Closed
Provision of ICT Security Services
Request tender documents
Save your time. You just request and we will send you the available documents.
Request for bid service
Save your time. You just request and we will arrange tender related all available documents to bid writers for the best possible quote.
Descriptions
The National Transport Authority is seeking a suitably qualified supplier for the provision of Security Resources, to manage and operate Information and Data Security activities and responsibilities on behalf of the Authority through a combination of on-site and off-site models (including off-shore).Indicative Security Resources roles include:a)Security Manager;b)Security Architect;c)Security Officer;d)Security Analyst; ande)Security Penetration Tester Additionally the Authority may have a requirement for our Supplier to manage the operational support of solutions in the Authority’s production environments.
Timeline
Published Date :
Deadline :
Contract Start :
Contract End :
Tender Regions
CPV Codes
48800000 - Information systems and servers
72800000 - Computer audit and testing services
72315200 - Data network management services
72700000 - Computer network services
79710000 - Security services
72000000 - IT services: consulting, software development, Internet and support
72315000 - Data network management and support services
72820000 - Computer testing services
72212730 - Security software development services
72600000 - Computer support and consultancy services
72212732 - Data security software development services
72212731 - File security software development services
72222000 - Information systems or technology strategic review and planning services
72610000 - Computer support services
Keywords
IT auditing
mobile patrol
IT consulting
asset security
node monitoring
desktop aid
web services
static guarding
network support
cloud services
software testing
systems aid
risk evaluation
LAN/WAN setup
stress testing
IT outsourcing
subnet management
future-state design
IT support consulting
computing guidance
systems assistance
client-computer support
managed switch support
user support solutions
anonymization tools
IP routing services
software development
cybersecurity support
corporate security
roadmap development
diagnostic network tools
usability assessments
system uptime monitoring
compatibility testing
client-server middleware
IT support services
application maintenance
network configuration
file shredding utilities
automated script testing
document security layers
file integrity checker
error detection routines
digital quality control
technical IT consultancy
property protection
penetration testing
premises security
maturity modeling
infrastructure security
performance benchmarking
IT governance framework
server lifecycle manager
routing optimization
help desk services
service-level tracking
digital transformation
remote support services
technical assistance
audit trail generation
technical support
IT strategy planning
cybersecurity assessment
software QA testing
traffic flow regulation
real-time usage tracking
system troubleshooting
network traffic control
tech advisory services
bandwidth allocation
network administration
computing assistance
connectivity solutions
hardware diagnostics
network architecture
security services
guarding services
system integration
software customization
tokenization systems
test environment setup
system deployment suite
secure backup encryption
data encryption modules
capability assessment
security auditing tools
user acceptance testing
access control system
hybrid support services
file encryption tool
secure coding practices
tamper detection modules
interconnection services
architecture planning
enterprise network integration
technical incident resolution
technology investment planning
server provisioning engine
secure archiving routines
IT infrastructure management
threat detection algorithms
encryption engine development
infrastructure surveillance
network integrity support
data center orchestration tool
high-availability system platform
file access control systems
system certification support
compliance-based access control
IT infrastructure oversight
digital certificate handling
vulnerability scanning tools
service monitoring dashboard
cybersecurity programming
permission management APIs
secure file transfer modules
enterprise information platform
virtual network assistance
server virtualization manager
professional tech consultation
control panel configuration
secure communication infrastructure
data transmission support
secure data transmission protocols
server infrastructure management
network configuration management
wireless network deployment
strategic alignment workshops
intrusion prevention logic
secure authentication modules
operational support advisory
enterprise network troubleshooting
technology troubleshooting consultancy
data loss prevention (DLP)
regression test execution
system compliance verification
intrusion detection system
digital transformation roadmap
connection matrix control
real-time data protection
regulatory audit preparation
digital signature verification
security officer deployment
Workflows
Status :
Procedure :
Suitable for SME :
Nationwide :
Assign to :
Tender Progress :
Details
Notice Type :
Buyer Information
Name :