Posted Date : October 29,2022
Product (RFP/RFQ/RFI/Solicitation/Tender/Bid Etc.) ID : CSE-13939
Government Authority located in Jackson, Mississippi; USA based organization looking for expert vendor for cybersecurity protection systems and services.
[A] Budget: Looking for Proposals
[B] Scope of Service:
Vendor needs to provide cybersecurity protection systems and services to providing the highest quality on-call information technology consulting and managed services to supplement and augment network and cybersecurity teams to the government authority located in Jackson, MS.
- Must support automated runbooks and playbooks through security orchestration and automated response capabilities.
- Utilize a security operations center
- provide 24x7x365 live network monitoring
- Employ AI and machine learning and analytics techniques and mitigations recommendations.
- Integrate with multiple Real-Time Threat Analytics feeds
- Provide User and Entity Behavior Analytics
- Store security-related events for one year
- Provide Raw Log data for 30 days
- Real-time Security Posture Dashboard
- Provide Compliance reporting
- Provide Statistical Anomaly Detection
- Provide access to a managed portal for ticket management
- Provide Human Analysis by trained Cybersecurity Analysts
- Automated Incident Management and Mitigation
- API Integration with current and future hardware procured by JMAA In-depth Mitigation recommendations
- Access to the SOC Manager
- On-Demand Remote Analysis and Support
- Compromise Mitigation Actions
- Suspension of Active Directory accounts identified by SOC analysts as suspicious
- Initiate strong Active Directory lockout policies to stop brute force or dictionary attacks
- Block suspicious network traffic (inbound and outbound by IP, Port, or Protocol) via remote modification of the End-Customers associated firewall's access control list
- Block suspicious traffic from a specific country in the firewall
- Kill and block suspicious inbound connections originating from non-approved geographies or users
- Suspension of accounts detected as attempting privilege escalation Kill suspicious Server processes and applications (Windows and Linux) that might indicate a breach
- Implement Firewall Reverse Path Filtering if required on an associated.
[C] Eligibility:
- Onshore (US Only);
[D] Work Performance:
Not Applicabe
Budget :
Deadline to Submit Proposals: November 23,2022
Cost to Download This RFP/RFQ/RFI/Solicitation/Tender/Bid Document : 5 US$
Product (RFP/RFQ/RFI/Solicitation/Tender/Bid Etc.) ID : CSE-13939
Government Authority located in Jackson, Mississippi; USA based organization looking for expert vendor for cybersecurity protection systems and services.
[A] Budget: Looking for Proposals
[B] Scope of Service:
Vendor needs to provide cybersecurity protection systems and services to providing the highest quality on-call information technology consulting and managed services to supplement and augment network and cybersecurity teams to the government authority located in Jackson, MS.
- Must support automated runbooks and playbooks through security orchestration and automated response capabilities.
- Utilize a security operations center
- provide 24x7x365 live network monitoring
- Employ AI and machine learning and analytics techniques and mitigations recommendations.
- Integrate with multiple Real-Time Threat Analytics feeds
- Provide User and Entity Behavior Analytics
- Store security-related events for one year
- Provide Raw Log data for 30 days
- Real-time Security Posture Dashboard
- Provide Compliance reporting
- Provide Statistical Anomaly Detection
- Provide access to a managed portal for ticket management
- Provide Human Analysis by trained Cybersecurity Analysts
- Automated Incident Management and Mitigation
- API Integration with current and future hardware procured by JMAA In-depth Mitigation recommendations
- Access to the SOC Manager
- On-Demand Remote Analysis and Support
- Compromise Mitigation Actions
- Suspension of Active Directory accounts identified by SOC analysts as suspicious
- Initiate strong Active Directory lockout policies to stop brute force or dictionary attacks
- Block suspicious network traffic (inbound and outbound by IP, Port, or Protocol) via remote modification of the End-Customers associated firewall's access control list
- Block suspicious traffic from a specific country in the firewall
- Kill and block suspicious inbound connections originating from non-approved geographies or users
- Suspension of accounts detected as attempting privilege escalation Kill suspicious Server processes and applications (Windows and Linux) that might indicate a breach
- Implement Firewall Reverse Path Filtering if required on an associated.
[C] Eligibility:
- Onshore (US Only);
[D] Work Performance:
Not Applicabe
Budget :
Deadline to Submit Proposals: November 23,2022
Cost to Download This RFP/RFQ/RFI/Solicitation/Tender/Bid Document : 5 US$