common Security Framework (HITRUST CSF) in federal, state and private sector environments. Our staff participated in creating the recently released NIST privacy risk management framework, an update to NIST s main security risk management guidance. We have combined industry best practices to address critical requirements and implemented continuous monitoring, insider threat, and intrusion detection systems at US banks and federal agencies. Our services to support the development and implementation of a sound and effective Cybersecurity program include: System security plans application and mobile Physical Security facilities and data centers Data Security databases, file stores, and email Network Security firewalls, IDS, VPN d) Developing Cyber- Security Incident Response Plans - Develop or assist in development of written State Agency plans for incident response in the event of a cyber- security incident. TRINCO- CENTERPOINT staff has established incident response plans and procedures with defined charters, roles and responsibilities, actions, time frames and escalation points, reporting and after action reviews for the US Department of the Treasury, the Federal Deposit Insurance Corporation (FDIC), and other government agencies. Our approach is to fully define processes for security incidents, so that actions and roles are unambiguous. We provide initial and on- going training and scenario PAGE 6

drills to ensure that everyone in the organization is knowledgeable and able to react according to plan. TRINCO- CENTERPOINT incident response planning services include: NIST Risk Management Framework identify risks and corresponding mitigation strategies o Implement mechanisms to detect risk triggers (manual and automatic) o Big Data Analytics to identify near- real time anomalies that can lead to breach or exploits System security response plans application and mobile Physical Security response plans facilities and data centers Data Security response plans databases, file stores, and email Network Security response plans firewalls, IDS, VPN e) Training - Provide training for State Agency staff from basic user awareness to technical education. TRINCO- CENTERPOINT staff have performed the full range of security awareness and operational procedure training for end users, power users and administrators utilizing a variety of media to keep the message fresh. Our training utilizes a mixed media approach, including computer- based training (CBT), lectures, newsletters, posters, games, quizzes, among other techniques. Organization have included US banks, the US Government Accountability Office, US Public Heath Service, US Department of Treasury, FDIC, and the US Drug Enforcement administration. Our training and breach response programs have been adopted by other federal entities. We believe in that security training and awareness needs to be a daily and constant reminder, therefore, we make use of tent cards in meetings and lounges, daily security awareness comics, and logon reminders on end users devices. TRINCO- CENTERPOINT training services include: Security Awareness training for users phishing, shoulder surfing, email Security Framework Training for app developers, physical security, etc. System Administration Training system admins, power users Security Tools and Analytics training on how to use tools and to interpret analytics 2 Post- Incident Services a) Breach Services Toll- free Hotline - Provide a scalable, resilient call center for incident response information to State Agencies. TRINCO- CENTERPOINT provides Security Operation Center (SOC) services, which include Hotlines. To support clients, we develop customized procedures according to the agency s profile, mission, and other unique characteristics. For instance, we PAGE 7

establish the support analysts scripts, escalation procedures, time triggers, and notification paths. As part of our security call center services, we provide the following: Instant online call centers on the cloud for scalability and resiliency Trained staff in different security disciplines (network, software, data) located around the country to accommodate varying time zones and regional disasters Centers that can be activated and fully functional within 24hours, and scaled as necessary within days Fully customizable, cloud- based, incident tracking system to adapt to each agency unique requirements. b) Investigation/Clean- up - Conduct rapid evaluation of incidents, lead investigations and provide remediation services to restore State Agency operations to pre- incident levels. TRINCO- CENTERPOINT develops and fully implements end- to- end incident response processes with specific responsibilities and time frames. As such, we lead incident response teams at federal and commercial entities comprised of multiple organizations and service providers. Our successful approach has been to contain and eradicate the threat as quickly as possible, and then restore service to normal operating levels. In order to ensure the detection and eradication of threats, and the return to normal operation, TRINCO- CENTERPOINT provides the following services: Computer forensics review of logs, data signatures, comparisons to backups, hard drive recovery Data backup and recovery verify integrity of backups based on estimated timing of breach and perform data restoration. Review and analyze audit logs analytics tools to mine logs to determine anomalies Virus and Malware removal identify sources and infected devices and implement countermeasures c) Incident Response - Provide guidance or technical staff to assist State Agencies in response to an incident. As noted previously in this response, we have developed and carried out processes in real- time at federal agencies, and US banks. We have functioned both as the incident response coordinator or team lead and as the functional/process Subject Matter Experts (SMEs). PAGE 8

As part of our incident response approach, we build incident response process into standard help desk/ customer service/ operations automated work flows. Our experience has shown that this approach is enables multiple touch point to accept and properly react and route incident reports. As part of our incident response services, we perform the following: Engage our team of professionals with deep subject matter expertise based on the type of incident. Remote support and guidance Deploy Tiger Teams a group of action focused individuals that can perform and coordinate response actions on site under the direction of our Subject Matter Experts working in conjunction with State teams Provide field support Technicians that address incidents and regional offices and local offices to execute recovery plans or implement fixes d) Mitigation Plans - Assist State Agency staff in development of mitigation plans based on investigation and incident response. Assist State Agency staff with incident mitigation activities. TRINCO- CENTERPONT staff has developed mitigation options and plans as the result of both risk assessments and after action reviews of incidents. For example, we proposed changes to basic operations and incident responses to hactivist as well as country on country attacks on federal entities and US banks. Our plans include strengthening controls over super and administrative accounts, changes in continuous monitoring, implementation of data loss protection tools and rules, and changes in procedures among others. Our services for mitigation planning include: Review and implement documented mitigation strategies upon risk trigger Update mitigation plans based on findings through analysis and investigation Identify and update corresponding security frameworks to reflect mitigation actions and revise as necessary for prevention of further breach e) Identity Monitoring, Protection, and Restoration - Provide identity monitoring, protection, and restoration services to any individuals potentially affected by a cyber- security incident. TRINCO- CENTERPOINT leverages in place agreements with national providers to provide scalable services to customers affected by cyber breaches or incidents. This utilizes existing service processes and efficiencies, while providing the end user assurance with a product form a recognized industry leader. As part of our identity monitoring and protection, we perform the following services: Conduct deep analytics on application logs, machine logs, and database logs to determine compromised user identities PAGE 9

Ensure global changes for compromised users change usernames/passwords, adjust access rights, and validated system authorities across the enterprise Enroll user in Identity theft programs such as Life Lock, Privacy Guard, and others to prevent personal impact Audit and scan individual computer equipment to remove any malware and viruses and ensure the user s equipment is properly protected Monitor user activity using analytics to identify future attempts at breaching originating from compromised user credentials f) Attachment: Service Catalog - GSA Schedule Price List Please see attached service catalog (GSA Schedule). PAGE 10

Trinco Technologies, LLC GSA Schedule Price List Schedule 70 Pricing Category Mobile Applications Title Mobile Application Developer I Mobile Application Developer III Pricing Not-to-Exceed Rate ($ per Hour) Experience Level Junior Mid Senior $70.10 101.25 Mobile Support Mobile Support Analyst II $85.67 Mobile Support Analyst III $101.25 Developer I N/A N/A $85.67 Developer II $85.67 Developer IV $116.83 Applications Developer - Principal $140.19 System Analyst $78.96 Software Test Analyst $65.80 Business Analyst $82.00 Solution Architect Solutions Architect IV $124.62 Solutions Architect - Principal $171.35 Policy Analyst Policy Analyst II $101.25 Policy Analyst IV $124.62 Policy Analyst - Principal $194.71 Data Management Database Architect $86.48 Data Warehouse Architect $90.24 Senior Database Administrator $116.83 Project Management Project Manager $155.77 Deputy Project Manager $136.30 IT Consultant IV $140.19 Project Lead $116.83 Project Control Specialist $85.67 Technical writer $85.67 Telecom / Network Engineer II $77.88

GSA Schedule Price List Networking Network Engineer IV $97.36 Network Administrator $65.00 Information Security Analyst Cybersecurity Engineer Security Analyst II $109.04 Security Analyst IV $140.19 Security Analyst - Principal $175.24 Cybersecurity Engineer I $70.10 Cybersecurity Engineer II $93.46 Cybersecurity Engineer III $116.83 Cybersecurity Engineer IV $144.09 Cybersecurity Engineer - Principal $175.24 IT Subject Matter Expert IT Subject Matter Expert $190.82 Page 2 of 13

Developer I Schedule 7 Schedule 70 Job Descriptions GSA Schedule Price List Responsible for converting data from project specifications, or statements of procedures or problems, into new computer programs or modified current programs. Analyzes or prepares detailed specifications to describe the sequence of steps that a computer program must follow. Analyzes specifications, applying knowledge of computer capabilities, subject matter, and symbolic logic. Confers with supervisor and representatives of departments concerned with program to resolve questions of program intent, data input, output requirements, and inclusion of internal checks and controls. Converts detailed specifications to language processable by computer. Enters program codes into computer system. Inputs test data into computer. Observes computer monitor screen to interpret program operating codes. Corrects program errors, using methods such as modifying program or altering sequence of program steps. May prepare computer block diagrams and machine logic flowcharts for detailed coding of problems, and provides for the documentation of programming work. Writes instructions to guide operating personnel during production runs. Analyzes, reviews, and rewrites programs to increase operating efficiency or to adapt program to new requirements. Compiles and writes documentation of program development and subsequent revisions. May assist computer operator to resolve problems in running computer program. May work with Systems Analyst to obtain and analyze project specifications. May direct and coordinate work of others to write, test, and modify computer programs. Work involves writing programs to solve problems, documenting the methods and procedures used in program development, and testing and correcting programs. Work involves analyzing system outlines to develop programs for computer applications; writing solution programs; May train others. Works under general supervision with limited latitude for the use of initiative and independent judgment. Analyzes proposed computer applications in terms of equipment requirements and capabilities. Assists in developing solutions to software-related problems. May assist in the generation or installation of systems software. Prepares test data. May assist in writing and maintaining functional and technical specifications. Experience in computer programming work. Knowledge of the principles, practices, and techniques of computer programming and systems analysis, of computer operations procedures and systems, and of computer programming languages. Skill in the use of computer equipment. Ability to design programs and systems architecture; to prepare program specifications; to code, test, and debug computer programs; to interpret technical information relating to computer programming and other areas of data processing; and to communicate effectively. Developer II Assist in the logic behind and the data modeling associated with application development. Perform the development and/or programming, and implementation of information processing systems and applications that use current operating systems, programming languages and applications development tools, computer systems, multiprogramming technology, database management techniques, and data communications protocol. Work independently in support of joint applications development efforts. Responsible for writing application software, data manipulation, databases programming, testing and implementation, technical and user documentation, software conversions; environments include, but are not limited to, mainframe, mid-range, personal computers, laptops, mobile devices, and other emerging technology platforms. Requires: Four-year college degree. Minimum of 2 years of relevant experience. College degree requirements may be substituted for comparable work experience. Developer IV Assist in the logic behind and the data modeling associated with application development. Perform the development and/or programming, and implementation of information processing systems and applications that use current operating systems, programming languages and applications development tools, computer systems, multiprogramming technology, database management techniques, and data communications protocol. Work independently in support of joint applications development efforts. Responsible for writing application software, data manipulation, databases programming, testing and implementation, technical and user documentation, software conversions; environments include, but are not limited to, mainframe, mid-range, personal computers, laptops, mobile devices, and other emerging technology platforms. Requires: Four-year college degree. Minimum of 4 years of relevant experience. College degree requirements may be substituted for comparable work experience. Developer - Principal Page 3 of 13

GSA Schedule Price List Assist in the logic behind and the data modeling associated with application development. Perform the development and/or programming, and implementation of information processing systems and applications that use current operating systems, programming languages and applications development tools, computer systems, multiprogramming technology, database management techniques, and data communications protocol. Work independently in support of joint applications development efforts. Responsible for writing application software, data manipulation, databases programming, testing and implementation, technical and user documentation, software conversions; environments include, but are not limited to, mainframe, mid-range, personal computers, laptops, mobile devices, and other emerging technology platforms. Requires: Four-year college degree. Minimum of 10 years of relevant experience. College degree requirements may be substituted for comparable work experience. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. System Analyst Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system. Studies existing information processing systems to evaluate effectiveness and develops new systems to improve production or specifications as required. Prepares specifications to detail operations to be performed by equipment and computer programs and operations to be performed by personnel in system. Conducts studies pertaining to development of new information systems to meet current and projected needs. Plans and prepares technical reports, memoranda, and instructional manuals as documentation of program development. Upgrades system and corrects errors to maintain system after implementation. May assist computer programmer in resolution of work problems related to project specifications, or programming. May direct and coordinate work of others to develop, test, install, and modify programs. Provides technical assistance and support for applications and hardware problems and for information sharing with external entities in a customer service environment. Provides field coordination and planning for the effective use of management information systems. Determines operational, technical, and support requirements for the location, installation, operation, and maintenance of various office equipment and systems. Prepares charts, diagrams, tables, and flowcharts. Details input and output record formats for computer programs. Assists in formulating logical descriptions of problems and devising optimum solutions. Assists in the design, development, and maintenance of various computer applications. May provide support and make recommendations for information technology systems processes associated with software technology planning, development, implementation, system security, and interfaces. Graduation from an accredited four-year college or university with major course work in computer science, computer information systems, or management information systems is generally preferred. Knowledge of the limitations and capabilities of computer systems and of the techniques used in the design of non-automated systems, of information technology equipment, of applicable programming languages, of computer hardware and software, of computer operating systems, of writing program code, and of automated mapping. Ability to analyze systems and procedures, to write and revise standards and procedures, to communicate effectively, and to train others. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Page 4 of 13

GSA Schedule Price List Software Test Analyst Develops, publishes, and implements test plans. Writes and maintains test automation. Evaluates, recommends, and implements automated test tools and strategies. Develops, maintains, and upgrades automated test scripts and architectures for application products. Also writes, implements, and reports status for system test cases for testing. Analyzes test cases and provides regular progress reports. Participates in the testing process through test review and analysis, test witnessing and certification of software. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Business Analyst Reviews, analyzes, and evaluates business systems and user needs. Formulates systems to parallel overall business strategies. Experienced with business process reengineering and identifying new applications of technology to business problems to make business more effective. Familiar with industry standard (including Legacy, Core, and Emerging technologies), business process mapping, and reengineering. Prepares solution options, risk identification, and financial analyses such as cost/benefit, ROI, buy/build, etc. Writes detailed description of user needs, program functions, and steps required to develop or modify computer programs. Prepare and document Functional and Technical Specifications for reporting and data warehouse work. Assist with business warehouse/intelligence support and enhancements. Develops RFPs. Assist in deployment and management of end-user reporting tools and platforms. Work with IT and business project teams to understand reporting and data warehousing requirements and propose solutions. Document and provide knowledge transfer to the rest of the Enterprise Reporting Team for all solutions. Reviews, analyzes, and evaluates business systems and user needs. Formulates systems to parallel overall business strategies. Has knowledge of commonly-used concepts, practices, and procedures within a particular field. Familiar with relational database concepts, and client-server concepts. Relies on limited experience and judgment to plan and accomplish goals. Performs a variety of tasks. Works under general supervision; typically reports to a project leader or manager. A certain degree of creativity and latitude is required. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Solutions Architect IV Contribute to the establishment and maintenance of an overall IT architecture relevant to and consistent with the company's business and technology direction and objectives. Design and develop new software products or major enhancements to existing software. Address problems of systems integration, compatibility, and multiple platforms. Develop information technology technical and application architectures and participates in setting technology direction and standards. Provide technical architectural design review for major business applications and technology initiatives. Facilitate linkage with key business areas by understanding enterprise requirements and by communicating architecture frameworks best practices and standards. Develop recommendations and requirements for legacy applications to evolve towards conformance with target architecture. Continually review the company's applications, workflow, systems, and network management and network infrastructure, for opportunities to improve Page 5 of 13

GSA Schedule Price List effectiveness and efficiency. Requires: Four-year college degree. Minimum of 6 years of relevant experience. College degree requirements may be substituted for comparable work experience. Solutions Architect Principal Contribute to the establishment and maintenance of an overall IT architecture relevant to and consistent with the company's business and technology direction and objectives. Design and develop new software products or major enhancements to existing software. Address problems of systems integration, compatibility, and multiple platforms. Develop information technology technical and application architectures and participates in setting technology direction and standards. Provide technical architectural design review for major business applications and technology initiatives. Facilitate linkage with key business areas by understanding enterprise requirements and by communicating architecture frameworks best practices and standards. Develop recommendations and requirements for legacy applications to evolve towards conformance with target architecture. Continually review the company's applications, workflow, systems, and network management and network infrastructure, for opportunities to improve effectiveness and efficiency. Requires: Four-year college degree. Minimum of 8 years of relevant experience. College degree requirements may be substituted for comparable work experience. Policy Analyst II "Provides expertise and assistance in policy formulation, analysis, regulation, rulemaking, enforcement and implementation. The policy analyst should be able to consider complex budgetary, legal, and substantive issues related to specific subject matter and is capable of explaining those issues for broader audiences. Requires: Fouryear college degree. Minimum of 4 years of relevant experience. College degree requirements may be substituted for comparable work experience. Policy Analyst IV "Provides expertise and assistance in policy formulation, analysis, regulation, rulemaking, enforcement and implementation. The policy analyst should be able to consider complex budgetary, legal, and substantive issues related to specific subject matter and is capable of explaining those issues for broader audiences. Requires: Fouryear college degree. Minimum of 8 years of relevant experience. College degree requirements may be substituted for comparable work experience. Policy Analyst Principal "Provides expertise and assistance in policy formulation, analysis, regulation, rulemaking, enforcement and implementation. The policy analyst should be able to consider complex budgetary, legal, and substantive issues related to specific subject matter and is capable of explaining those issues for broader audiences. Requires: Fouryear college degree. Minimum of 12 years of relevant experience. College degree requirements may be substituted for comparable work experience. Database Architect Designs and builds relational databases. Develops strategies for data acquisitions, archive recovery, and implementation of a database. Cleans and maintains the database by removing and deleting old data. Must be able to design, develop and manipulate database management systems, data warehouses and multidimensional databases. Requires a depth and breadth of database knowledge that shall help with formal design of relational databases and provides insight into strategic data manipulation. Responsible for making sure an organization's strategic goals are optimized through the use of enterprise data standards. This frequently involves creating and maintaining a centralized registry of metadata. Experience Senior: Page 6 of 13

GSA Schedule Price List 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Data Warehouse Architect Designs, implements and supports data warehousing. Implements business rules via stored procedures, middleware, or other technologies. Defines user interfaces and functional specifications. Responsible for verifying accuracy of data, and the maintenance and support of the data warehouse. Knowledge of data warehouse end-to-end implementation processes, from business requirement logical modeling, physical database design, ETL, end-user tools, database, SQL, performance tuning. Demonstrated problem resolution skills with team of persons, and strong leadership with implementation team Experience in data warehouse design and data modeling (both relational and dimensional) and development and maintenance of multi-dimensional data models. Development experience in implementation of data warehousing utilizing RDBMS. Understanding of data warehouse Metadata concepts, tools and different data warehouse methodologies. Expertise in SQL and proficiency in database tuning techniques. Responsible for the ongoing architecture and design of the data warehouse, data mart, and reporting environments. Develop strategies for flexibility and scalability, and define the future technical architecture direction for the business intelligence reporting physical environment. Responsible for proper selection of appropriate hardware, software, tools and system lifecycle techniques for the different components of the end-to-end data warehouse architecture including ETL, metadata, data profiling software, database platform, performance monitoring, reporting and analytic tools. Defining and documenting the technical architecture of the data warehouse, including the physical components and their functionality. Setting or enforcing standards and overall architecture for data warehouse systems. Monitoring the data warehousing industry and assisting in establishing the organization's data warehousing strategy and section of strategic warehousing tools and techniques. Ensuring compatibility of the different components of the DW architecture and ensuring alignment with broader IT strategies and goals. Ability to educate the project teams on the standards and architecture of each component of the data warehouse architecture. Very strong written and oral communication skills, including some presentation skills. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Database Administrator Responsible for data analysis and database management. Involved in maintenance, enhancement, designing of data dictionaries, physical and logical database models, and performance tuning. Knowledge of the utilities and production tools used for data storage management to support the Application Team. Coordinates physical changes to computer databases; codes, tests, and implements physical database, applying knowledge of data base management system. Designs logical and physical databases reviews description of changes to database design to understand how changes to be made affect physical data base (how data is stored in terms of physical characteristics, such as location, amount of space, and access method). Establishes physical database parameters. Codes database descriptions and specifies identifiers of database to database management system or directs others in coding database descriptions. Calculates optimum values for database parameters, such as amount of computer memory to be used by database, following manuals and using calculator. Specifies user access level for each segment of one or more data items, such as insert, replace, retrieve, or delete data. Specifies which users can access data bases and what data can be accessed by user. Tests and corrects errors, and refines changes to database. Enters codes to create production data base. Selects and enters codes of utility program to monitor database performance, such as distribution of records and amount of available memory. Directs programmers and analysts to make changes to data base management system. Reviews and corrects programs. Answers user questions. Confers with coworkers to determine impact of data base changes on other systems and staff cost for making changes to data base. Modifies data base programs to increase processing performance, referred to as performance tuning. Workers Page 7 of 13

GSA Schedule Price List typically specialize in one or more types of data base management systems. Providing assistance in the planning, development, maintenance, and monitoring of integrated database systems, and ensuring that the conceptual and design phases of new applications are consistent with the structural parameters within the database environment. Evaluates users' requests for new data elements and systems, incorporates them into the existing shared data environment, and provides technical assistance. Coordinates the use of data to ensure data integrity and control redundancy, loads databases, and reorganizes as needed. Performs data modeling and prototyping. Performs logical and physical data modeling, designs relational database models, and creates physical data models from logical data models. Performs security recovery procedures. Determines and implements database search strategies and storage requirements. Maintains data dictionary ensuring uniformity of definitions and sets standards for use of data dictionary. Monitors database performance and recommends efficiency improvements. Creates test database environment for applications section, including the creation of necessary libraries and procedures. Executes the procedures necessary to save, retrieve, and recover databases from hardware and software failures within established procedures. Assists with determining, implementing, and enhancing standards on database security and with monitoring agency disaster recovery procedures and systems. Assists with the installation of database software and with analyzing, designing, and implementing databases. Assists in benchmarking and threshold testing of databases and with establishing and controlling necessary database security. Assists in the selection of database management software. Experience in computer systems analysis or computer programming work. Knowledge of the principles, practices, and techniques of computer programming and systems design; of computer operations, systems, and procedures; of project control and cost estimating techniques; of computer programming languages; of data processing flowcharting techniques; of database structures and theories; and of current database technologies. Responsible for building/installing databases on servers/clients. Maintain and create users, nodes, instances, databases, tablespaces, containers, bufferpools and logs. Migrate data between databases. Extract data from one system into flat files and then load into the database without constraints. Write stored procedures, and triggers to populate data from non-constraints tables to normalized tables with constraints. Tune the database manager configuration, database configuration parameters like bufferpools, shared memory variables, I/O variables, application heap, database heap size, logs and sort area to increase performance of the system. Analyze the execution path of the query to determine the cost, indexing and cardinality. Write scripts to create instances, databases, scheduling online, offline backups and restoring databases. Implement Active Standby Clustering, database partitioning using utilities. Provide highly technical expertise and guidance in the design, implementation, operation and maintenance of database management systems (DBMS). Evaluate and recommend available DBMS products after matching requirements with system capabilities. Determine file organization, indexing methods, and security procedures for specific applications. Control the design and use of databases. Control the global view of databases, control the access to the databases, assure the safekeeping of the databases (from accidental or intentional damage or loss), and monitor the use of databases. Must be capable of defining all required database administration policies, procedures, standards, and guidelines. Is an authority on the design of databases and the use of database management systems. Evaluate and recommend available DBMS products after matching requirements with system capabilities. Prepare and deliver presentations on DBMS concepts. Requires: Four-year college degree. Minimum of 4 years of relevant experience. College degree requirements may be substituted for comparable work experience. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Project Manager Designs, plans, and coordinates work teams. Follows standard project management industry practices such as the PMI's framework. Understands business and technical objectives of a project and works closely with project sponsor. Creates project charter and work plan and tracks budget and schedule progress via appropriate metrics. Establishes project organization and methodologies and defines roles and responsibilities. Documents risks and develops mitigation plans. Manages scope. Creates and implements a communication plan. Builds an effective team, Page 8 of 13

GSA Schedule Price List assigns tasks to team members, and evaluates outcomes. Negotiates resources. Communicates to stakeholders and project sponsor. Identifies, tracks, and ensures resolution of issues and removal of barriers. Provides technical support to project team members. Handles complex application features and technical designs. Designs and implements the components required for complex application features. Generally manages a group of applications systems analysts. Relies on experience and judgment to plan and accomplish goals. Professional certification is highly desirable. May require specific PC, workstation, operating system, application or platform skills. Provides overall direction to the formulation, development, implementation, and delivery of a project. Exercises management responsibility over the achievement of performance, revenue, and profit objectives of a project and its contracts. Ensures that the project plan maintains tasks, schedules, estimates, and status, and disseminates information to team members and customers. Creates a structure and organization for the management of a complex environment with emphasis on quality, productivity, and consistency. Directs corrective actions in any area where performance falls below objectives. Arranges for the assignment of responsibility to other supporting facilities, business areas, and support functions, and monitors their performance. Self-directed and independent. Responsible for the coordination and completion of projects. Oversees all aspects of projects. Sets deadlines, assigns responsibilities, and monitors and summarizes progress of project. Prepares reports for upper management regarding status of project. Responsible for the timely execution of the various Task Order projects awarded under the master contract. Responsible for project planning, team composition, task allocation, task monitoring, task facilitation, risk management, disaster recovery, over viewing analysis/designing, programming, testing and technical and user documentation. Maintain project status documentation, give regular updates to the account manager, give technical presentations to the client representatives and periodically attend status meetings with the client representatives. Report to the Program Manager for the contract. Requires: Four-year college degree. Minimum of 7 years of relevant experience. College degree requirements may be substituted for comparable work experience. Deputy Project manager Responsible for the timely execution of the various Task Order projects awarded under the master contract. Responsible for project planning, team composition, task allocation, task monitoring, task facilitation, risk management, disaster recovery, over viewing analysis/designing, programming, testing and technical and user documentation. Maintain project status documentation, give regular updates to the account manager, give technical presentations to the client representatives and periodically attend status meetings with the client representatives. Report to the Program Manager for the contract. Requires: Four-year college degree. Minimum of 5 years of relevant experience. College degree requirements may be substituted for comparable work experience. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Project Lead The Project Lead shall have day to day responsibility for management of a project team, providing technical team leadership on complex projects. They are responsible for program design, coding, testing, debugging, documentation and support. They shall have full technical knowledge of all phases of applications systems analysis and programming. There may be multiple phases of the project for which they have responsibility. This person shall manage day-to-day execution of design, development, testing and implementation activities; actively encourage and facilitate communication between the business analysts, development, and QA teams; and ensure that system requirements are documented, complete, accurate and approved. This person shall ensure formal design reviews are held regularly for each iteration or code cycle and work with program leadership team to establish and manage the project iteration and release cycles and attend release planning meetings. This person shall manage development activities and coordinate technical and application components with other Company projects and applications; ensure that appropriate system support and maintenance documentation is complete, which includes support documentation for Help Desk support and maintenance staff. Page 9 of 13

GSA Schedule Price List This person shall also review release notes for accuracy, and work with Project Delivery Manager to determine project resource requirements. Responsible for the timely execution of the various Task Order projects awarded under the master contract. Responsible for project planning, team composition, task allocation, task monitoring, task facilitation, risk management, disaster recovery, over viewing analysis/designing, programming, testing and technical and user documentation. Maintain project status documentation, give regular updates to the account manager, give technical presentations to the client representatives and periodically attend status meetings with the client representatives. Report to the Program Manager for the contract. Requires: Four-year college degree. Minimum of 4 years of relevant experience. College degree requirements may be substituted for comparable work experience. Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Project Control Specialist Responsible for the timely execution of the various Task Order projects awarded under the master contract. Responsible for project planning, team composition, task allocation, task monitoring, task facilitation, risk management, disaster recovery, over viewing analysis/designing, programming, testing and technical and user documentation. Maintain project status documentation, give regular updates to the account manager, give technical presentations to the client representatives and periodically attend status meetings with the client representatives. Report to the Program Manager for the contract. Requires: Two-year college degree. Minimum of 4 years of relevant experience. College degree requirements may be substituted for comparable work experience. Technical Writer Prepare technical documentation, including but not limited to, Technical System Manuals, Operation Manuals, Training documents, functional specifications, test and validation reports, and software application documents. Requires: Four-year college degree. Minimum of 5 years of relevant experience. College degree requirements may be substituted for comparable work experience. Network Engineer Responsible for installing networking technologies and supporting networks. Assesses existing network configurations and makes recommendations based on product specifications. Configures equipment and software to meet business needs, trains others on the solution, and documents the solution for ongoing support. Functions as part of a team on larger projects, or individually provides the services on support visits or smaller projects. Provides technical support and assists with the design of network solutions. Requires experience in the technical services and support field as well as experience in network administration (DHCP, DNS, routers, firewall, etc.). Experience Senior: 8 or more years of experience, relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected. Network Administrator Install, configure, and support an organization's local area network (LAN), wide area network (WAN), and Internet system or a segment of a network system. Maintain network hardware and software. Monitor network to ensure Page 10 of 13