Closed

Provision of ICT Security Services

Descriptions

The National Transport Authority is seeking a suitably qualified supplier for the provision of Security Resources, to manage and operate Information and Data Security activities and responsibilities on behalf of the Authority through a combination of on-site and off-site models (including off-shore).Indicative Security Resources roles include:a)Security Manager;b)Security Architect;c)Security Officer;d)Security Analyst; ande)Security Penetration Tester Additionally the Authority may have a requirement for our Supplier to manage the operational support of solutions in the Authority’s production environments.

Timeline

Published Date :

14th May 2021 4 years ago

Deadline :

14th Jun 2021 4 years ago

Contract Start :

N/A

Contract End :

N/A

Tender Regions

Keywords

IT auditing

mobile patrol

IT consulting

asset security

node monitoring

desktop aid

web services

static guarding

network support

cloud services

software testing

systems aid

risk evaluation

LAN/WAN setup

stress testing

IT outsourcing

subnet management

future-state design

IT support consulting

computing guidance

systems assistance

client-computer support

managed switch support

user support solutions

anonymization tools

IP routing services

software development

cybersecurity support

corporate security

roadmap development

diagnostic network tools

usability assessments

system uptime monitoring

compatibility testing

client-server middleware

IT support services

application maintenance

network configuration

file shredding utilities

automated script testing

document security layers

file integrity checker

error detection routines

digital quality control

technical IT consultancy

property protection

penetration testing

premises security

maturity modeling

infrastructure security

performance benchmarking

IT governance framework

server lifecycle manager

routing optimization

help desk services

service-level tracking

digital transformation

remote support services

technical assistance

audit trail generation

technical support

IT strategy planning

cybersecurity assessment

software QA testing

traffic flow regulation

real-time usage tracking

system troubleshooting

network traffic control

tech advisory services

bandwidth allocation

network administration

computing assistance

connectivity solutions

hardware diagnostics

network architecture

security services

guarding services

system integration

software customization

tokenization systems

test environment setup

system deployment suite

secure backup encryption

data encryption modules

capability assessment

security auditing tools

user acceptance testing

access control system

hybrid support services

file encryption tool

secure coding practices

tamper detection modules

interconnection services

architecture planning

enterprise network integration

technical incident resolution

technology investment planning

server provisioning engine

secure archiving routines

IT infrastructure management

threat detection algorithms

encryption engine development

infrastructure surveillance

network integrity support

data center orchestration tool

high-availability system platform

file access control systems

system certification support

compliance-based access control

IT infrastructure oversight

digital certificate handling

vulnerability scanning tools

service monitoring dashboard

cybersecurity programming

permission management APIs

secure file transfer modules

enterprise information platform

virtual network assistance

server virtualization manager

professional tech consultation

control panel configuration

secure communication infrastructure

data transmission support

secure data transmission protocols

server infrastructure management

network configuration management

wireless network deployment

strategic alignment workshops

intrusion prevention logic

secure authentication modules

operational support advisory

enterprise network troubleshooting

technology troubleshooting consultancy

data loss prevention (DLP)

regression test execution

system compliance verification

intrusion detection system

digital transformation roadmap

connection matrix control

real-time data protection

regulatory audit preparation

digital signature verification

security officer deployment

Let’s Get you Started ✍

Get to see all tender details more briefly

Already have an account ?

Workflows

Status :

Closed

Procedure :

Restricted Procedure (OJEU)

Suitable for SME :

N/A

Nationwide :

No

Assign to :

Tender Progress :

0%

Details

Notice Type :

Tender

Tender Identifier :

IT-378-246-T: 2024 - 001

Tenderbase ID :

310724019

Low Value :

£100K

High Value :

£1000K

Buyer Information

Address :

Liverpool Merseyside , Merseyside , L13 0BQ

Website :

N/A

Procurement Contact

Name :

Tina Smith

Phone :

0151 252 3243

Email :

tina.smith@shared-ed.ac.uk