Closed
Provision of ICT Security Services
Descriptions
The National Transport Authority is seeking a suitably qualified supplier for the provision of Security Resources, to manage and operate Information and Data Security activities and responsibilities on behalf of the Authority through a combination of on-site and off-site models (including off-shore).Indicative Security Resources roles include:a)Security Manager;b)Security Architect;c)Security Officer;d)Security Analyst; ande)Security Penetration Tester Additionally the Authority may have a requirement for our Supplier to manage the operational support of solutions in the Authority’s production environments.
Timeline
Published Date :
Deadline :
Contract Start :
Contract End :
Tender Regions
CPV Codes
48800000 - Information systems and servers
72800000 - Computer audit and testing services
72315200 - Data network management services
72700000 - Computer network services
79710000 - Security services
72000000 - IT services: consulting, software development, Internet and support
72315000 - Data network management and support services
72820000 - Computer testing services
72212730 - Security software development services
72600000 - Computer support and consultancy services
72212732 - Data security software development services
72212731 - File security software development services
72222000 - Information systems or technology strategic review and planning services
72610000 - Computer support services
Keywords
enterprise information platform
server infrastructure management
data center orchestration tool
server virtualization manager
client-server middleware
high-availability system platform
server lifecycle manager
service monitoring dashboard
server provisioning engine
system deployment suite
IT consulting
software development
web services
network support
system integration
IT infrastructure management
digital transformation
cloud services
cybersecurity support
application maintenance
helpdesk services
technical support
software customization
IT outsourcing
cybersecurity programming
secure authentication modules
threat detection algorithms
access control systems
encryption engine development
security auditing tools
intrusion prevention logic
secure coding practices
digital certificate handling
vulnerability scanning tools
file encryption tools
secure file transfer modules
file access control systems
digital signature verification
file integrity checkers
secure archiving routines
tamper detection modules
permission management APIs
file shredding utilities
document security layers
data encryption modules
anonymization tools
secure data transmission protocols
tokenization systems
compliance-based access control
intrusion detection systems
real-time data protection
data loss prevention (DLP)
secure backup encryption
audit trail generation
IT strategy planning
roadmap development
capability assessment
digital transformation roadmap
IT governance framework
technology investment planning
maturity modeling
strategic alignment workshops
architecture planning
future-state design
network configuration management
infrastructure surveillance
node monitoring
network integrity support
traffic flow regulation
diagnostic network tools
interconnection services
managed switch support
virtual network assistance
enterprise network troubleshooting
network administration
control panel configuration
system uptime monitoring
service-level tracking
bandwidth allocation
connection matrix control
real-time usage tracking
IT infrastructure oversight
routing optimization
subnet management
IT support consulting
tech advisory services
systems assistance
computing guidance
technology troubleshooting consultancy
operational support advisory
technical IT consultancy
hybrid support services
professional tech consultation
systems aid
IT support services
technical assistance
system troubleshooting
user support solutions
desktop aid
remote support services
technical incident resolution
client-computer support
computing assistance
network configuration
LAN/WAN setup
data transmission support
network architecture
secure communication infrastructure
connectivity solutions
IP routing services
wireless network deployment
network traffic control
enterprise network integration
IT auditing
software testing
system compliance verification
hardware diagnostics
penetration testing
system certification support
risk evaluation
cybersecurity assessment
digital quality control
regulatory audit preparation
software QA testing
stress testing
performance benchmarking
user acceptance testing
compatibility testing
usability assessments
test environment setup
regression test execution
automated script testing
error detection routines
security services
guarding services
property protection
asset security
premises security
security officer deployment
static guarding
mobile patrol
corporate security
infrastructure security
Tender Lot Details
2 Tender Lots
Workflows
Status :
Procedure :
Suitable for SME :
Nationwide :
Assign to :
Tender Progress :
Details
Notice Type :
Tender Identifier :
Tenderbase ID :
Low Value :
High Value :
Buyer Information
Name :
Procurement contact
Name :
Phone :
Email :
Possible Competitors
1 Possible Competitors