08.02.2014 Views

FEDERAL SUPPLY SERVICE Federal Network Systems LLC - Verizon

FEDERAL SUPPLY SERVICE Federal Network Systems LLC - Verizon

FEDERAL SUPPLY SERVICE Federal Network Systems LLC - Verizon

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>FEDERAL</strong> <strong>SUPPLY</strong> <strong>SERVICE</strong><br />

AUTHORIZED INFORMATION TECHNOLOGY SCHEDULE<br />

PRICELIST<br />

GENERAL PURPOSE COMMERCIAL INFORMATION<br />

TECHNOLOGY EQUIPMENT, SOFTWARE AND <strong>SERVICE</strong>S<br />

Special Item No.<br />

132-33 Perpetual Software Licenses<br />

132-34 Maintenance of General Purpose Commercial<br />

Information Technology Software<br />

132-51 Information Technology (IT) Professional Services<br />

FPDS Code D301 - IT Facility Operation and Maintenance<br />

FPDS Code D302 - IT <strong>Systems</strong> Development Services<br />

FPDS Code D306 - IT <strong>Systems</strong> Analysis Services<br />

FPDS Code D307 - Automated Information <strong>Systems</strong> Design and<br />

Integration Services<br />

FPDS Code D316- IT <strong>Network</strong> Management Services<br />

<strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong><br />

Corporate Headquarters:<br />

1300 North 17 th Street, Suite 1200<br />

Arlington, VA 22209<br />

(703) 284-4600<br />

http://www.verizon.com/fns<br />

Contract Number:<br />

GS-35F-0440N<br />

Contract Period: March 25, 2003 – March 24, 2008<br />

Pricelist Current Through Modification # n/a<br />

Dated: n/a<br />

General Services Administration<br />

<strong>Federal</strong> Supply Service<br />

Products and ordering information in this Authorized INFORMATION TECHNOLOGY Schedule Pricelist<br />

is also available on the GSA Advantage! System. Agencies can browse GSA Advantage! By accessing<br />

GSA's Home Page via Internet at www.gsa.gov.<br />

All non-professional labor categories must be incidental to and used solely to support hardware,<br />

software and/or professional services, and cannot be purchased separately.


TABLE OF CONTENTS<br />

INFORMATION FOR ORDERING OFFICES..............................................................................................2<br />

TERMS AND CONDITIONS APPLICABLE TO PERPETUAL SOFTWARE LICENSES (SPECIAL<br />

ITEM NUMBER 132-33) AND MAINTENANCE OF GENERAL PURPOSE COMMERCIAL<br />

INFORMATION TECHNOLOGY SOFTWARE (SPECIAL ITEM NUMBER 132-34)............................10<br />

SOFTWARE PRODUCT DESCRIPTION ...................................................................................................12<br />

TERMS AND CONDITIONS APPLICABLE TO INFORMATION TECHNOLOGY (IT)<br />

PROFESSIONAL <strong>SERVICE</strong>S (SPECIAL ITEM NUMBER 132-51) .........................................................15<br />

IT <strong>SERVICE</strong>S DESCRIPTIONS ..................................................................................................................19<br />

IT LABOR CATEGORY DESCRIPTIONS .................................................................................................30<br />

IT <strong>SERVICE</strong>S HOURLY RATES ................................................................................................................56


INFORMATION FOR ORDERING OFFICES<br />

APPLICABLE TO ALL SPECIAL ITEM NUMBERS<br />

SPECIAL NOTICE TO AGENCIES: Small Business Participation<br />

SBA strongly supports the participation of small business concerns in the <strong>Federal</strong> Supply Schedules<br />

Program. To enhance Small Business Participation SBA policy allows agencies to include in their<br />

procurement base and goals, the dollar value of orders expected to be placed against the <strong>Federal</strong> Supply<br />

Schedules, and to report accomplishments against these goals.<br />

For orders exceeding the micropurchase threshold, FAR 8.404 requires agencies to consider the<br />

catalogs/pricelists of at least three schedule contractors or consider reasonably available information by<br />

using the GSA Advantage! on-line shopping service (www.fss.gsa.gov). The catalogs/pricelists, GSA<br />

Advantage! and the <strong>Federal</strong> Supply Service Home Page (www.fss.gsa.gov) contain information on a<br />

broad array of products and services offered by small business concerns.<br />

This information should be used as a tool to assist ordering activities in meeting or exceeding established<br />

small business goals. It should also be used as a tool to assist in including small, small disadvantaged, and<br />

women-owned small businesses among those considered when selecting pricelists for a best value<br />

determination.<br />

For orders exceeding the micropurchase threshold, customers are to give preference to small business<br />

concerns when two or more items at the same delivered price will satisfy their requirement.<br />

1. Geographic Scope of Contract:<br />

The geographic scope of the contract is the 48 contiguous states, Hawaii, Alaska, and the District of<br />

Columbia<br />

2. Contractor's Ordering Address and Payment Information:<br />

Ordering Address:<br />

Tony Traina<br />

1300 North 17 th Street, Suite 1200<br />

Arlington, VA 22209<br />

Payment Address:<br />

<strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong><br />

C/O Wachovia Bank<br />

P.O. Box 101761<br />

Atlanta, GA 30392-1761<br />

Account # 1861-087125<br />

Contractors are required to accept the Government purchase card for payments equal to or less than the<br />

micro-purchase threshold for oral or written delivery orders. Government purchase cards will be acceptable<br />

for payment above the micro-purchase threshold. In addition, bank account information for wire transfer<br />

payments will be shown on the invoice. The following telephone number(s) can be used by ordering<br />

agencies to obtain technical and/or ordering assistance:<br />

For ordering assistance: (703) 284-4600


3. LIABILITY FOR INJURY OR DAMAGE<br />

The Contractor shall not be liable for any injury to Government personnel or damage to Government<br />

property arising from the use of equipment maintained by the Contractor, unless such injury or damage is<br />

due to the fault or negligence of the Contractor.<br />

4. Statistical Data for Government Ordering Office Completion of Standard Form 279:<br />

Block 9: G. Order/Modification Under <strong>Federal</strong> Schedule<br />

Block 16: Data Universal Numbering System (DUNS) Number: 13-342-4023<br />

Block 30: Type of Contractor - C. Large Business<br />

Block 31: Woman-Owned Small Business – No<br />

Block 36: Contractor's Taxpayer Identification Number (TIN): 04-350-6726<br />

4a. CAGE Code: 1PTG2<br />

4b. Contractor has with the Central Contractor Registration Database.<br />

5. FOB Destination<br />

6. DELIVERY SCHEDULE<br />

a. TIME OF DELIVERY: The Contractor shall deliver to destination within the number of calendar<br />

days after receipt of order (ARO), as set forth below:<br />

SPECIAL ITEM NUMBER<br />

DELIVERY TIME (Days ARO)<br />

132-51 As mutually agreed by the ordering agency and FNS<br />

132-33, 132-34 30 Days<br />

b. URGENT REQUIREMENTS: When the <strong>Federal</strong> Supply Schedule contract delivery period does<br />

not meet the bona fide urgent delivery requirements of an ordering agency, agencies are encouraged, if time<br />

permits, to contact the Contractor for the purpose of obtaining accelerated delivery. The Contractor shall<br />

reply to the inquiry within three (3) workdays after receipt. (Telephonic replies shall be confirmed by the<br />

Contractor in writing.) If the Contractor offers an accelerated delivery time acceptable to the ordering<br />

agency, any order(s) placed pursuant to the agreed upon accelerated delivery time frame shall be delivered<br />

within this shorter delivery time and in accordance with all other terms and conditions of the contract.<br />

7. Discounts: Prices shown are NET Prices; Basic Discounts have been deducted.<br />

a. Prompt Payment: net thirty (30) days from receipt of invoice or date of acceptance,<br />

whichever is later<br />

b. Quantity: None<br />

c. Dollar Volume: None<br />

d. Government Educational Institutions: Government Educational institutions are offered<br />

the same discounts as all other Government customers.<br />

e. Other: None


8. Trade Agreements Act of 1979, as amended:<br />

All items are U.S. made end products, designated country end products, Caribbean Basin country end<br />

products, Canadian end products, or Mexican end products as defined in the Trade Agreements Act of<br />

1979, as amended.<br />

9. Statement Concerning Availability of Export Packing:<br />

NetFacade is not available outside of the United States<br />

10. Small Requirements: The minimum dollar value of orders to be issued is $100.<br />

11. Maximum Order<br />

a. The Maximum Order value for the following Special Item Numbers (SINs) is $500,000:<br />

Special Item Number 132-33 - Perpetual Software Licenses<br />

Special Item Number 132-51 - Information Technology (IT) Professional Services<br />

Note: Maximum Orders do not apply to Special Item Number 132-34 Maintenance of Software.<br />

12. USE OF <strong>FEDERAL</strong> <strong>SUPPLY</strong> <strong>SERVICE</strong> INFORMATION TECHNOLOGY SCHEDULE<br />

CONTRACTS. In accordance with FAR 8.404:<br />

[NOTE: Special ordering procedures have been established for Special Item Numbers (SINs) 132-51<br />

IT Professional Services and 132-52 EC Services; refer to the terms and conditions for those SINs.]<br />

Orders placed pursuant to a Multiple Award Schedule (MAS), using the procedures in FAR 8.404, are<br />

considered to be issued pursuant to full and open competition. Therefore, when placing orders under<br />

<strong>Federal</strong> Supply Schedules, ordering offices need not seek further competition, synopsize the requirement,<br />

make a separate determination of fair and reasonable pricing, or consider small business set-asides in<br />

accordance with subpart 19.5. GSA has already determined the prices of items under schedule contracts to<br />

be fair and reasonable. By placing an order against a schedule using the procedures outlined below, the<br />

ordering office has concluded that the order represents the best value and results in the lowest overall cost<br />

alternative (considering price, special features, administrative costs, etc.) to meet the Government’s needs.<br />

a. Orders placed at or below the micro-purchase threshold. Ordering offices can place orders at or<br />

below the micro-purchase threshold with any <strong>Federal</strong> Supply Schedule Contractor.<br />

b. Orders exceeding the micro-purchase threshold but not exceeding the maximum order threshold.<br />

Orders should be placed with the Schedule Contractor that can provide the supply or service that represents<br />

the best value. Before placing an order, ordering offices should consider reasonably available information<br />

about the supply or service offered under MAS contracts by using the “GSA Advantage!” on-line shopping<br />

service, or by reviewing the catalogs/pricelists of at least three Schedule Contractors and selecting the<br />

delivery and other options available under the schedule that meets the agency’s needs. In selecting the<br />

supply or service representing the best value, the ordering office may consider --<br />

(1) Special features of the supply or service that are required in effective program<br />

performance and that are not provided by a comparable supply or service;<br />

(2) Trade-in considerations;<br />

(3) Probable life of the item selected as compared with that of a comparable item;<br />

(4) Warranty considerations;<br />

(5) Maintenance availability;


(6) Past performance; and<br />

(7) Environmental and energy efficiency considerations.<br />

c. Orders exceeding the maximum order threshold. Each schedule contract has an established<br />

maximum order threshold. This threshold represents the point where it is advantageous for the ordering<br />

office to seek a price reduction. In addition to following the procedures in paragraph b, above, and before<br />

placing an order that exceeds the maximum order threshold, ordering offices shall --<br />

Review additional Schedule Contractors’<br />

(1) Catalogs/pricelists or use the “GSA Advantage!” on-line shopping service;<br />

(2) Based upon the initial evaluation, generally seek price reductions from the Schedule<br />

Contractor(s) appearing to provide the best value (considering price and other factors); and<br />

(3) After price reductions have been sought, place the order with the Schedule Contractor<br />

that provides the best value and results in the lowest overall cost alternative. If further price<br />

reductions are not offered, an order may still be placed, if the ordering office determines that it is<br />

appropriate.<br />

NOTE: For orders exceeding the maximum order threshold, the Contractor may:<br />

(1) Offer a new lower price for this requirement (the Price Reductions clause is not<br />

applicable to orders placed over the maximum order in FAR 52.216-19 Order Limitations);<br />

(2) Offer the lowest price available under the contract; or<br />

(3) Decline the order (orders must be returned in accordance with FAR 52.216-19).<br />

d. Blanket purchase agreements (BPAs). The establishment of <strong>Federal</strong> Supply Schedule BPAs is<br />

permitted when following the ordering procedures in FAR 8.404. All schedule contracts contain BPA<br />

provisions. Ordering offices may use BPAs to establish accounts with Contractors to fill recurring<br />

requirements. BPAs should address the frequency of ordering and invoicing, discounts, and delivery<br />

locations and times.<br />

e. Price reductions. In addition to the circumstances outlined in paragraph c, above, there may be<br />

instances when ordering offices will find it advantageous to request a price reduction. For example, when<br />

the ordering office finds a schedule supply or service elsewhere at a lower price or when a BPA is being<br />

established to fill recurring requirements, requesting a price reduction could be advantageous. The<br />

potential volume of orders under these agreements, regardless of the size of the individual order, may offer<br />

the ordering office the opportunity to secure greater discounts. Schedule Contractors are not required to<br />

pass on to all schedule users a price reduction extended only to an individual agency for a specific order.<br />

f. Small business. For orders exceeding the micro-purchase threshold, ordering offices should give<br />

preference to the items of small business concerns when two or more items at the same delivered price will<br />

satisfy the requirement.<br />

g. Documentation. Orders should be documented, at a minimum, by identifying the Contractor the<br />

item was purchased from, the item purchased, and the amount paid. If an agency requirement in excess of<br />

the micro-purchase threshold is defined so as to require a particular brand name, product, or feature of a<br />

product peculiar to one manufacturer, thereby precluding consideration of a product manufactured by<br />

another company, the ordering office shall include an explanation in the file as to why the particular brand<br />

name, product, or feature is essential to satisfy the agency’s needs.<br />

13. <strong>FEDERAL</strong> INFORMATION TECHNOLOGY/TELECOMMUNICATION STANDARDS<br />

REQUIREMENTS: <strong>Federal</strong> departments and agencies acquiring products from this Schedule must comply<br />

with the provisions of the <strong>Federal</strong> Standards Program, as appropriate (reference: NIST <strong>Federal</strong> Standards<br />

Index). Inquiries to determine whether or not specific products listed herein comply with <strong>Federal</strong><br />

Information Processing Standards (FIPS) or <strong>Federal</strong> Telecommunication Standards (FED-STDS), which<br />

are cited by ordering offices, shall be responded to promptly by the Contractor.


13.1 <strong>FEDERAL</strong> INFORMATION PROCESSING STANDARDS PUBLICATIONS (FIPS PUBS):<br />

Information Technology products under this Schedule that do not conform to <strong>Federal</strong> Information<br />

Processing Standards (FIPS) should not be acquired unless a waiver has been granted in accordance with<br />

the applicable "FIPS Publication." <strong>Federal</strong> Information Processing Standards Publications (FIPS PUBS)<br />

are issued by the U.S. Department of Commerce, National Institute of Standards and Technology (NIST),<br />

pursuant to National Security Act. Information concerning their availability and applicability should be<br />

obtained from the National Technical Information Service (NTIS), 5285 Port Royal Road, Springfield,<br />

Virginia 22161. FIPS PUBS include voluntary standards when these are adopted for <strong>Federal</strong> use.<br />

Individual orders for FIPS PUBS should be referred to the NTIS Sales Office, and orders for subscription<br />

service should be referred to the NTIS Subscription Officer, both at the above address, or telephone number<br />

(703) 487-4650.<br />

13.2 <strong>FEDERAL</strong> TELECOMMUNICATION STANDARDS (FED-STDS): Telecommunication<br />

products under this Schedule that do not conform to <strong>Federal</strong> Telecommunication Standards (FED-STDS)<br />

should not be acquired unless a waiver has been granted in accordance with the applicable "FED-STD."<br />

<strong>Federal</strong> Telecommunication Standards are issued by the U.S. Department of Commerce, National Institute<br />

of Standards and Technology (NIST), pursuant to National Security Act. Ordering information and<br />

information concerning the availability of FED-STDS should be obtained from the GSA, <strong>Federal</strong> Supply<br />

Service, Specification Section, 470 East L’Enfant Plaza, Suite 8100, SW, Washington, DC 20407,<br />

telephone number (202) 619-8925. Please include a self-addressed mailing label when requesting<br />

information by mail. Information concerning their applicability can be obtained by writing or calling the<br />

U.S. Department of Commerce, National Institute of Standards and Technology, Gaithersburg, MD 20899,<br />

telephone number (301) 975-2833.<br />

14. SECURITY REQUIREMENTS. In the event security requirements are necessary, the ordering<br />

activities may incorporate, in their delivery orders, a security clause in accordance with current laws,<br />

regulations, and individual agency policy; however, the burden of administering the security requirements<br />

shall be with the ordering agency. If any costs are incurred as a result of the inclusion of security<br />

requirements, such costs will not exceed ten percent (10%) or $100,000, of the total dollar value of the<br />

order, whichever is less.<br />

15. CONTRACT ADMINISTRATION FOR ORDERING OFFICES: Any ordering office, with<br />

respect to any one or more delivery orders placed by it under this contract, may exercise the same rights of<br />

termination as might the GSA Contracting Officer under provisions of FAR 52.212-4, paragraphs (l)<br />

Termination for the Government’s convenience, and (m) Termination for Cause (See C.1.).<br />

16. GSA Advantage!<br />

GSA Advantage! is an on-line, interactive electronic information and ordering system that provides on-line<br />

access to vendors' schedule prices with ordering information. GSA Advantage! will allow the user to<br />

perform various searches across all contracts including, but not limited to:<br />

(1) Manufacturer;<br />

(2) Manufacturer's Part Number; and<br />

(3) Product categories.<br />

Agencies can browse GSA Advantage! by accessing the Internet World Wide Web utilizing a browser (ex.:<br />

NetScape). The Internet address is http://www.fss.gsa.gov/.<br />

17. PURCHASE OF OPEN MARKET ITEMS<br />

NOTE: Open Market Items are also known as incidental items, noncontract items, non-Schedule items,<br />

and items not on a <strong>Federal</strong> Supply Schedule contract.<br />

For administrative convenience, an ordering office contracting officer may add items not on the <strong>Federal</strong><br />

Supply Multiple Award Schedule (MAS) -- referred to as open market items -- to a <strong>Federal</strong> Supply<br />

Schedule blanket purchase agreement (BPA) or an individual task or delivery order, only if --<br />

(1) All applicable acquisition regulations pertaining to the purchase of the items not on the<br />

<strong>Federal</strong> Supply Schedule have been followed (e.g., publicizing (Part 5), competition requirements


(Part 6), acquisition of commercial items (Part 12), contracting methods (Parts 13, 14, and 15),<br />

and small business programs (Part 19));<br />

(2) The ordering office contracting officer has determined the price for the items not on the<br />

<strong>Federal</strong> Supply Schedule is fair and reasonable;<br />

(3) The items are clearly labeled on the order as items not on the <strong>Federal</strong> Supply Schedule;<br />

and<br />

(4) All clauses applicable to items not on the <strong>Federal</strong> Supply Schedule are included in the<br />

order.<br />

18. CONTRACTOR COMMITMENTS, WARRANTIES AND REPRESENTATIONS<br />

a. For the purpose of this contract, commitments, warranties and representations include, in addition<br />

to those agreed to for the entire schedule contract:<br />

(1) Time of delivery/installation quotations for individual orders;<br />

(2) Technical representations and/or warranties of products concerning performance, total<br />

system performance and/or configuration, physical, design and/or functional characteristics and<br />

capabilities of a product/equipment/service/software package submitted in response to<br />

requirements which result in orders under this schedule contract.<br />

(3) Any representations and/or warranties concerning the products made in any literature,<br />

description, drawings and/or specifications furnished by the Contractor.<br />

b. The above is not intended to encompass items not currently covered by the GSA Schedule<br />

contract.<br />

19. OVERSEAS ACTIVITIES<br />

The terms and conditions of this contract shall apply to all orders for installation, maintenance and repair of<br />

equipment in areas listed in the pricelist outside the 48 contiguous states and the District of Columbia,<br />

except as indicated below:<br />

Upon request of the Contractor, the Government may provide the Contractor with logistics support, as<br />

available, in accordance with all applicable Government regulations. Such Government support will be<br />

provided on a reimbursable basis, and will only be provided to the Contractor's technical personnel whose<br />

services are exclusively required for the fulfillment of the terms and conditions of this contract.<br />

20. BLANKET PURCHASE AGREEMENTS (BPAs)<br />

<strong>Federal</strong> Acquisition Regulation (FAR) 13.303-1(a) defines Blanket Purchase Agreements (BPAs) as “…a<br />

simplified method of filling anticipated repetitive needs for supplies or services by establishing ‘charge<br />

accounts’ with qualified sources of supply.” The use of Blanket Purchase Agreements under the <strong>Federal</strong><br />

Supply Schedule Program is authorized in accordance with FAR 13.303-2(c)(3), which reads, in part, as<br />

follows:<br />

“BPAs may be established with <strong>Federal</strong> Supply Schedule Contractors, if not inconsistent with the terms of<br />

the applicable schedule contract.”<br />

<strong>Federal</strong> Supply Schedule contracts contain BPA provisions to enable schedule users to maximize their<br />

administrative and purchasing savings. This feature permits schedule users to set up “accounts” with<br />

Schedule Contractors to fill recurring requirements. These accounts establish a period for the BPA and<br />

generally address issues such as the frequency of ordering and invoicing, authorized callers, discounts,<br />

delivery locations and times. Agencies may qualify for the best quantity/volume discounts available under


the contract, based on the potential volume of business that may be generated through such an agreement,<br />

regardless of the size of the individual orders. In addition, agencies may be able to secure a discount higher<br />

than that available in the contract based on the aggregate volume of business possible under a BPA.<br />

Finally, Contractors may be open to a progressive type of discounting where the discount would increase<br />

once the sales accumulated under the BPA reach certain prescribed levels. Use of a BPA may be<br />

particularly useful with the new Maximum Order feature. See the Suggested Format, contained in this<br />

Schedule Pricelist, for customers to consider when using this purchasing tool.<br />

21. CONTRACTOR TEAM ARRANGEMENTS<br />

Contractors participating in contractor team arrangements must abide by all terms and conditions of their<br />

respective contracts. This includes compliance with Clauses 552.238-74, Contractor’s Reports of Sales and<br />

552.238-76, Industrial Funding Fee, i.e., each contractor (team member) must report sales and remit the IFF<br />

for all products and services provided under its individual contract.<br />

22. INSTALLATION, DEINSTALLATION, REINSTALLATION<br />

The Davis-Bacon Act (40 U.S.C. 276a-276a-7) provides that contracts in excess of $2,000 to which the<br />

United States or the District of Columbia is a party for construction, alteration, or repair (including painting<br />

and decorating) of public buildings or public works with the United States, shall contain a clause that no<br />

laborer or mechanic employed directly upon the site of the work shall received less than the prevailing<br />

wage rates as determined by the Secretary of Labor. The requirements of the Davis-Bacon Act do not<br />

apply if the construction work is incidental to the furnishing of supplies, equipment, or services. For<br />

example, the requirements do not apply to simple installation or alteration of a public building or public<br />

work that is incidental to furnishing supplies or equipment under a supply contract. However, if the<br />

construction, alteration or repair is segregable and exceeds $2,000, then the requirements of the Davis-<br />

Bacon Act applies.<br />

The requisitioning activity issuing the task order against this contract will be responsible for proper<br />

administration and enforcement of the <strong>Federal</strong> labor standards covered by the Davis-Bacon Act. The<br />

proper Davis-Bacon wage determination will be issued by the ordering activity at the time a request for<br />

quotations is made for applicable construction classified installation, deinstallation, and reinstallation<br />

services under SIN 132-8.<br />

23. SECTION 508 COMPLIANCE.<br />

If applicable, Section 508 compliance information on the supplies and services in this contract are available<br />

in Electronic and Information Technology (EIT) at the following:<br />

www.verizon.com/fns<br />

The EIT standard can be found at: www.Section508.gov/.<br />

24. PRIME CONTRACTOR ORDERING FROM <strong>FEDERAL</strong> <strong>SUPPLY</strong> SCHEDULES.<br />

Prime Contractors (on cost reimbursement contracts) placing orders under <strong>Federal</strong> Supply Schedules, on<br />

behalf of a <strong>Federal</strong> Agency, shall follow the terms of the applicable schedule and authorization and include<br />

with each order –<br />

(a) A copy of the authorization from the Agency with whom the contractor has the prime<br />

contract (unless a copy was previously furnished to the <strong>Federal</strong> Supply Schedule contractor); and<br />

(b) The following statement:<br />

This order is placed under written authorization from _______ dated _______. In the<br />

event of any inconsistency between the terms and conditions of this order and those of<br />

your <strong>Federal</strong> Supply Schedule contract, the latter will govern.


TERMS AND CONDITIONS APPLICABLE TO<br />

PERPETUAL SOFTWARE LICENSES (SPECIAL ITEM NUMBER 132-33) AND<br />

MAINTENANCE (SPECIAL ITEM NUMBER 132-34) OF GENERAL PURPOSE<br />

COMMERCIAL INFORMATION TECHNOLOGY SOFTWARE<br />

1. INSPECTION/ACCEPTANCE<br />

The Contractor shall only tender for acceptance those items that conform to the requirements of this<br />

contract. The Government reserves the right to inspect or test any software that has been tendered for<br />

acceptance. The Government may require repair or replacement of nonconforming software at no increase<br />

in contract price. The Government must exercise its post-acceptance rights (1) within a reasonable time<br />

after the defect was discovered or should have been discovered; and (2) before any substantial change<br />

occurs in the condition of the software, unless the change is due to the defect in the software.<br />

2. GUARANTEE/WARRANTY<br />

a. Unless specified otherwise in this contract, the Contractor’s standard commercial<br />

guarantee/warranty as stated in the contract’s commercial pricelist will apply to this contract.<br />

b. The Contractor does not warrant or imply merchantability or fitness for use for particular purpose.<br />

c. Limitation of Liability. Except as otherwise provided by an express or implied warranty, the<br />

Contractor will not be liable to the Government for consequential damages resulting from any defect or<br />

deficiencies in accepted items.<br />

3. TECHNICAL <strong>SERVICE</strong>S<br />

The Contractor, without additional charge to the Government, shall provide a hot line technical support<br />

number 1-800-334-1553 for the purpose of providing user assistance and guidance in the implementation of<br />

the software. The technical support number is available from 8:00 a.m. to 5:00 p.m., Monday through<br />

Friday. Eastern Time.<br />

4. SOFTWARE MAINTENANCE<br />

a. Software maintenance service shall include the following:<br />

NetFacade software maintenance includes Help Desk Hotline assistance via phone, Monday through<br />

Friday, 8:00 a.m. 5:00 p.m., and via email 24/7. This begins from the moment of installation through the<br />

length of the one year service agreement. A trouble ticket procedure is in place to report any problems<br />

which ensures all issues are addressed and closed out in a timely manner. Help Desk will support matters<br />

relating to both the operation and configuration of NetFacade in order to maximize its effectiveness.<br />

NetFacade technicians will assist in understanding log reporting features and analysis. A web site is<br />

available for support documents as well as to report problems/issues.<br />

b. Invoices for maintenance service shall be submitted by the Contractor on a quarterly or monthly<br />

basis, after the completion of such period. Maintenance charges must be paid in arrears (31 U.S.C. 3324).<br />

PROMPT PAYMENT DISCOUNT, IF APPLICABLE, SHALL BE SHOWN ON THE INVOICE. The<br />

NetFacade Software Maintenance, as described herein, is available at $5,385 per year, after the first<br />

year. The initial one year of maintenance is included in the price of the software license.


c. The Contractor agrees to provide updates and maintenance service for the software after a<br />

perpetual license has accrued, at the prices and terms of Special Item Number l32-34, if the licensee elects<br />

to order such services. Title to the software shall remain with the Contractor.<br />

5. UTILIZATION LIMITATIONS - (132-32, 132-33, AND 132-34)<br />

a. Software acquisition is limited to commercial computer software defined in FAR Part 2.101.<br />

b. When acquired by the Government, commercial computer software and related documentation so<br />

legend shall be subject to the following:<br />

(1) Title to and ownership of the software and documentation shall remain with the<br />

Contractor, unless otherwise specified.<br />

(2) Software licenses are by site and by agency. An agency is defined as a cabinet level or<br />

independent agency. The software may be used by any subdivision of the agency (service, bureau,<br />

division, command, etc.) that has access to the site the software is placed at, even if the<br />

subdivision did not participate in the acquisition of the software. Further, the software may be<br />

used on a sharing basis where multiple agencies have joint projects that can be satisfied by the use<br />

of the software placed at one agency's site. This would allow other agencies access to one<br />

agency's database. For Government public domain databases, user agencies and third parties may<br />

use the computer program to enter, retrieve, analyze and present data. The user agency will take<br />

appropriate action by instruction, agreement, or otherwise, to protect the Contractor's proprietary<br />

property with any third parties that are permitted access to the computer programs and<br />

documentation in connection with the user agency's permitted use of the computer programs and<br />

documentation. For purposes of this section, all such permitted third parties shall be deemed<br />

agents of the user agency.<br />

(3) Except as is provided in paragraph 8.b(2) above, the Government shall not provide or<br />

otherwise make available the software or documentation, or any portion thereof, in any form, to<br />

any third party without the prior written approval of the Contractor. Third parties do not include<br />

prime Contractors, subcontractors and agents of the government who have the Government's<br />

permission to use the licensed software and documentation at the facility, and who have agreed to<br />

use the licensed software and documentation only in accordance with these restrictions. This<br />

provision does not limit the right of the Government to use software, documentation, or<br />

information therein, which the Government may already have or obtains without restrictions.<br />

(4) The Government shall have the right to use the computer software and documentation<br />

with the computer for which it is acquired at any other facility to which that computer may be<br />

transferred, or in cases of disaster recovery, the Government has the right to transfer the software<br />

to another site if the Government site for which it is acquired is deemed to be unsafe for<br />

Government personnel; to use the computer software and documentation with a backup computer<br />

when the primary computer is inoperative; to copy computer programs for safekeeping (archives)<br />

or backup purposes; to transfer a copy of the software to another site for purposes of<br />

benchmarking new hardware and/or software; and to modify the software and documentation or<br />

combine it with other software, provided that the unmodified portions shall remain subject to these<br />

restrictions.<br />

(5) "Commercial Computer Software" may be marked with the Contractor's standard<br />

commercial restricted rights legend, but the schedule contract and schedule pricelist, including this<br />

clause, "Utilization Limitations" are the only governing terms and conditions, and shall take<br />

precedence and supersede any different or additional terms and conditions included in the standard<br />

commercial legend.


6. SOFTWARE CONVERSIONS - (132-32 AND 132-33)<br />

Full monetary credit will be allowed to the Government when conversion from one version of the software<br />

to another is made as the result of a change in operating system, or from one computer system to another.<br />

Under a perpetual license (132-33), the purchase price of the new software shall be reduced by the amount<br />

that was paid to purchase the earlier version.<br />

7. DESCRIPTIONS AND EQUIPMENT COMPATIBILITY<br />

NETFACADE SOFTWARE PRODUCT DESCRIPTION AND PRICING<br />

NetFacade Intrusion Detection technology provides a new alerting capability for use by network security<br />

or management personnel of an unauthorized intrusion onto your network. NetFacade adds an additional<br />

perimeter of monitoring for intrusions, it complements Firewalls and Intrusion Detection <strong>Systems</strong> and<br />

reduces the possibility of intrusions occurring without alerting to the activity. In addition, it has a secondary<br />

effect of distracting intruders from probing and attacking the real hosts on the network. NetFacade <br />

simulates network hosts running seemingly vulnerable services. A scan of the range of IP addresses<br />

NetFacade is simulating will return information on the simulated services as if they were real network<br />

services running on actual hosts. Since there are no actual users of these virtual network simulated hosts,<br />

all traffic to them is considered to be suspicious. All traffic to NetFacade is logged and then an alert of<br />

the activity that is occurring on the simulated hosts is sent to the security administrator/management<br />

personnel. These alerts can be configured at various levels and with specific response actions. Because of<br />

this capability NetFacade can identify all new and unknown attacks which can be tagged as new<br />

signatures for your Intrusion Detection <strong>Systems</strong> and Firewalls.<br />

NetFacade Version 1.3 now available includes:<br />

Intrusion Detection Features:<br />

Elimination of network bandwidth limitations since NetFacade has to be concerned only with the traffic<br />

going to its simulated hosts<br />

A high level of data reduction and low rate of false-positive type incidents since the all traffic to<br />

NetFacade is suspicious<br />

No limit on the number and types of attacks that are detected, including new and unknown types attacks<br />

Distraction of attackers away from the real hosts that NetFacade is protecting<br />

IP Filtering used to only allow access from specified administration workstations<br />

<strong>Network</strong> Simulation Features:<br />

Simulation of up to a Class C IP network of virtual hosts<br />

Simulates an entire Class C network or any subnet therein<br />

<strong>Network</strong> address space can be dedicated or an existing network can be used to "interleave" simulated hosts<br />

with actual hosts<br />

Appropriate responses to operating system fingerprint IP packets<br />

Host Simulation Features:<br />

Simulation of eight different operating systems:<br />

IOS 11.1(4) for Cisco Routers<br />

IRIX 1.0 for x86<br />

Redhat Linux 5.0 for x86<br />

Redhat Linux 5.1 for x86<br />

Solaris 2.5.1 for Sun Sparc<br />

Solaris 2.6 for Sun Sparc<br />

SunOS 4.1.4 for Sun Sparc<br />

Microsoft NT 4.0 for x86


Simulation of thirteen different services with versions appropriate for the different operating systems,<br />

including:<br />

FTP (wu-2.4.2-academ[BETA-12](1), System V Release 4.0, and SunOS4.1 versions)<br />

Telnet (appropriate versions for each operating system)<br />

SSH (SSH Communications Security Ltd's 1.2.26 and 2.0.9 versions)<br />

SMTP (SMI-4.1, ESMTP 8.8.7, ESMTP 8.9.1 and generic versions)<br />

HTTP (Apache 1.2.6, Netscape Enterprise 3.0, and Microsoft IIS 4.0 versions)<br />

IMAP (IMAP4rev1 v10.205, v10.223, v10.234 and v9.0(157) versions)<br />

Echo (UDP and TCP versions)<br />

Daytime (UDP and TCP versions)<br />

Finger<br />

Rlogin<br />

Portmap/tcpbind (UDP and TCP versions)<br />

Mountd (UDP and TCP versions)<br />

Rusers (UDP version)<br />

NFS<br />

Configuration/Monitoring Features:<br />

Configuration and monitoring performed through web-based interface<br />

Connections only allowed from specified workstations<br />

Session encrypted using SSL<br />

Connection authenticated using a username and password<br />

Friendly and flexible configuration of network, hosts, and simulated user accounts<br />

User-friendly configuration of alert recipients<br />

Interface for viewing logs<br />

Status report generation capability<br />

Logging Features:<br />

All activity to NetFacade is logged<br />

All logs record the source IP address<br />

Used to determine what the potential threat is to the rest of the system<br />

Activity is logged two ways<br />

All TCP/IP packets received or sent by the system are logged<br />

All service façades log the data they receive in hexadecimal and ASCII format for ease of determining the<br />

type of attack<br />

Activity logs stored in an a SQL database<br />

Web-based interface to activity reports<br />

Reporting based on user-defined parameters<br />

Alerting Features:<br />

Alerts accomplished via e-mail notification to configured list of recipients<br />

Recipients alerted periodically if any activity has been detected<br />

Frequency of alerts is configurable<br />

Alert includes a summary of the activity including the source IP addresses, the targeted service/port and the<br />

amount of traffic received<br />

Enhanced responsiveness to port sweeps<br />

Flexibility in attack recognition and forensics<br />

Automated attack recognition<br />

Multiple alerting methods<br />

Multiple alert levels<br />

Web-based configuration of alert levels and associated actions<br />

Web-based configuration of associating alert levels with specific types of activity<br />

Automated attack recognition tied to alerting<br />

Unknown attacks are identified and can be used as new attack signatures for IDSs and FWs<br />

Alerting based on the type of attack and the alert level configured for that type of attack


Hardware And Software Operating System Requirements:<br />

The NetFacade software is designed for a Sun Microsystems Ultra 5 running Sun Solaris 7.<br />

The recommended minimum configuration is as follows:<br />

333MHz<br />

128 MB RAM<br />

9 GB Hard Drive<br />

32 x CD-ROM<br />

To ensure the security of the NetFacade system, the Solaris 7 patches recommended by Sun should be<br />

installed. Please refer to the Solaris documentation for instructions on how to install the operating system<br />

and patches. Refer to the SunSolve Online Patch Access web site (sunsolve.sun.com/pubcgi/pubpatchpage.pl)<br />

for the latest list of available and recommended patches for Solaris 7.<br />

When installing the operating system, the file systems should be configured as follows to ensure the correct<br />

amount of disk space for NetFacade:<br />

File System Recommended Size<br />

/ 512 MB<br />

/usr<br />

default<br />

swap<br />

256 MB (2x memory size)<br />

overlap default<br />

/export/home remaining blocks<br />

NetFacade is a trademark of <strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong>, a <strong>Verizon</strong> Company, under license. All<br />

other marks are the properties of their respective owners.<br />

Pricing:<br />

1. NetFacade software version 1.3 - Virtual Intrusion Detection Technology (software), User's Guide,<br />

automatic version upgrades (initial year), help desk (initial year), training and remote<br />

installation/configuration support (initial year).<br />

$14,255<br />

8. RIGHT-TO-COPY PRICING<br />

The offer is for perpetual license software only: right-to-copy licensing is not offered.


TERMS AND CONDITIONS APPLICABLE TO INFORMATION<br />

TECHNOLOGY (IT)<br />

PROFESSIONAL <strong>SERVICE</strong>S (SPECIAL ITEM NUMBER 132-51)<br />

1. SCOPE<br />

a. The prices, terms and conditions stated under Special Item Number 132-51 Information<br />

Technology Professional Services and Special Item Number 132-52 Electronic Commerce Services apply<br />

exclusively to IT/EC Services within the scope of this Information Technology Schedule.<br />

b. The Contractor shall provide services at the Contractor’s facility and/or at the Government<br />

location, as agreed to by the Contractor and the ordering office.<br />

2. PERFORMANCE INCENTIVES<br />

a. When using a performance based statement of work, performance incentives may be agreed upon<br />

between the Contractor and the ordering office on individual fixed price orders or Blanket Purchase<br />

Agreements, for fixed price tasks, under this contract in accordance with this clause.<br />

b. The ordering office must establish a maximum performance incentive price for these services<br />

and/or total solutions on individual orders or Blanket Purchase Agreements.<br />

c. To the maximum extent practicable, ordering offices shall consider establishing incentives where<br />

performance is critical to the agency’s mission and incentives are likely to motivate the contractor.<br />

Incentives shall be based on objectively measurable tasks.<br />

d. The above procedures do not apply to Time and Material or labor hour orders.<br />

3. ORDERING PROCEDURES FOR <strong>SERVICE</strong>S (REQUIRING A STATEMENT OF WORK<br />

FAR 8.402 contemplates that GSA may occasionally find it necessary to establish special ordering<br />

procedures for individual <strong>Federal</strong> Supply Schedules or for some Special Item Numbers (SINs) within a<br />

Schedule. GSA has established special ordering procedures for services that require a Statement of Work.<br />

These special ordering procedures take precedence over the procedures in FAR 8.404 (b)(2) through (b)(3).<br />

GSA has determined that the prices for services contained in the contractor’s price list applicable to this<br />

Schedule are fair and reasonable. However, the ordering office using this contract is responsible for<br />

considering the level of effort and mix of labor proposed to perform a specific task being ordered and for<br />

making a determination that the total firm-fixed price or ceiling price is fair and reasonable.<br />

(a) When ordering services, ordering offices shall —<br />

(1) Prepare a Request (Request for Quote or other communication tool):<br />

(i) A statement of work (a performance-based statement of work is preferred) that<br />

outlines, at a minimum, the work to be performed, location of work, period of<br />

performance, deliverable schedule, applicable standards, acceptance criteria, and any<br />

special requirements (e.g., security clearances, travel, special knowledge, etc.) should be<br />

prepared.<br />

(ii) The request should include the statement of work and request the contractors to<br />

submit either a firm-fixed price or a ceiling price to provide the services outlined in the<br />

statement of work. A firm-fixed price order shall be requested, unless the ordering office<br />

makes a determination that it is not possible at the time of placing the order to estimate<br />

accurately the extent or duration of the work or to anticipate cost with any reasonable


degree of confidence. When such a determination is made, a labor hour or time-andmaterials<br />

proposal may be requested. The firm-fixed price shall be based on the rates in<br />

the schedule contract and shall consider the mix of labor categories and level of effort<br />

required to perform the services described in the statement of work. The firm-fixed price<br />

of the order should also include any travel costs or other incidental costs related to<br />

performance of the services ordered, unless the order provides for reimbursement of<br />

travel costs at the rates provided in the <strong>Federal</strong> Travel or Joint Travel Regulations. A<br />

ceiling price must be established for labor-hour and time-and-materials orders.<br />

(iii) The request may ask the contractors, if necessary or appropriate, to submit a<br />

project plan for performing the task, and information on the contractor’s experience<br />

and/or past performance performing similar tasks.<br />

(iv) The request shall notify the contractors what basis will be used for selecting the<br />

contractor to receive the order. The notice shall include the basis for determining whether<br />

the contractors are technically qualified and provide an explanation regarding the<br />

intended use of any experience and/or past performance information in determining<br />

technical qualification of responses. If consideration will be limited to schedule<br />

contractors who are small business concerns as permitted by paragraph (2)(i) below, the<br />

request shall notify the contractors that will be the case.<br />

(2) Transmit the Request to Contractors:<br />

(i) Based upon an initial evaluation of catalogs and price lists, the ordering office<br />

should identify the contractors that appear to offer the best value (considering the scope<br />

of services offered, pricing and other factors such as contractors’ locations, as<br />

appropriate). When buying IT professional services under SIN 132—51 ONLY, the<br />

ordering office, at its discretion, may limit consideration to those schedule contractors<br />

that are small business concerns. This limitation is not applicable when buying supplies<br />

and/or services under other SINs as well as SIN 132-51. The limitation may only be used<br />

when at least three (3) small businesses that appear to offer services that will meet the<br />

agency’s needs are available, if the order is estimated to exceed the micro-purchase<br />

threshold.<br />

(ii) The request should be provided to three (3) contractors if the proposed order is<br />

estimated to exceed the micro-purchase threshold, but not exceed the maximum order<br />

threshold. For proposed orders exceeding the maximum order threshold, the request<br />

should be provided to additional contractors that offer services that will meet the<br />

agency’s needs. Ordering offices should strive to minimize the contractors’ costs<br />

associated with responding to requests for quotes for specific orders. Requests should be<br />

tailored to the minimum level necessary for adequate evaluation and selection for order<br />

placement. Oral presentations should be considered, when possible.<br />

(3) Evaluate Responses and Select the Contractor to Receive the Order:<br />

After responses have been evaluated against the factors identified in the request, the order should<br />

be placed with the schedule contractor that represents the best value. (See FAR 8.404.)<br />

(b) The establishment of <strong>Federal</strong> Supply Schedule Blanket Purchase Agreements (BPAs) for<br />

recurring services is permitted when the procedures outlined herein are followed. All BPAs for<br />

services must define the services that may be ordered under the BPA, along with delivery or<br />

performance time frames, billing procedures, etc. The potential volume of orders under BPAs,<br />

regardless of the size of individual orders, may offer the ordering office the opportunity to secure<br />

volume discounts. When establishing BPAs, ordering offices shall —<br />

(1) Inform contractors in the request (based on the agency’s requirement) if a single BPA or<br />

multiple BPAs will be established, and indicate the basis that will be used for selecting the<br />

contractors to be awarded the BPAs.<br />

(i) SINGLE BPA: Generally, a single BPA should be established when the ordering<br />

office can define the tasks to be ordered under the BPA and establish a firm-fixed price or


ceiling price for individual tasks or services to be ordered. When this occurs, authorized<br />

users may place the order directly under the established BPA when the need for service<br />

arises. The schedule contractor that represents the best value should be awarded the BPA.<br />

(See FAR 8.404.)<br />

(ii) MULTIPLE BPAs: When the ordering office determines multiple BPAs are<br />

needed to meet its requirements, the ordering office should determine which contractors<br />

can meet any technical qualifications before establishing the BPAs. When multiple<br />

BPAs are established, the authorized users must follow the procedures in (a)(2)(ii) above<br />

and then place the order with the Schedule contractor that represents the best value.<br />

(2) Review BPAs Periodically: Such reviews shall be conducted at least annually. The<br />

purpose of the review is to determine whether the BPA still represents the best value. (See FAR<br />

8.404.)<br />

(c) The ordering office should give preference to small business concerns when two or more<br />

contractors can provide the services at the same firm-fixed price or ceiling price.<br />

(d) When the ordering office’s requirement involves both products as well as executive,<br />

administrative and/or professional, services, the ordering office should total the prices for the products and<br />

the firm-fixed price for the services and select the contractor that represents the best value. (See FAR<br />

8.404.)<br />

The ordering office, at a minimum, should document orders by identifying the contractor from which the<br />

services were purchased, the services purchased, and the amount paid. If other than a firm-fixed price<br />

order is placed, such documentation should include the basis for the determination to use a labor-hour or<br />

time-and-materials order. For agency requirements in excess of the micro-purchase threshold, the order file<br />

should document the evaluation of Schedule contractors’ quotes that formed the basis for the selection of<br />

the contractor that received the order and the rationale for any trade-offs made in making the selection.<br />

Ordering procedures for other services available on schedule at fixed prices for specifically defined<br />

services or tasks should use the procedures in FAR 8.404. These procedures are listed in the pricelist,<br />

under “Information for Ordering Offices,” paragraph #12.<br />

4. ORDER<br />

a. Agencies may use written orders, EDI orders, blanket purchase agreements, individual purchase<br />

orders, or task orders for ordering services under this contract. Blanket Purchase Agreements shall not<br />

extend beyond the end of the contract period; all services and delivery shall be made and the contract terms<br />

and conditions shall continue in effect until the completion of the order. Orders for tasks which extend<br />

beyond the fiscal year for which funds are available shall include FAR 52.232-19 Availability of Funds for<br />

the Next Fiscal Year. The purchase order shall specify the availability of funds and the period for which<br />

funds are available.<br />

b. All task orders are subject to the terms and conditions of the contract. In the event of conflict<br />

between a task order and the contract, the contract will take precedence.<br />

5. PERFORMANCE OF <strong>SERVICE</strong>S<br />

a. The Contractor shall commence performance of services on the date agreed to by the Contractor<br />

and the ordering office.<br />

b. The Contractor agrees to render services only during normal working hours, unless otherwise<br />

agreed to by the Contractor and the ordering office.<br />

c. The Agency should include the criteria for satisfactory completion for each task in the Statement<br />

of Work or Delivery Order. Services shall be completed in a good and workmanlike manner.


d. Any Contractor travel required in the performance of IT/EC Services must comply with the<br />

<strong>Federal</strong> Travel Regulation or Joint Travel Regulations, as applicable, in effect on the date(s) the travel is<br />

performed. Established <strong>Federal</strong> Government per diem rates will apply to all Contractor travel. Contractors<br />

cannot use GSA city pair contracts.<br />

6. INSPECTION OF <strong>SERVICE</strong>S<br />

The Inspection of Services–Fixed Price (AUG 1996) clause at FAR 52.246-4 applies to firm-fixed price<br />

orders placed under this contract. The Inspection–Time-and-Materials and Labor-Hour (JAN 1986) clause<br />

at FAR 52.246-6 applies to time-and-materials and labor-hour orders placed under this contract.<br />

7. RESPONSIBILITIES OF THE CONTRACTOR<br />

The Contractor shall comply with all laws, ordinances, and regulations (<strong>Federal</strong>, State, City, or otherwise)<br />

covering work of this character. If the end product of a task order is software, then FAR 52.227-14 Rights<br />

in Data – General, may apply.<br />

8. RESPONSIBILITIES OF THE GOVERNMENT<br />

Subject to security regulations, the ordering office shall permit Contractor access to all facilities necessary<br />

to perform the requisite IT/EC Services.<br />

9. INDEPENDENT CONTRACTOR<br />

All IT/EC Services performed by the Contractor under the terms of this contract shall be as an independent<br />

Contractor, and not as an agent or employee of the Government.<br />

10. ORGANIZATIONAL CONFLICTS OF INTEREST<br />

a. Definitions.<br />

“Contractor” means the person, firm, unincorporated association, joint venture, partnership, or corporation<br />

that is a party to this contract.<br />

“Contractor and its affiliates” and “Contractor or its affiliates” refers to the Contractor, its chief executives,<br />

directors, officers, subsidiaries, affiliates, subcontractors at any tier, and consultants and any joint venture<br />

involving the Contractor, any entity into or with which the Contractor subsequently merges or affiliates, or<br />

any other successor or assignee of the Contractor.<br />

An “Organizational conflict of interest” exists when the nature of the work to be performed under a<br />

proposed Government contract, without some restriction on activities by the Contractor and its affiliates,<br />

may either (i) result in an unfair competitive advantage to the Contractor or its affiliates or (ii) impair the<br />

Contractor’s or its affiliates’ objectivity in performing contract work.<br />

b. To avoid an organizational or financial conflict of interest and to avoid prejudicing the best<br />

interests of the Government, ordering offices may place restrictions on the Contractors, its affiliates, chief<br />

executives, directors, subsidiaries and subcontractors at any tier when placing orders against schedule<br />

contracts. Such restrictions shall be consistent with FAR 9.505 and shall be designed to avoid, neutralize,<br />

or mitigate organizational conflicts of interest that might otherwise exist in situations related to individual<br />

orders placed against the schedule contract. Examples of situations, which may require restrictions, are<br />

provided at FAR 9.508.


11 INVOICES<br />

The Contractor, upon completion of the work ordered, shall submit invoices for IT/EC services. Progress<br />

payments may be authorized by the ordering office on individual orders if appropriate. Progress payments<br />

shall be based upon completion of defined milestones or interim products. Invoices shall be submitted<br />

monthly for recurring services performed during the preceding month.<br />

12. PAYMENTS<br />

For firm-fixed price orders the Government shall pay the Contractor, upon submission of proper invoices or<br />

vouchers, the prices stipulated in this contract for service rendered and accepted. Progress payments shall<br />

be made only when authorized by the order. For time-and-materials orders, the Payments under<br />

Time-and-Materials and Labor-Hour Contracts (Alternate I (APR 1984)) at FAR 52.232-7 applies to<br />

time-and-materials orders placed under this contract. For labor-hour orders, the Payment under<br />

Time-and-Materials and Labor-Hour Contracts (FEB 2002) (Alternate II (FEB 2002)) at FAR 52.232-7<br />

applies to labor-hour orders placed under this contract.<br />

13. RESUMES<br />

Resumes shall be provided to the GSA Contracting Officer or the user agency upon request.<br />

14. INCIDENTAL SUPPORT COSTS<br />

Incidental support costs are available outside the scope of this contract. The costs will be negotiated<br />

separately with the ordering agency in accordance with the guidelines set forth in the FAR.<br />

15. APPROVAL OF SUBCONTRACTS<br />

The ordering activity may require that the Contractor receive, from the ordering activity's Contracting<br />

Officer, written consent before placing any subcontract for furnishing any of the work called for in a task<br />

order.<br />

16. DESCRIPTION OF IT/EC <strong>SERVICE</strong>S AND PRICING<br />

VERIZON <strong>SERVICE</strong> DESCRIPTIONS<br />

<strong>Verizon</strong> <strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong><br />

<strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong> (FNS), a wholly-owned company of <strong>Verizon</strong> Technology Corporation,<br />

designs, implements, operates, and maintains mission-critical, wide-area networks for <strong>Federal</strong> and<br />

commercial clients. Members of FNS work with the <strong>Verizon</strong> Technology Organization to integrate secure,<br />

reliable data services, such as DSL, VPNs, and a host of other access, security, Web, and advanced<br />

networking products and services. Our staff works in customer locations around the world, and we have<br />

several office locations in the metropolitan Washington DC area.<br />

FNS focuses on several key business areas:<br />

<strong>Network</strong> Services. FNS designs and implements the full range of access methods to suit different<br />

performance and security needs. A team of network professionals helps clients develop <strong>Network</strong><br />

Operations Center (NOC) requirements, network analysis, engineering, and designs. This includes NOC<br />

performance analyses, such as throughput, choke points, metric monitoring, and modeling. The team's<br />

network expertise spans local area networks through metropolitan area and wide area networks.<br />

<strong>Network</strong> Security Services. Our consulting services give clients the benefit of the experience of a<br />

seasoned team of widely recognized experts in networking technologies. FNS network consulting services<br />

include the following:


- Penetration Analysis Ethical Hacking<br />

- Security Assessment<br />

- Security Design<br />

- Security Implementation<br />

- Security Policies and Procedures<br />

- Internet Security<br />

- Managed Security Products and Services<br />

- Virtual Private <strong>Network</strong>s.<br />

Engineering Services. FNS program managers routinely handle complex programs requiring staffing,<br />

execution, monitoring, reporting, and re-engineering customers' processes to ensure that IT network designs<br />

meet current and future goals and objectives. At customer facilities, FNS professionals provide site design,<br />

configuration management, preparation, and installation of internetworking solutions that will meet<br />

customer needs in the new millennium. FNS also offers a suite of back-office services that include network<br />

management, invoicing, billing, and operations support.<br />

Support Services. The people who best understand networking provide our substantial support services.<br />

We can identify potential issues before they develop, guiding customers' staff through maintenance and<br />

operations, and troubleshooting problems quickly and efficiently. FNS offers a comprehensive suite of<br />

support services, including the following:<br />

- Hardware Maintenance and Instruction Support<br />

- <strong>Network</strong> Modeling and Performance Assessment<br />

- End-User Help Desk and Customer Support<br />

Today, FNS provides network support in the areas of operations, maintenance, engineering, and program<br />

management for DISA’s IP router networks, ATM networks, GCCS networks, the Treasury<br />

Communications System, and other mission-critical Government and commercial networks. Our customers<br />

have been highly satisfied with our contract performance, as evidenced by the longevity of continual<br />

support (since 1985 with Treasury, since 1982 with DISA, and before that with DARPA), and high praise<br />

from our customers (including numerous letters of commendation to both the corporation and individual<br />

employees). Additionally, DISA, the DARPA JPO, Treasury, and other customers have recognized our<br />

company for its efforts in inserting leading-edge technology into networks, and successfully integrating this<br />

technology with legacy systems and network components.<br />

Information Management. FNS develops and implements advanced database and information systems to<br />

support distributed applications over secure networks. Our extensive experience in all the technologies<br />

integral to effective database and information management includes:<br />

- Database design and implementation<br />

- Software architecture and development<br />

- <strong>Systems</strong> implementation and integration<br />

- Inter/intranetworking<br />

- <strong>Network</strong>ing security<br />

Information Security. FNS conducts research and development on high-value or difficult information<br />

security problems. We solve complex security problems not yet addressed by the commercial sector. Our<br />

research and development efforts encompass many significant security programs and critical research areas,<br />

such as Information Assurance, Protocol Design, and Security Policy Specification and Management.<br />

<strong>Network</strong>ing. FNS leading-edge research advances the state of the Internet; our practical solutions enhance<br />

the reliability of wide area networks; and our advanced technologies enable information distribution,<br />

mobile tactical networking, and communications connectivity network management.<br />

<strong>Verizon</strong> is dedicated to the task of bringing our extensive portfolio of Information Technology products and<br />

services to the United States Government. <strong>Verizon</strong> is particularly interested in supporting our DOD and<br />

Home Security Agencies. It is our desire to win the confidence of the United States Air Force through<br />

consistent excellent performance and client satisfaction. We thank you for taking the time to consider our<br />

statement of interest. We look forward to meeting with the Air Force Pentagon Communications Agency<br />

to provide more information about our new <strong>Verizon</strong>.<br />

<strong>Verizon</strong> Data Center Installation. <strong>Verizon</strong> uses a staged migration approach by data center and by<br />

platform. With this approach, we can migrate one data center at a time and, within that data center, we<br />

migrate the mainframe environment first, then the midrange, and finally the other servers. For certain small<br />

servers, such as NT servers, we advise working with the customer during due diligence to determine the<br />

best approach for the customer’s location and operational management.


To facilitate the migration, <strong>Verizon</strong> can purchase or lease swing equipment. This allows the initial<br />

migration of processing, so that the customer’s existing equipment can be relocated to the <strong>Verizon</strong> IT<br />

environment. After all migrations are complete, we can dispose of the swing equipment or use it as a<br />

replacement for existing equipment. <strong>Network</strong> monitoring would be migrated during the initial moves.<br />

<strong>Verizon</strong> understands the personal impact to individual employees affected by an outsourcing transition.<br />

We also understand how important knowledge retention is with a transition. We make every effort to<br />

ensure that customer employees involved in this process are treated honestly and fairly, and that critical<br />

operational knowledge is not lost in the transition and migration process. As the migration of each data<br />

center is completed, <strong>Verizon</strong> may offer certain key employees positions with <strong>Verizon</strong>.<br />

<strong>Verizon</strong> Data Center Operations. Data center operations encompass the services associated with the<br />

execution of customer test and production online and batch applications. Data center operations occur 24<br />

hours a day, 7 days a week, and provide the services needed to ensure customer applications are available<br />

and functioning as business needs dictate.<br />

Operations support includes the ongoing maintenance and monitoring activities required to ensure that the<br />

data center operation runs smoothly and efficiently. <strong>Verizon</strong> recognizes that preventive maintenance is an<br />

important and necessary part of a successful data center processing operation. We adhere to monitoring<br />

and maintenance procedures that keep all hardware operating at peak performance levels and efficiencies.<br />

Our maintenance procedures can be tailored for each device type and their respective maintenance<br />

requirements. Regularly scheduled maintenance avoids disruption to the customer’s business processing<br />

requirements. Additionally, regular reports are produced through maintenance procedures and processes<br />

that reflect the potential for, or actual development of, problem areas.<br />

<strong>Verizon</strong> operators are onsite 24 hours a day to proactively monitor system performance and to diagnose and<br />

resolve any problems that might occur. Issues, concerns, or problems with the customer’s processing<br />

environment are logged as they occur. Established procedures are used to diagnose and resolve the<br />

problem, or to dispatch the problem to the appropriate support organization. Our responsibility is to ensure<br />

that there is no disruption to the customer’s production environment.<br />

<strong>Verizon</strong> IT uses SunSPARC stations to monitor and control customer system activities. These multitasking<br />

workstations allow us to monitor numerous systems and enable our operators to carry out and control tasks<br />

simultaneously. <strong>Verizon</strong> IT maintains system integrity by automating such functions as:<br />

- Console message traffic<br />

- Started task management (start, stop, and ABEND notification)<br />

- Online system performance<br />

- Online system management<br />

- Batch processing resource connection management (start, stop, and failure notification)<br />

- Batch processing automation (dataset triggers and schedule manipulation)<br />

- Exception message trapping and global notification<br />

- Message trapping and reformatting for specific purposes<br />

<strong>Verizon</strong> has used various automation tools for more than 30 years, enabling an efficient data center<br />

operation that benefits the customer.<br />

<strong>Verizon</strong> Maintenance. Preventive maintenance is vital to a successful data processing operation. <strong>Verizon</strong><br />

IT establishes and adheres to monitoring and maintenance procedures that keep all hardware operating at<br />

peak performance levels and efficiencies. The maintenance procedures employed depend on the device,<br />

maintenance requirements, outage schedules, and information reflected in reports that demonstrate the<br />

potential for, or actual development of, problem areas.<br />

If a problem is identified, the maintenance procedures and schedules take into account the risks and<br />

potential disruption to the customer’s operating environment, before determining the best course of<br />

corrective action. These activities ensure that customer hardware and system software continue running<br />

smoothly.<br />

<strong>Verizon</strong> Managed <strong>Network</strong> Solutions (MNS). Managed <strong>Network</strong> Solutions is a family of services that<br />

allow customers to let <strong>Verizon</strong> manage their increasingly complex voice and data networks. We can help


educe costs and improve network performance by offering a spectrum of services, ranging from CPE<br />

maintenance, up through end-to-end management of customers’ networks via MNS.<br />

• MNS FrameWatch. A comprehensive service that includes <strong>Verizon</strong>-provided CPE, configuration,<br />

installation, ongoing maintenance, troubleshooting, monitoring, and service-level reporting for Frame<br />

Relay <strong>Network</strong>s. <strong>Verizon</strong> provides WAN Management and Router Management.<br />

• MNS IPT Watch (IP Telephony Watch). <strong>Verizon</strong>’s MNS IPT Watch is a comprehensive<br />

management solution for the IP Telephony portion of customers’ converged Cisco networks. IPT<br />

Watch offers three levels of service–Call Manager/Server Management, IP QoS Fault Monitoring, and<br />

IP QoS Performance Monitoring–to meet customers’ specific needs. When bundled with other MNS<br />

services like <strong>Verizon</strong> Data Maintenance and SiteWatch, <strong>Verizon</strong> can offer a full out-tasked solution,<br />

unmatched in the industry, that differentiates us from all the other Cisco equipment resellers.<br />

• MNS SiteWatch (management and maintenance). <strong>Verizon</strong>'s MNS SiteWatch is a complete<br />

management and maintenance solution for customers’ data networks. SiteWatch offers three service<br />

options that give customers the flexibility to meet their specific business needs: Fault Management,<br />

Performance Management, and Configuration Management.<br />

• <strong>Verizon</strong> Data Maintenance. A comprehensive offering of support programs, premier in the industry.<br />

Data Maintenance provides maintenance and troubleshooting for customers' crucial data networks, and<br />

offers everything from telephone troubleshooting to online fault monitoring and onsite parts and labor,<br />

depending on which service option they choose:<br />

- Next Business Day (NBD) Remote<br />

- 4-Hour Remote<br />

- 8-Hour Onsite<br />

- 4-Hour Onsite<br />

- Connectivity Assurance Service<br />

• File/Print Services. <strong>Verizon</strong> supports its customer’s file/print requirements by maintaining and<br />

coordinating all file and print activities, including printed reports, and design and development of laser<br />

print forms. Services include:<br />

- Support and maintain all print hardware<br />

- Operate and manage print queues and devices<br />

- Prepare reports and distribute on schedule<br />

- Monitor and maintain consumables<br />

- Ensure all files are available during prime time<br />

- Perform activities to ensure data integrity<br />

- Execute backup procedure and perform restore when requested<br />

- Report storage utilization statistics<br />

Please note that installation options vary depending upon location, equipment manufacturer, and type.<br />

Locations such as Texas and the tri-state area also have a local <strong>Verizon</strong> installation/maintenance<br />

organization option, as well as National-based service.<br />

• Web Services - <strong>Verizon</strong> Enterprise Advantage. <strong>Verizon</strong> Enterprise Advantage (VEA)<br />

is a comprehensive Web hosting solution set that delivers the benefits of the Internet.<br />

From simple dedicated hosting to complex, integrated managed services, <strong>Verizon</strong><br />

Enterprise Advantage solutions can help companies at each stage of their Internet<br />

experience.<br />

<strong>Verizon</strong> Enterprise Advantage consists of three service lines: Enterprise Hosting, Enterprise<br />

Performance, and Enterprise Commerce. These service lines encompass modular sets of products and<br />

services delivering high-performing Web sites and E-commerce capabilities:<br />

- Enterprise Hosting. A modular offering of products and services allows customers to select<br />

Packaged Solutions, Complex Solutions, or Custom Solutions. Packaged Solutions are our core<br />

offering of pre-engineered platforms. Complex Solutions combine the components of the<br />

Common Hosting Platform, client-specific software applications, and services, such as software<br />

support. Custom Solutions are available for non-standard configurations.


- Enterprise Performance. High-availability products for Enterprise Hosting customers who have<br />

a Web site consisting of multiple servers that require high performance and availability.<br />

Enterprise Performance and Enterprise Managed Applications product lines offer performance and<br />

commerce functionality to enhance Enterprise Hosting solutions.<br />

Enterprise Performance is a suite of performance enhancements designed to ensure server<br />

availability (minimum downtime) and server response (minimum delay). Services such as Load<br />

Balancing, Site Accelerator, Site Replication, and Traffic Distribution are available under this<br />

offering. In addition, more demanding service level agreements are offered under these services:<br />

- Load Balancing. This service is for businesses with high-traffic Web sites that require<br />

scalability and additional system performance, while minimizing downtime for missioncritical<br />

applications. This service balances the traffic load between web servers in the same<br />

data center. It automatically routes traffic to other servers if one is down.<br />

Load Balancing balances network load by directing network connections to the server with<br />

the least number of open connections. It attempts to maintain an equal number of<br />

simultaneous sessions on all servers (assuming all servers have the same capacity). A<br />

different algorithm is used for servers with large differences in capacity.<br />

- Site Accelerator-Web Caching. Caching is based on the idea that some web site content is<br />

requested frequently, while other content is seldom requested at all. It places frequently used<br />

content closer to end users by geographically distributed caching servers. A web cache is a<br />

computer system that monitors web object requests, and stores objects it retrieves from a<br />

server. On subsequent requests for the same object, the cache delivers the object from its<br />

storage, rather than passing the request on to the origin server. This approach accelerates web<br />

page downloads, reduces the number of requests to the origin server, making it more<br />

responsive and reducing bandwidth as much as 35 percent. Without caching, all traffic must<br />

travel to the origin server every time a page is requested, resulting in potentially long delays<br />

and user frustration.<br />

Since every web object changes over time, caches also determine whether or not their copy of<br />

an object is still "fresh" or whether they need to retrieve a new copy from the origin server.<br />

Web caching is particularly suited for static content, such as logos and other images and html.<br />

- Traffic Distribution/ Hopscotch. Designed for customers with high-traffic Web sites that are<br />

hosted at multiple data centers. Geographically distributed mirrored web servers provide the<br />

best end-to-end response and site redundancy. Enterprise Performance products offer a tiered<br />

approach to distributed hosting, starting out with local load balancing, moving up to caching,<br />

and finally to geographically distributed servers in multiple data centers.<br />

- Site Replication. Designed for businesses who need high availability of Web hosting, without<br />

the overhead associated with replicating files, and to ensure that content on all servers is<br />

synchronized. Distribution hosting in the same or different data centers requires the server<br />

content to be mirrored. Site Replicator is a tool for making sure that the content across all<br />

servers is the same, and that the data are synchronized. Site Replicator provides automatic<br />

content update and replication between a master Web server and multiple slave Web servers.<br />

It updates content on a scheduled, periodic, or on-demand basis.<br />

- Enterprise Commerce. A combination of pre-configured and custom applications for Enterprise<br />

Hosting customers covering a wide range of E-business solutions.<br />

• 24/7 Help desk and Applications - <strong>Verizon</strong> Managed Help Desk Services. Managed Help Desk<br />

Services provide customer end users with a single point of contact for computer technical support.<br />

The service utilizes highly trained and experienced staff to efficiently support customer end users<br />

experiencing problems with their computers. The help desk also assists end users by answering<br />

“How To Do” type questions for supported software applications.<br />

<strong>Verizon</strong> provides fast, reliable, and courteous support, meeting today’s demands for efficient computer<br />

assistance that increases end user productivity and satisfaction. Our help desks provide solutions for<br />

issues that are help desk resolvable, while educating end users in the process. The help desk is staffed<br />

to answer every call and provide technical expertise with the initial point of contact, eliminating the


need for frustrating voicemails that lead to user dissatisfaction. Our goal is to become a strategic<br />

partner with our customers in providing satisfaction to their end users.<br />

<strong>Verizon</strong> also isolates non-help desk resolvable problems, and tracks issues that need to be escalated to<br />

customer-defined contacts, such as onsite maintenance personnel. <strong>Verizon</strong> takes ownership of the<br />

problem, providing satisfaction in that the customer end user only needs to contact one entity to get<br />

assistance.<br />

Customers are provided exceptional web-based reporting for all calls received, including statistics,<br />

such as average call answer time, resolution statistics, problems categorized by applications and/or<br />

departments, call abandon rates, and a listing of repeat callers.<br />

Managed Help Desk will also receive calls, create tickets, and escalate problems for applications not<br />

directly supported. This allows the customer to have one database for all problems; calls the help desk<br />

handles and calls the help desk escalates.<br />

<strong>Verizon</strong> provides a financially cost-effective solution for our customers who choose to out-task the<br />

responsibilities of provisioning and maintaining computer help desk operations. <strong>Verizon</strong> can leverage<br />

the investment in people, processes, and systems currently in place, to run a professional help desk.<br />

We maintain a quality help desk to serve end users, so that our customers can focus on their core<br />

business. <strong>Verizon</strong> Managed Help Desk Services remove the following customer responsibilities that<br />

are associated with provisioning a help desk in-house:<br />

- Staffing agents<br />

- Providing technical training for agents<br />

- Supervising help desk agents and other help desk personnel<br />

- Scaling for growth and unexpected spikes of call volume<br />

- Provisioning and maintaining software, hardware, and work space requirements<br />

Managed Help Desk Services are performed from the <strong>Verizon</strong> Enterprise Management Center, a<br />

57,000 square foot building located in Austin TX, which operates 24 hours a day, 365 days a year.<br />

Supported Applications. <strong>Verizon</strong> provides end user help desk support for the following desktop<br />

applications:<br />

- Microsoft Operating <strong>Systems</strong><br />

- Norton Anti-Virus<br />

- Microsoft Office<br />

- Lotus Notes<br />

- Internet Explorer and Netscape Web Browser - Microsoft Outlook/Exchange<br />

Support


Security Services (Antivirus program, account management, domain management; Communications<br />

security; <strong>Network</strong> security (information assurance)<br />

<strong>Verizon</strong> Security Consulting Services. <strong>Verizon</strong>'s Security Consulting Services–also known as "packaged"<br />

security services – help companies quickly improve their information security environment in an effective,<br />

cost-efficient way. <strong>Verizon</strong>’s suite of security consulting services offers complete, end-to-end security<br />

solutions, including:<br />

• Executive Security Briefing. Executive Security Briefings help organizations understand potential<br />

threats to their information assets, and the risks associated with today's computing environments.<br />

These 2-hour presentations are free, value-added services for the first 100 requests on the latest<br />

security threats and solutions. They are delivered to CIOs, VPs, and Directors.<br />

• Genuity Questionnaire. Before work on a security implementation can begin, <strong>Verizon</strong>/ Genuity<br />

administers a required, in-depth questionnaire to help establish a baseline of a company’s existing<br />

security systems, policies, and infrastructure. Because the questionnaire is fairly detailed and many<br />

companies do not have the in-house resources to complete it, <strong>Verizon</strong> provides a security consultant to<br />

assist the customer.<br />

• Vulnerability Testing Services. <strong>Verizon</strong> analyzes customers’ information "insecurity," which consists<br />

of three levels of testing:<br />

- Basic Vulnerability Testing Service. Includes port scans and vulnerability scanning tools; the<br />

latest security methodologies and technologies; and testing of components from external access<br />

points.<br />

- Intermediate Vulnerability Testing Service. Includes the basic testing service, plus consultation<br />

from system component experts who evaluate current security posture, develop guidelines and<br />

recommend improvements, and conduct high-level (basic) penetration testing.<br />

- Advanced Vulnerability Testing Service. Includes the basic assessment, plus comprehensive<br />

(detailed) penetration testing.<br />

<strong>Verizon</strong> provides a number of assessment services, including a Silver level and a more comprehensive<br />

Gold level assessment, as well as host, firewall, and HIPAA assessments, as described below:<br />

- Silver Level Assessment. The Silver Level Assessment includes a basic, external port scan,<br />

physical security review, documentation review, and network architecture diagram review. After<br />

<strong>Verizon</strong> security experts carefully analyze this information, they create a written report, hold a<br />

second meeting to discuss the report and customer security concerns, and finalize a comprehensive<br />

security plan.<br />

- Gold Level Assessment. This security assessment includes the basic components of the Silver<br />

Level Assessment, including a basic, external port scan, physical security review, documentation<br />

review, and network architecture diagram review. <strong>Verizon</strong> security experts carefully analyze this<br />

information, create a written report, hold a second meeting to discuss the report and customer<br />

security concerns, and finalize a comprehensive security plan. The Gold Level Assessment also<br />

includes:<br />

- An advanced, external port scan of the network to identify services.<br />

- A vulnerability scan of the external network (maximum of five public access servers).<br />

- Basic Phone (modem) sweep of the network to search for unauthorized modems connected to<br />

the network<br />

• Host Assessment. A Host Assessment determines how the operating system provides security for the<br />

network. The assessment also includes a review of physical security and how it relates to IT security,<br />

and a procedural review of security procedures in place. Key components of the assessment include:<br />

- An onsite physical security assessment and interview with physical security staff.<br />

- An automated Operating System assessment that gathers data about the operating system, its<br />

security features, settings, and service pack levels.<br />

- Assessment of up to 10 servers (5 external and 5 internal servers).<br />

- A review of the client’s security procedures.<br />

- Written report of findings with recommendations


• Firewall Assessment. <strong>Verizon</strong> Professional Security Services uses proven automated and manual<br />

processes to review customers’ Internet, Extranet, or Intranet firewall architectures to ensure that<br />

valuable assets are protected from attack. The assessment gathers data on operating system<br />

configurations, firewall administrative access, and firewall rule sets. The data are then compared<br />

against industry best practices, known security vulnerabilities, and compliance with any existing<br />

company security polices. The assessment culminates in a written report with findings and<br />

recommendations.<br />

• Security Policy Reviews. These are high-level assessments of an organization’s current policies,<br />

how they are disseminated to employees, and how they are enforced. The process begins with a<br />

customer interview, which results in an assessment of the current written policy.<br />

Please note that this review does not include the creation or modification of existing security policy, a<br />

service that <strong>Verizon</strong> offers as Security Policy Planning and Development. The final report will make<br />

recommendations about any deficiencies found during the review process.<br />

This review typically covers three major areas:<br />

- Logical Security. Includes system access control (i.e., log-in), password policy, software<br />

configuration and change control, anti-virus protection, acceptable use, data security, privacy, data<br />

availability, and data integrity.<br />

- Managerial Security. Includes security awareness training, personnel security, organizational<br />

structure (division of responsibility), policy enforcement, incident handling procedures, and<br />

separation of duties.<br />

- Physical Security. Includes building access control, restricted access to computer facilities (e.g.,<br />

server rooms), and computer location. Can also cover fire-suppression systems, facility<br />

construction, or air conditioning.<br />

• Security Policy Planning and Development. This service covers all of the basic<br />

analysis of the Security Policy Review (logical, managerial, physical security reviews),<br />

but goes beyond the review stage to provide businesses with a standard "Best Practices"<br />

Security Policy template. The template identifies, recommends, and implements<br />

appropriate security policy and policy-specified safeguards to help protect customers’<br />

information assets. Key components include:<br />

- Assessment of the full range of security policy and planning, including privacy, confidentiality,<br />

administration, Internet access, remote access, incident handling, audit requirements, roles and<br />

responsibilities, training and awareness, etc.<br />

- Draft Security Policy<br />

- Presentation of Draft Policy<br />

- Final Security Policy with high-level implementation plan<br />

• Technology Planning for Security Safeguards. This service helps customers select the<br />

best security solutions for their needs from a broad range of security consulting services.<br />

<strong>Verizon</strong> security consultants provide two (2) days of onsite consulting services to help<br />

customers select, design, and configure a robust security solution. <strong>Verizon</strong> offers<br />

technology planning services for the following security safeguards:<br />

- Firewalls - Two-Factor Authentication<br />

- Intrusion Detection <strong>Systems</strong> - PKI/ LDAP/ X.500<br />

- Virus Protection - Physical Security<br />

- Content Filtering - Biometrics<br />

- URL Filtering - RADIUS Servers<br />

- Encryption<br />

• Customer Training (Awareness, Executive Security, and IT Security). <strong>Verizon</strong> offers<br />

three types of training sessions for customers, which include Awareness Training,<br />

Executive Security Training (different from the pre-sales Executive Security Briefing),<br />

and IT Security Training.


- Security Awareness Training. Awareness Training follows the development of an information<br />

security policy. Once the security policy has been created and implemented, it should remain as<br />

the guideline for acceptable system use, and users should be informed of this through an<br />

awareness training session. <strong>Verizon</strong> offers awareness training sessions that:<br />

- Educate users about acceptable use of system assets<br />

- Explain the reasons why the company must protect its information assets<br />

- Review threats, including social engineering<br />

- Address the penalties for noncompliance<br />

- Executive Security (IT) Security Training. Executive-level training follows a complete<br />

investigative research of a customer's security network, and is intended to equip management with<br />

information on threats from the Internet, underground chat rooms, anarchy and hacktivists sites,<br />

etc., to determine if the customer is the subject of any potential attack.<br />

- IT Security Training. This training educates, informs, and guides IT personnel in planning,<br />

designing, implementing, and adhering to best security practices related to the need or<br />

environment.<br />

• Risk Assessment and Compliance Audits. <strong>Verizon</strong> has a unique set of skills and experience to ensure<br />

that customers receive the most comprehensive and cost-effective risk assessment and vulnerability<br />

analysis available. <strong>Verizon</strong> uses a custom-developed assessment methodology and tools to conduct<br />

comprehensive analysis of the security risks associated with the customer’s computing environment.<br />

Our security engineers know how the "bad guys" attack systems. When conducting assessments, our<br />

engineers think like hackers, and can exploit even the smallest of vulnerabilities. <strong>Verizon</strong> offers Basic<br />

and Advanced levels of Security Audits.<br />

• Computer Incident Response Team (CIRT) Retainer Program. <strong>Verizon</strong>’s CIRT and Cyber Crimes<br />

Unit have the experience and know-how to respond to today’s network intrusions and security events.<br />

The CIRT Retainer Program includes Incident Response Planning, CIRT Training, and CIRT<br />

Response. <strong>Verizon</strong> provides expert guidance in detection, containment, internal reporting, external<br />

disclosure, and investigation. Computer crime investigation and computer forensics are esoteric fields,<br />

and few individuals or corporations have the depth of experience as <strong>Verizon</strong>'s CIRT and Cyber Crimes<br />

Unit.<br />

Configuration Management of the Common Operating Environment<br />

<strong>Verizon</strong> MNS SiteWatch. MNS SiteWatch provides a scalable management and maintenance solution for<br />

customers’ data CPE. Letting <strong>Verizon</strong> take care of ensuring optimum performance of the data network lets<br />

customers focus their enterprise expertise on core business and strategic initiatives. The SiteWatch service<br />

offers three packaged solutions to meet customers' needs. These solutions offer a flexible set of feature<br />

choices, including fault detection and isolation, Web-based performance reports, and Move, add, and<br />

change (MAC) activities.<br />

All services include 24x7 proactive monitoring and combined data network management and maintenance<br />

capabilities. <strong>Verizon</strong> provides:<br />

• Fault Management. Fault detection and isolation, maintenance dispatch, carrier coordination, and<br />

web-based trouble ticketing. Four maintenance coverage options are available. This is positioned as<br />

enhanced maintenance.<br />

• Performance Management. Fault Management components, plus web-based performance reporting.<br />

Also included is a quarterly performance assessment.<br />

• Configuration Management. Performance Management components, plus software configuration<br />

capabilities, including MAC activities and software backup and restoral<br />

SiteWatch Configuration Management. SiteWatch Configuration Management offers customers end-toend<br />

WAN management solutions. This service offers all of the benefits of SiteWatch Fault Management<br />

and Performance Management, plus Configuration Management, to help ensure configuration data storage<br />

in case of device or configuration loss.<br />

SiteWatch Configuration Management helps customers maximize their network performance and minimize<br />

downtime by proactively monitoring their network and resolving all network faults for covered portions of


the network. <strong>Verizon</strong> engineers, experienced in troubleshooting network hardware, software, and<br />

LAN/WAN protocols, perform problem analysis and, if necessary, actively work with maintenance<br />

personnel to ensure quick solutions.<br />

SiteWatch Configuration Management offers analysis reports to help enhance network performance, and<br />

configuration data storage for backup purposes.<br />

<strong>Verizon</strong> monitors all network faults on devices covered by the customers' contracts. If faults occur, skilled,<br />

experienced <strong>Verizon</strong> engineers correct them.<br />

SiteWatch Configuration Management also collects reports on network performance, and stores<br />

configuration data for backup purposes. Quarterly, <strong>Verizon</strong> engineers analyze network reports and offer<br />

suggestions on how to improve network performance.<br />

<strong>Verizon</strong> <strong>Network</strong> Operations Centers (NOCs) store all configuration data for backup and change control<br />

configuration, on a regularly scheduled basis. In case of device or configuration loss, <strong>Verizon</strong> reloads the<br />

configuration as part of service restoration. Available services include:<br />

- <strong>Verizon</strong> MNS Web site access<br />

- Preferred vendor Web site access<br />

- Flexible CPE Maintenance Option<br />

- Software maintenance<br />

- <strong>Systems</strong> documentation<br />

- 24x7 phone support and troubleshooting<br />

- Web-based trouble ticketing<br />

- Verification of restorative action<br />

- Remote troubleshooting<br />

- Fault monitoring and detection<br />

- Carrier management<br />

- Customer notification<br />

- Web-based performance reports<br />

- Performance analysis<br />

- Configuration management.<br />

Voice Services<br />

<strong>Verizon</strong> offers a complete range of basic and advanced communications products and services to meet the<br />

voice, video, data, and IP-related needs of its customers. These include business phone lines, Internet<br />

access, data services, long distance, pay phones, enhanced calling services, telecom equipment, and more.<br />

Capabilities include:<br />

• Managed Voice<br />

Service (MVS)<br />

A solution that allows customers to let <strong>Verizon</strong> manage their voice<br />

communications. With the feature functionality of a PBX and the flexibility<br />

of Centrex, <strong>Verizon</strong> gives customers the ability to focus on their core business<br />

competencies. We can help by letting them use their capital to invest in their<br />

business, not in their communications network. We own (hold paper, pay<br />

taxes) and maintain the network, and the customer pays a simple monthly rate<br />

per port for their PBX service, maintenance, and Moves, adds, and changes<br />

(MAC). As technology evolves, customers have the ability to renegotiate<br />

their contracts to take advantage of new communications products and<br />

services.<br />

• WAN Solutions Private Line, Frame Relay, ATM, SONET, DWDM, Gigabit Ethernet, (Local<br />

and Long Distance service)<br />

• <strong>Network</strong> Integration Integration, Consulting, and Managed Services<br />

• IP Solutions Dedicated and Dial Internet Access; Web Development, Hosting, and<br />

Management; Security Services; and Messaging<br />

• LAN Solutions Intelligent Wiring, Routers, Hubs and Switches, Installation, Maintenance,<br />

and Repair<br />

• Voice Access and<br />

Transport<br />

• Voice Switching<br />

Solutions<br />

Local, DID/DOD, Integrated Services Digital <strong>Network</strong> (ISDN) PRI/BRI,<br />

IntraLATA and InterLATA Toll, Voice over IP (VoIP), and Value Added<br />

Services<br />

Centrex, PBX, KSU, IP-PBX, Voice Processing, I/M&R, Converged CPE


Please note that installation options vary depending upon location, equipment manufacturer, and type.<br />

Locations such as Texas and the tri-state area also have a local <strong>Verizon</strong> installation/maintenance<br />

organization option, as well as National-based service.<br />

Video Teleconferencing<br />

Business travel has decreased dramatically. Videoconferencing provides the real-time experience of a<br />

physical meeting. <strong>Verizon</strong> can offer all of the video CPE–camera, monitor, codec, audio, and system<br />

control device–as well as the network, for a total videoconferencing solution.<br />

Infrastructure and Cable Installation<br />

<strong>Verizon</strong> Enterprise <strong>Network</strong> Consulting Services. <strong>Verizon</strong>'s Enterprise <strong>Network</strong> Consulting Services are<br />

value-added planning services designed to assist customers in the strategic planning and design of their<br />

enterprise networks. From wide, local, and metropolitan area networking, to remote access, to address<br />

management, to convergence, <strong>Verizon</strong> experts are prepared to assist customers in any of the following<br />

disciplines:<br />

• <strong>Network</strong> Architecture & Planning. <strong>Verizon</strong> <strong>Network</strong> Architecture and Planning services help<br />

enterprise customers closely align their technology initiatives with their business objectives. Utilizing<br />

a phased approach, <strong>Verizon</strong> engineers develop an architecture and technology roadmap to guide<br />

customers from legacy to next-generation networks in support of their business objectives. <strong>Verizon</strong><br />

engineers start by conducting a high-level assessment to gain an understanding of the current network.<br />

Next, through an interview process and review of customer planning documents, architectural goals are<br />

defined and prioritized. In the next phase, architecture alternatives are defined and evaluated, and a<br />

recommendation developed. Lastly, a transition plan to guide the customer through the migration is<br />

assembled. An executive briefing describing the process and results is provided to the customer.<br />

• <strong>Network</strong> Design. A comprehensive design should not be underestimated in any construction or<br />

development effort, whether it is the construction of a new building or the development of a new<br />

product. Enterprise networks are no different. To implement a scalable, reliable, robust network to<br />

meet business objectives and maximize return on investment, a formal network design is a must. It has<br />

been common in the past to pull together network designs without thorough requirements gathering,<br />

and almost as a result of technology selection, rather than a prerequisite, often at little or no cost.<br />

However, this lack of emphasis has resulted in networks that do not fulfill business requirements and<br />

do not meet expectations of technology executives.<br />

<strong>Verizon</strong> <strong>Network</strong> Design Services assists enterprise clients in developing detailed network<br />

specifications and implementation tactics, to serve as the basis for scalable, robust, and reliable<br />

network solutions. These specifications for the physical, logical, and operational infrastructure are<br />

developed with consideration of how the new technology will integrate into the existing network, and<br />

with an eye to ensuring that the design supports the architecture and technology roadmap. Maximizing<br />

the return on investment starts with a solid foundation in architecture, and is only possible with a<br />

comprehensive network design.<br />

• <strong>Network</strong> Assessment Services. <strong>Network</strong> Assessment services improves the return on IT investment<br />

by maximizing the efficiency of the network infrastructure, and planning for future growth in a logical<br />

and disciplined manner. Whether the assessment focuses on network inventory, performance,<br />

reliability, availability, or all of the above, <strong>Verizon</strong> engineers utilize proven methodologies and stateof-the-art<br />

tools to ensure a meticulous audit of the enterprise network according to the objectives<br />

identified at the onset of the engagement. The <strong>Network</strong> Assessment is often the starting point for a<br />

new technology implementation initiative, and ensures the accuracy of the planning baseline, such that<br />

new initiatives are built on a solid foundation. The focus of the network assessment typically includes<br />

any combination of the following areas:<br />

- WAN/ MAN/ LAN topologies<br />

- <strong>Network</strong> operating systems, gateways, protocols<br />

- General throughput/ capacity<br />

- Bottlenecks, problem area identification<br />

- <strong>Network</strong> management capabilities<br />

- Operations and Administration procedures


- Redundancy and identification of single points of failure<br />

- External Communication Partners<br />

<strong>Verizon</strong> network consultants provide expertise in the following major networking disciplines:<br />

- Wide, metropolitan, and local area networking<br />

- Voice, video, and data convergence<br />

- Internet connectivity and Firewall technology planning<br />

- Content delivery networking<br />

- Wireless networking<br />

- Remote access infrastructure planning<br />

- Address Management. Directory services, application-based QoS and policy management<br />

• Wide Area <strong>Network</strong> Monitoring Support. <strong>Verizon</strong> also provides WAN monitoring support from our<br />

network control centers. Our communications links are provided through <strong>Verizon</strong>’s existing backbone<br />

network. Communications links to the existing customer WAN are through one or more dedicated<br />

T1s, with an equal number of redundant T1s for backup.<br />

Software Consultation and Planning<br />

Please refer to the <strong>Verizon</strong> Enterprise <strong>Network</strong> Consulting Services discussion in Section 2.7, Infrastructure<br />

and Cable Installation, of this Capability Statement. <strong>Verizon</strong> provides commercial off-the-shelf integration,<br />

custom software development, and lifecycle support services, both in-house and through third-party<br />

teaming arrangements.<br />

Engineering Solutions and Program Management<br />

<strong>Verizon</strong> is adept at engineering comprehensive and innovative technical solutions to meet customer needs<br />

for IT/telecom technology. <strong>Verizon</strong>'s IT solutions will have the flexibility to minimize risk, and provide<br />

best value.<br />

MANAGEMENT (A1 – A2)<br />

A1. Program Manager<br />

A2. Project Manager<br />

A3. Project Administrator<br />

LABOR CATAGORIES<br />

TECHNOLOGY (A15 – A22)<br />

A15. Chief Technologist<br />

A16. Principal Technologist<br />

A17. Divisional Technologist<br />

A18. Senior Technical Professional<br />

A19. Technical Professional<br />

A20. Staff Technical Professional<br />

A21. Senior Project Administrator<br />

A22. Senior Data Control Specialist<br />

B. NETWORK SERIES (B1-B22)<br />

B1. Senior <strong>Network</strong> Engineer<br />

B2. <strong>Network</strong> Engineer<br />

B3. Junior <strong>Network</strong> Engineer<br />

B4. Senior <strong>Systems</strong> Engineer<br />

B5. <strong>Systems</strong> Engineer<br />

B6. Junior <strong>Systems</strong> Engineer


B7. Sustaining Engineer<br />

B8. Junior Sustaining Engineer<br />

B9. Senior Sales Engineer<br />

B10. Sales Engineer<br />

B11. <strong>Network</strong> Security Project Manager<br />

B12. <strong>Network</strong> Security Senior Consultant<br />

B13. Senior <strong>Network</strong> Security Engineer<br />

B14. <strong>Network</strong> Security Engineer<br />

B15. Junior <strong>Network</strong> Security Engineer<br />

B16. Senior <strong>Network</strong> Security Analyst<br />

B17. <strong>Network</strong> Security Analyst<br />

B18. Junior <strong>Network</strong> Security Analyst<br />

B19. Senior Technical Writer, <strong>Network</strong> Security<br />

B20. Technical Writer, <strong>Network</strong> Security<br />

B21. <strong>Network</strong> Manager<br />

B22. <strong>Network</strong> Administrator<br />

C. RESERVED<br />

D. COMPUTER OPERATIONS SERIES (D1-D6)<br />

D1. Reserved<br />

D2. Computer <strong>Systems</strong> Analyst<br />

D3. Applications Engineer<br />

D4. Operations Manager<br />

D5 Reserved<br />

D6. <strong>Systems</strong> Operator<br />

E. TECHNICIAN SERIES (E1-D2)<br />

E1. Reserved<br />

E2. Communications Technician<br />

F. SUPPORT SERIES (F1-F6)<br />

F1. Sr. Tech Writer<br />

F2. Tech Writer<br />

F3. Administrative Support/ Graphics Specialist<br />

F4. Help Desk Manager<br />

F5. Help Desk Specialist<br />

F6. Technical Typist


SKILL CATEGORY REQUIREMENTS<br />

1. QUALIFICATION REQUIREMENTS. To perform on this schedule, contractor personnel must meet the<br />

minimum requirement for the skill categories described herein. In addition to the total and specialized<br />

experience defined in the skill categories, specific areas of required expertise may be further defined in a<br />

Government task request.<br />

2. TASK LEADER. Where the size of a task order warrants, a task leader shall be named for the task order<br />

by BBN to manage BBN’s efforts.<br />

3. SUBSTITUTION OF EDUCATION FOR EXPERIENCE. A Bachelor's degree or higher may be<br />

substituted for the general and specialized experience for those labor categories requiring a high school<br />

diploma. Substitution shall be approved by the COTR.<br />

4. SUBSTITUTION OF EXPERIENCE FOR EDUCATION. Substitution of experience for education is<br />

not allowed for some of the categories. The restriction has been identified within the category descriptions<br />

where it applies. The substitution rate for categories with no restriction will be two(2) years of experience<br />

for one(1) year of education unless otherwise specified. Substitution shall be approved by the COTR.<br />

5. MINIMUM/GENERAL EXPERIENCE & EDUCATION FORMAT. The minimum experience and<br />

educational requirements for each skill category are as follows:<br />

(1) Experience Requirements.<br />

(a) Total Experience. Minimum years of general experience in information systems technology<br />

(b) Specialized Experience. Minimum specific experience required directly relates to the particular<br />

skill category and level. The experience is not in addition to but is a part of the general experience<br />

required in paragraph a. Required experience may be further defined in the task order.<br />

(c) Task Leader. Indicates this category may serve as a task leader on one or more task orders.<br />

Management experience will be required since the category qualifications do not require<br />

managerial experience. Task leaders must have supervisory or project leader experience. This<br />

experience is not in addition to the experience requirements for the skill category. Project leader<br />

experience is experience that demonstrates an individual's ability to accomplish projects/tasks<br />

through others.<br />

(2) Functional Responsibility. This section will contain a description of duties representative of the<br />

position.<br />

(3) Education and Other Requirements. Minimum educational requirements needed to qualify for the<br />

position. The COTR may approve substitutions of experience for education if the COTR determines<br />

the experience is superior in nature and provides the skills at a level necessary to successfully perform<br />

the duties of the position.<br />

(a) Substitution. Permitted substitutions or a statement that substitutions not allowed for this category.


A. MANAGEMENT (A1-A3)<br />

These positions provide contractor management, senior level managers, and technical support for complex<br />

analysis tasks in the area of information technology. Such personnel will interface directly with<br />

government personnel in day-to-day management.<br />

A1: PROGRAM MANAGER<br />

(1) Experience requirements:<br />

(a) Total Experience. Fifteen (15) years of progressive experience in the development of systems<br />

in broad-based information technology (IT) settings involving the use of contemporary tools and<br />

techniques for information systems development.<br />

(b) Specialized Experience. Ten (10) years of specific experience in project development from<br />

inception to deployment, demonstrated ability to provide guidance and direction in tasks of<br />

varying levels of size and scope of effort, proven expertise in the management and control of<br />

funds and resources, demonstrated capability in managing multi-task contracts of this type and<br />

complexity envisioned for this schedule<br />

(2) Functional Responsibility. Serves as the contractor's single program manager for a large, complex<br />

task order (or a group of task orders affecting the same common/standard/migration system), and shall<br />

be the contractor's authorized interface with the Government authorized representative, government<br />

management personnel and customer agency representatives. Responsible for formulating and<br />

enforcing work standards, assigning contractor schedules, reviewing work discrepancies, supervising<br />

contractor personnel and communicating policies, purposes, and goals of the organization to<br />

subordinates. Shall be responsible for the overall contractor’s performance. Plans and supervises<br />

multiple projects and/or task orders involving complex information systems software development.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering, Business or other<br />

related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Master of Sciences degree (in the fields described in section b above): thirteen (13)<br />

years general experience of which at least nine (9) years specialized experience is required<br />

– With a Ph.D. (in the fields described in b above) twelve (12) years general experience of<br />

which at least eight (8) years must be specialized experience<br />

A2: PROJECT MANAGER<br />

(1) Experience requirements:<br />

(a) Total Experience. Twelve (12) years of progressive experience in the development of systems<br />

in broad-based information technology (IT) settings involving the use of contemporary tools and<br />

techniques for information systems development; may work under the guidance of a Program<br />

Manager<br />

(b) Specialized Experience. Nine (9) years of specific experience in project development from<br />

inception to deployment, demonstrated ability to provide guidance and direction in tasks of<br />

varying levels of size and scope of effort, proven expertise in the management and control of<br />

funds and resources, demonstrated capability in managing multi-task contracts of this type and<br />

complexity envisioned for this schedule


(2) Functional Responsibility. Serves as the project manager for a large, complex task order (or a group<br />

of task orders affecting the same common/standard/migration system) and shall assist the Program<br />

Manager in working with the Government’s authorized representative, the task order-level COTR(s),<br />

government management personnel and customer agency representatives. Under the guidance of the<br />

Program Manager, responsible for the overall management of the specific task order(s) and insuring<br />

that the technical solutions and schedules in the task order are implemented in a timely manner.<br />

Performs enterprise wide horizontal integration planning and interfaces to other functional systems.<br />

Plans and supervises multiple projects and/or task orders involving complex information systems<br />

software development<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering, Business or other<br />

related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Masters degree (in the fields described in section b above): ten (10) years general<br />

experience of which at least seven (7) years specialized experience is required<br />

– With a Ph.D. (in the fields described in b above) eight (8) years general experience of which<br />

at least six (6) years must be specialized experience<br />

A3. PROJECT ADMINISTRATOR<br />

(1) Experience Requirements:<br />

Four (4) or more years experience, preferably in finance, contract administration, database<br />

management or administration of technical projects<br />

(2) Functional Responsibility. Maintains computer and manual files regarding program costs and<br />

schedules , and other administrative matters. Analyzes program cost/schedule performance, and<br />

prepares reports for Program Managers. Alerts Program Managers to significant variances or other<br />

extraordinary items. Reviews reports submitted by technical staff, and initiates corrective procedures<br />

when errors are suspected. Provides data needed for estimating expenses, budgets, contractual<br />

deliverables<br />

(3) Education Requirements. BS/BA or equivalent experience<br />

TECHNOLOGY SERIES (A15-A23)<br />

A15: CHIEF TECHNOLOGIST<br />

(1) Experience requirements:<br />

(a) Total Experience. Seventeen (17) years of experience in providing expert, independent services<br />

and leadership in specialized technical areas. Provides expertise on an as needed basis to all task<br />

assignments while coordinating with team members to ensure the problem has been properly<br />

defined and that the solution satisfied requirements. Possesses requisite knowledge and expertise<br />

so recognized in the professional community that the Government is able to qualify the individual<br />

as an expert in the field for a specific Task Assignment. Demonstrates exceptional oral and written<br />

communications skills<br />

(b) Specialized Experience. Thirteen (13) years of specific experience is required while<br />

demonstrating progressive accomplishments as an expert in large and complex information<br />

technology systems implementations. Expertise is applied across multiple information technology<br />

platforms and the integration of diverse architectures. Must demonstrate the ability to work


independently and lead large technologically oriented teams focused on a specific problem or<br />

requirements set. Demonstrates exceptional oral and written communications skills<br />

(2) Functional Responsibility. Serves as a technology expert in the architecture and development of<br />

large systems requiring state-of-art technology that is based on complex engineering techniques and/or<br />

processes. Establishes system requirements using analysis of enterprise-wide or large scale information<br />

systems to determine critical features and establishing performance models to ensure the viability of<br />

the required tasks, the interrelationships of the tasks, and that a recommended solution will meet all<br />

requirements in an effective manner. Designs systems architectures that include software, hardware,<br />

and communications to support the total set of system requirements as well as provide for present and<br />

future cross-functional requirements and interfaces. Ensures these systems are compatible and in<br />

compliance with the standards for open systems architectures, the Open <strong>Systems</strong> Interconnection (OSI)<br />

and International Standards Organization (ISO) reference models, and profiles of standards - such as<br />

Institute of Electrical and Electronic Engineers (IEEE) Open <strong>Systems</strong> Environment (OSE) reference<br />

model - as they apply to the implementation and specification of Information Management (IM)<br />

solution of the application platform, across the application program interface (API), and the external<br />

environment/software application. Ensures that the common operating environment is compliant with<br />

agency standards. Evaluates analytically and systematically problems of work flows, organization, and<br />

planning and develops appropriate corrective action.<br />

(3) Education and Other Requirements. A Master of Science degree from an accredited university with<br />

a major in Engineering, Computer Science or other related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Ph.D. (in the fields described in b above) fourteen (14) years general experience of<br />

which at least ten (10) years must be specialized experience<br />

– With a Bachelor of Science degree in Engineering, Computer Science or other related<br />

scientific or technical discipline and twenty (20) years general experience of which at least<br />

fifteen (15) years must be specialized experience, a Masters degree is not required<br />

A16: PRINCIPAL TECHNOLOGIST<br />

(1) Experience requirements:<br />

(a) Total Experience. Fifteen (15) years of experience in providing expert, independent services<br />

and leadership in specialized technical areas. Provides expertise on an as needed basis to all task<br />

assignments while coordinating with team members to ensure the problem has been properly<br />

defined and that the solution satisfied requirements. Possesses requisite knowledge and expertise<br />

so recognized in the professional community that the Government is able to qualify the individual<br />

as an expert in the field for a specific Task Assignment. Demonstrates exceptional oral and<br />

written communications skills<br />

(b) Specialized Experience. Twelve (12) years of specific experience is required while<br />

demonstrating progressive accomplishments as an expert in large and complex information<br />

technology systems implementations. Expertise is applied across multiple information technology<br />

platforms and the integration of diverse architectures. Must demonstrate the ability to work<br />

independently or under only general direction<br />

(2) Functional Responsibility. Serves as a technology expert in the architecture and development of<br />

large systems requiring state-of-art technology that is based on complex engineering techniques and/or<br />

processes. Establishes system requirements using analysis of enterprise-wide or large scale information<br />

systems to determine critical features and establishing performance models to ensure the viability of<br />

the required tasks, the interrelationships of the tasks, and that a recommended solution will meet all<br />

requirements in an effective manner. Designs systems architectures that include software, hardware,


and communications to support the total set of system requirements as well as provide for present and<br />

future cross-functional requirements and interfaces. Ensures these systems are compatible and in<br />

compliance with the standards for open systems architectures, the Open <strong>Systems</strong> Interconnection (OSI)<br />

and International Standards Organization (ISO) reference models, and profiles of standards - such as<br />

Institute of Electrical and Electronic Engineers (IEEE) Open <strong>Systems</strong> Environment (OSE) reference<br />

model - as they apply to the implementation and specification of Information Management (IM)<br />

solution of the application platform, across the application program interface (API), and the external<br />

environment/software application. Ensures that the common operating environment is compliant with<br />

agency standards. Evaluates analytically and systematically problems of work flows, organization, and<br />

planning and develops appropriate corrective action<br />

(3) Education and Other Requirements. A Master of Science degree from an accredited university with<br />

a major in Engineering, Computer Science or other related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Ph.D. (in the fields described in b above) twelve (12) years general experience of<br />

which at least nine (9) years must be specialized experience<br />

– With a Bachelor of Science degree in Engineering, Computer Science or other related<br />

scientific or technical discipline and seventeen (17) years general experience of which at<br />

least thirteen (13) years must be specialized experience, a Masters degree is not required<br />

A17: DIVISIONAL TECHNOLOGIST<br />

(1) Experience requirements:<br />

(a) Total Experience. Twelve (12) years of experience in providing expert, independent services<br />

and leadership in specialized technical areas. Provides expertise on an as needed basis to all task<br />

assignments while coordinating with team members to ensure the problem has been properly<br />

defined and that the solution satisfied requirements. Possesses requisite knowledge and expertise<br />

to be recognized as a specialist in the field for a specific Task Assignment<br />

(b) Specialized Experience. Ten (10) years of specific experience is required while demonstrating<br />

a progressive accomplishment as an expert in large and implementing complex information<br />

technology systems. Expertise is applied across multiple information technology platforms and<br />

the integration of diverse architectures. Must demonstrate the ability to work independently or<br />

under only general direction<br />

(2) Functional Responsibility. Serves as a technology expert in the architecture and development of<br />

large systems requiring state-of-art technology that is based on complex engineering techniques and/or<br />

processes. Establishes system requirements using analysis of enterprise-wide or large scale information<br />

systems to determine critical features and establishing performance models to ensure the viability of<br />

the required tasks, the interrelationships of the tasks, and that a recommended solution will meet all<br />

requirements in an effective manner. Designs systems architectures that include software, hardware,<br />

and communications to support the total set of system requirements as well as provide for present and<br />

future cross-functional requirements and interfaces. Ensures these systems are compatible and in<br />

compliance with the standards for open systems architectures, the Open <strong>Systems</strong> Interconnection (OSI)<br />

and International Standards Organization (ISO) reference models, and profiles of standards - such as<br />

Institute of Electrical and Electronic Engineers (IEEE) Open <strong>Systems</strong> Environment (OSE) reference<br />

model - as they apply to the implementation and specification of Information Management (IM)<br />

solution of the application platform, across the application program interface (API), and the external<br />

environment/software application. Ensures that the common operating environment is compliant with<br />

agency standards. Evaluates analytically and systematically problems of work flow, organization, and<br />

planning and develops appropriate corrective action


(3) Education and Other Requirements. A Master of Science degree from an accredited university with<br />

a major in Engineering, Computer Science or other related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Ph.D. (in the fields described in b above) ten (10) years general experience of which<br />

at least nine (9) years must be specialized experience.<br />

– With a Bachelor of Science degree in Engineering, Computer Science or other related<br />

scientific or technical discipline and fifteen (15) years general experience of which at least<br />

eleven (11) years must be specialized experience, a Masters degree is not required<br />

A18: SENIOR TECHNICAL PROFESSIONAL<br />

(1) Experience requirements:<br />

(a) Total Experience. Twelve (12) years of progressive experience in the development of systems<br />

in broad-based information technology (IT) settings providing in-depth subject matter expertise<br />

and an ability to translate these into system requirements, systems architecture, and research,<br />

development, and test tasks. Possesses requisite knowledge and expertise to be recognized as a<br />

specialist in the field for a specific Task Assignment<br />

(b) Specialized Experience. Ten (10) years of superior functional knowledge of task order specific<br />

requirements, or developing functional requirements for complex integrated ADP systems. Must<br />

demonstrate the ability to work independently or under only general direction<br />

(2) Functional Responsibility. At a large-scale information system or enterprise-wide level, analyze<br />

user needs to determine functional and cross-functional requirements. Performs functional allocation<br />

to identify required tasks and their interrelationships. Applies business process improvement practices<br />

to re-engineer methodologies/principles and business process modernization projects. Applies, as<br />

appropriate, activity and data modeling, transaction flow analysis, internal control and risk analysis and<br />

modern business methods and performance measurement techniques. Assist in establishing standards<br />

for information systems procedures. Develops and applies organization-wide information models for<br />

use in designing and building integrated, shared software and database management systems.<br />

Constructs sound, logical business improvement opportunities consistent with corporate Information<br />

Management guiding principles, cost savings, and open system architecture objectives<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited university<br />

with a major in Computer Science, Engineering, or other related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Ph.D. (in the fields described in b above) six (6) years general experience of which<br />

at least four (4) years must be specialized experience<br />

– With a Master of Sciences degree (in the fields described in section b above): nine (9) years<br />

general experience of which at least six (6) years specialized experience is required<br />

A19: TECHNICAL PROFESSIONAL<br />

(1) Experience requirements.<br />

(a) Total Experience. Ten (10) years of progressive experience in systems analysis and computer<br />

programming in highly complex and broad-based information technology (IT) settings providing<br />

in-depth subject matter expertise and an ability to translate these into system requirements,


systems architecture, and research, development and test tasks. In depth experience in the use of<br />

contemporary communications systems, computer hardware, relational data base technologies, and<br />

high order programming languages<br />

(b) Specialized Experience. Eight (8) years of superior functional knowledge of task order specific<br />

requirements, or developing functional requirements for complex integrated ADP systems. Should<br />

have proven expertise in the management and control of funds and resources and demonstrated<br />

capability in managing multi-task task orders. Must demonstrate the ability to work independently<br />

or under only general direction<br />

(2) Functional Responsibility. At a large-scale complex information system or enterprise-wide level,<br />

analyze user needs to determine functional and cross-functional requirements. Performs functional<br />

allocation to identify required tasks and their interrelationships. Applies business process improvement<br />

practices to re-engineer methodologies/principles and business process modernization projects.<br />

Applies, as appropriate, activity and data modeling, transaction flow analysis, internal control and risk<br />

analysis and modern business methods and performance measurement techniques. Assist in<br />

establishing standards for information systems procedures. Develops and applies organization-wide<br />

information models for use in designing and building integrated, shared software and database<br />

management systems. Constructs sound and logical improvement opportunities consistent with<br />

corporate Information Management guiding principles, cost savings, and open system architecture<br />

objectives<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited university<br />

with a major in Computer Science, Engineering, or other related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Ph.D. (in the fields described in b above) three (3) years specialized<br />

– With a Master of Sciences degree (in the fields described in section b above): six (6) years<br />

general experience of which at least four (4) years specialized experience is required<br />

A20: STAFF TECHNICAL PROFESSIONAL<br />

(1) Experience requirements:<br />

(a) Total Experience. Eight (8) years of progressive experience in systems analysis and computer<br />

programming in highly complex and broad-based information technology (IT) settings involving<br />

the use of contemporary communications systems, computer hardware, relational data base<br />

technologies, and high order programming languages<br />

(b) Specialized Experience. Six (6) years of specific experience in large, complex information<br />

systems software development projects. Must have demonstrated expertise through effective use<br />

of state-of-the-art development tools and models. Must have proven expertise in the effective use<br />

of highly specialized personnel resources and a demonstrated capability in managing multi-task<br />

activities simultaneously<br />

(2) Functional Responsibility. At a large-scale complex information system or enterprise-wide level,<br />

analyze user needs to determine functional and cross-functional requirements. Performs functional<br />

allocation to identify required tasks and their interrelationships. Applies business process improvement<br />

practices to re-engineer methodologies/principles and business process modernization projects.<br />

Applies, as appropriate, activity and data modeling, transaction flow analysis, internal control and risk<br />

analysis and modern business methods and performance measurement techniques. Assist in<br />

establishing standards for information systems procedures. Develops and applies organization-wide<br />

information models for use in designing and building integrated, shared software and database<br />

management systems. Constructs sound and logical improvement opportunities consistent with


corporate Information Management guiding principles, cost savings, and open system architecture<br />

objectives.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited university<br />

with a major in Computer Science, Engineering, or other related scientific or technical discipline.<br />

(a) Substitution.<br />

– With a Master of Sciences degree (in the fields described in section b above): five (5) years<br />

general experience of which at least four (4) years specialized experience is required<br />

A21: SENIOR PROJECT ADMINISTRATOR<br />

(1) Experience Requirements<br />

(a) Total Experience. Six (6) years progressive experience in IS/ADP systems administration<br />

(b) Specialized Experience. Three (3) years intensive and progressive specific experience in the<br />

administration of complex data systems<br />

(2) Functional Responsibility. Specifies proper types of files organization, indexing methods, and<br />

security procedures. Advises project teams on the design of complex databases (e.g., schema and subschema<br />

details). Defines specialized aspects of user's data base administrator documentation. Performs<br />

detailed comparisons of various data base systems. Performs duties in a complex, distributed,<br />

heterogeneous computing environment, which may involve different types of hardware platforms,<br />

operating systems applications, and network environments. Provides expertise in data storage systems.<br />

Performs administration tasks (installing, maintaining, monitoring, recovering, rebuilding, upgrading,<br />

patching and performance tuning). Implements software solutions for performance enhancement,<br />

operator interface, and increased user capability. Augments other skill categories by providing unique<br />

IS/ADP systems administration knowledge in areas that require in-depth current knowledge of a<br />

specialized IS discipline. Such specialized knowledge can only be achieved through intensive,<br />

extensive, and continuous application of the specialty at a level exceeding that of the more general and<br />

broad based IS requirements of the skill category series<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited university<br />

with a major in Computer Science, Engineering, or other related scientific or technical discipline<br />

(a) Substitution:<br />

– With a Master of Sciences degree (in the fields described in section b above): four (4) years<br />

general experience of which at least two (2) years specialized experience is required<br />

A22: SENIOR DATA CONTROL SPECIALIST<br />

(1) Experience requirements:<br />

(a) Total Experience. Five (5) years progressive experience in the management Data Base <strong>Systems</strong><br />

and their administration<br />

(b) Specialized Experience. Three (3) years intensive and progressive specific experience in the<br />

administration of complex data systems<br />

(2) Functional Responsibility. Performs assigned portions of managing the data input into complex<br />

information systems. Analyzes and administers data for both the developing team and the customer.<br />

Handles daily administrative tasks, produces and edits technical reports based on data system<br />

processing, monitors use of data and performs updates as required. Participates in all phases of system


development with emphasis on the data collection, input, documentation, and acceptance phases.<br />

Designs and prepares technical reports and related documentation, and makes charts and graphs to<br />

record results<br />

(3) Education and Other Requirements. An Associate's degree from an accredited college or university<br />

in Computer Science, Engineering or other related scientific or technical discipline<br />

(a) Substitution. Substitution not allowed for this category.<br />

B. NETWORK SERIES (B1-B22)<br />

These positions provide contractor management, senior level managers, and technical support for network<br />

engineering tasks in the area of information technology. Such personnel will interface directly with<br />

government personnel in day-to-day management.<br />

B1: Senior <strong>Network</strong> Engineer<br />

(1) Experience Requirements:<br />

(a) Total Experience. Five (5) years or more of progressive experience in planning, designing and<br />

analyzing data or telecommunications networks. This experience must demonstrate a working<br />

knowledge of Ethernet, FDDI, frame relay and ATM, and a working knowledge of operating<br />

systems and protocols such as Novell, NT, UNIX, SNA and TCP/IP. Must have experience with<br />

network analysis/management tools and techniques and be familiar with PCs in a client server<br />

environment. Must be familiar with IT and long distance and local carrier management.<br />

Knowledge of computer languages such as C, C++, SQL is a plus. Supervisory or project leader<br />

experience is also required.<br />

(2) Functional Responsibility. Responsible for the design and implementation of data communications<br />

or telecommunications networks. Plans and monitors the installation of communication circuits and<br />

recommends enhancements. Manages and monitors LANs and associated equipment (e.g., bridges,<br />

routers, hubs, modem pools, gateways, etc.). Analyzes interface requirements between WANs and<br />

other computer networks. Analyzes network characteristics (e.g., traffic, connect time, transmission<br />

speeds, packet sizes and throughput). Conducts short and long term planning to meet communications<br />

system requirements.<br />

3) Education and Other Requirements. A Bachelor of Science or Masters of Science degree from an<br />

accredited college or university with a major in Computer Science, Information <strong>Systems</strong>, Engineering<br />

other related scientific or technical discipline.<br />

4) Substitution. Six (6) or more years direct network experience, Bachelor of Science or Bachelor of<br />

Arts degree from an accredited college or university with a major in a non-technical discipline.<br />

Demonstrated network aptitude and depth of overall network familiarity based upon experience.<br />

B2: <strong>Network</strong> Engineer<br />

(1) Experience Requirements.<br />

(a) Total Experience. Two (2) to five (5) years network experience<br />

(2) Functional Responsibility. Duties are performed under the supervision of a senior engineer or<br />

technical project manager. Assists in the design and implementation of LAN/WANs using hub and<br />

router technology. Performs hardware/software analyses to provide comparative data of performance<br />

characteristics and suitability within the existing systems environment. Prepares trade-off studies and


evaluations for vendor equipment. Assists in generating network monitoring and performance reports<br />

for LAN/WANs utilization studies. Recommends network design changes/enhancements for improved<br />

system availability and performance. Knowledge includes demonstrated capability in at least one<br />

primary network element, such as operating systems, platforms or protocols<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering or other related<br />

scientific or technical discipline<br />

a) Substitution. Three (3) to six (6) years direct network experience, Bachelor of Science or<br />

Bachelor of Arts degree from an accredited college or university with a major in a non-technical<br />

discipline. Demonstrated network aptitude based upon experience<br />

B3: Junior <strong>Network</strong> Engineer<br />

(1) Experience Requirements:<br />

(a) Total Experience. Minimum required. Entry level position. Zero to two (2) years network<br />

experience<br />

(2) Functional Responsibility. Duties are performed under the direct guidance of a senior engineer.<br />

Assists in the design and implementation of LAN/WANs using hub and router technology. Performs<br />

hardware/software analyses to provide comparative data of performance characteristics and suitability<br />

within the existing systems environment. Assists in generating network monitoring and performance<br />

reports for LAN/WANs utilization studies. Provides input for network design changes/enhancements<br />

for improved system availability and performance.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering or other related<br />

scientific or technical discipline.<br />

(a) Substitution. One (1) to three (3) years direct network experience, Bachelor of Science or<br />

Bachelor of Arts degree from an accredited college or university with a major in a non-technical<br />

discipline. Demonstrated network aptitude based upon experience.<br />

B4: Senior <strong>Systems</strong> Engineer<br />

(1) Experience Requirements:<br />

a) Total Experience. Five (5) years or more of intensive and progressive specific experience in<br />

planning, designing and analyzing telecommunications networks. This experience must include<br />

demonstrated knowledge of Ethernet, FDDI, frame relay and ATM, and a working knowledge of<br />

operating systems and protocols such as Novell, NT, UNIX, SNA and TCP/IP. Must have<br />

experience with network analysis/management tools and techniques and be familiar with PCs in a<br />

client server environment. Must be familiar with IT and long distance and local carrier<br />

management. Demonstrated ability as a supervisor or project leader essential. Highest skills in<br />

written and oral communications needed. Knowledge of computer languages such as C, C++,<br />

SQL, HTML, is a strong plus. Supervisory or project leader experience is also essential.<br />

(2) Functional Responsibility. Assists in the design and implementation of LAN/WANs using hub and<br />

router technology. Performs hardware/software analyses to provide comparative data of performance<br />

characteristics and suitability within the existing systems environment. Prepares trade-off studies and<br />

evaluations for vendor equipment. Assists in generating network design changes/enhancements for<br />

improved system availability and performance.


(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering or other related<br />

scientific or technical discipline.<br />

a) Substitution. Six (6) or more years direct network experience, Bachelor of Science or Bachelor<br />

of Arts degree from an accredited college or university with a major in a non-technical discipline.<br />

Demonstrated system-level network aptitude based upon experience. Demonstrated technical and<br />

project leadership ability.<br />

B5: <strong>Systems</strong> Engineer<br />

(1) Experience Requirements:<br />

a) Total Experience. Three (3) to five (5) years of intensive and progressive specific experience in<br />

planning, designing and analyzing telecommunications networks. This experience must include<br />

demonstrated knowledge of Ethernet, FDDI, frame relay and ATM, and a working knowledge of<br />

operating systems and protocols such as Novell, NT, UNIX, SNA and TCP/IP. Must be familiar<br />

with network analysis / management tools and techniques and be familiar with PCs in a client<br />

server environment.<br />

(2) Functional Responsibility. Assists in the design and implementation of LAN/WANs using hub and<br />

router technology. Performs hardware/software analyses to provide comparative data of performance<br />

characteristics and suitability within the existing systems environment. Prepares trade-off studies and<br />

evaluations for vendor equipment. Assists in generating network monitoring and performance reports<br />

for LAN/WANs utilization studies. Assists with network design changes/enhancements for improved<br />

system availability and performance.<br />

(3) Education and Other Requirements. A Bachelor of Science or Masters of Science degree from an<br />

accredited college or university with a major in Computer Science, Information <strong>Systems</strong>, Engineering<br />

or other related scientific or technical discipline.<br />

a) Substitution. Four (4) to seven (7) years direct network experience, Bachelor of Science or<br />

Bachelor of Arts degree from an accredited college or university with a major in a non-technical<br />

discipline. Demonstrated system-level network aptitude based upon experience.<br />

B6: Junior <strong>Systems</strong> Engineer<br />

(1) Experience Requirements:<br />

a) Total Experience. One (1) to three (3) years of progressive specific experience in planning,<br />

designing and analyzing telecommunications networks. This experience must include familiarity<br />

with Ethernet, FDDI, frame relay and ATM, and a working knowledge of operating systems and<br />

protocols such as Novell, NT, UNIX, SNA and TCP/IP. Must be familiar with PCs in a client<br />

server environment.<br />

(2) Functional Responsibility. Assists in the design and implementation of LAN/WANs using hub<br />

and router technology. Performs hardware/software analyses to provide comparative data of<br />

performance characteristics and suitability within the existing systems environment. Assists with<br />

changes/enhancements for improved system availability and performance.<br />

(3) Education and other requirement. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering or other related<br />

scientific or technical discipline.


(a) Substitution. Two (2) to four (4) years direct network experience, Bachelor of Science or<br />

Bachelor of Arts degree from an accredited college or university with a major in a non-technical<br />

discipline. Demonstrated system-level network aptitude based upon experience.<br />

B7: Sustaining Engineer<br />

(1) Experience Requirements:<br />

(a) Total Experience. Three (3) or more years of intensive and progressive specific experience in<br />

planning, supporting and analyzing telecommunication networks. This experience must include<br />

demonstrated knowledge of network data transport protocols such as Ethernet, frame relay and<br />

ATM, and a working knowledge of operating systems and protocols such as Novell, NT, UNIX,<br />

SNA, and TCP/IP. Must have practical experience with network management tools.<br />

(2) Functional Responsibility. Assists in the design and implementation of LAN/WANs using hub and<br />

router technology. Performs hardware/software analyses to provide comparative data of performance<br />

characteristics and suitability within the existing systems environment. Prepares trade-off studies and<br />

evaluations for vendor equipment. Directly involved with network monitoring and performance data<br />

collection and presentation for LAN/WANs utilization studies. Recommends network design<br />

changes/enhancements for improved system availability and performance.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering or other related<br />

scientific or technical discipline.<br />

(a) Substitution. Four (4) or more years experience and less than a Bachelor of Science or<br />

Bachelor of Arts degree completed in a technical or non-technical discipline. Proven ability to<br />

work effectively individually or as part of a project team. Experience as a project leader is a plus.<br />

B8: Junior Sustaining Engineer<br />

(1) Experience Requirements:<br />

One (1) to three (3) years direct network experience<br />

(2) Functional Responsibility. Duties are performed under the direct guidance of a senior engineer, or<br />

project manager. Assists in the design and implementation of LAN/WANs using hub and router<br />

technology. Performs hardware/software analyses to provide comparative data of performance<br />

characteristics and suitability within the existing systems environment. Directly involved with<br />

network monitoring and performance data collection and presentation. Assists with network design<br />

changes/enhancements for improved system availability and performance. Generally involved with<br />

maintenance and control of a network, and its management center.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in a non-technical discipline<br />

(a) Substitution. Two (2) to four (4) years experience and less than a Bachelor of Science or<br />

Bachelor of Arts degree completed in a technical or non-technical discipline<br />

B9: Senior Sales Engineer<br />

(1) Experience Requirements:


a) Total Experience. Seven (7) or more years of intensive and progressive specific experience in<br />

planning, designing and analyzing telecommunications networks. This experience must include<br />

demonstrated knowledge of legacy network protocols, as well as knowledge of Ethernet, FDDI,<br />

frame relay and ATM, and a working knowledge of operating systems and protocols such as NT,<br />

UNIX, SNA and TCP/IP. Must have experience with network analysis/management techniques<br />

and be familiar with PCs in a client server environment. Must be familiar with IT and long<br />

distance and local carrier management. Highest skills in written and oral communication.<br />

Experience as a supervisor or task leader essential. Knowledge of computer languages is a plus.<br />

(b) Task Leader. Indicates this category may serve as a task leader on one or more task orders.<br />

Management experience will be required since the category qualifications do not require<br />

managerial experience. Task leaders must have supervisory or project leader experience. This<br />

experience is not in addition to the experience requirements for the skill category. Project leader<br />

experience is experience that demonstrated an individual’s ability to accomplish projects/tasks<br />

through others.<br />

(2) Functional Responsibility. Responsible for direct or indirect involvement in the design and<br />

implementation of LAN/WANs using hub and router technology. Performs hardware/software<br />

analyses to provide comparative data of performance characteristics and suitability within the existing<br />

systems environment. Prepares trade-off studies and evaluations for vendor equipment. Recommends<br />

network design changes/enhancements for improved system availability and performance.<br />

(3) Education and Other Requirements. A Bachelor of Science or Masters of Science degree from an<br />

accredited college or university with a major in Computer Science, Information <strong>Systems</strong>, Engineering<br />

or other related scientific or technical discipline.<br />

(a) Substitution. Ten (10) or more years direct network experience, minimum of Bachelor of<br />

Science or Bachelor of Arts degree from an accredited college or university with a major in a nontechnical<br />

discipline. Demonstrated system-level network aptitude based upon experience. Proven<br />

high aptitude for technical and project leadership. Proven ability to work effectively individually<br />

or as part of a project team.<br />

B10: Sales Engineer<br />

(1) Experience Requirements:<br />

a) Total Experience. Five (5) to eight (8) years of intensive and progressive specific experience in<br />

planning, designing and analyzing telecommunications networks. This experience must include<br />

demonstrated knowledge of legacy network protocols, as well as knowledge of Ethernet, FDDI,<br />

frame relay and ATM, and a working knowledge of operating systems and protocols such NT,<br />

UNIX, SNA and TCP/IP. Must be familiar with PCs in a client server environment. Highest<br />

demonstrated skills in written and oral communications. Experience as a supervisor or task leader<br />

essential. Knowledge of computer languages is a plus.<br />

b) Task Leader. Indicates this category may serve as a task leader on one or more task orders.<br />

Management experience will be required since the category qualifications do not require<br />

managerial experience. Task leaders must have supervisory or project leader experience. This<br />

experience is not in addition to the experience requirements for the skill category. Project leader<br />

experience is experience that demonstrates an individual’s ability to accomplish projects/tasks<br />

through others.<br />

(2) Functional Responsibility. Responsible for direct or indirect involvement in the design and<br />

implementation of LAN/WANs using hub and router technology. Performs hardware/software


analyses to provide comparative data of performance characteristics and suitability within the existing<br />

systems environment. Prepares trade-off studies and evaluations for vendor equipment. Recommends<br />

network design changes/enhancements for improved system availability and performance.<br />

(3) Education and Other Requirements. A Bachelor of Science or Masters of Science degree from an<br />

accredited college or university with a major in Computer Science, Information <strong>Systems</strong>, Engineering<br />

or other related scientific or technical discipline.<br />

a) Substitution. Eight (8) or more years direct network experience, Bachelor of Science or<br />

Bachelor of Arts degree from an accredited college or university with a major in a non-technical<br />

discipline. Demonstrated system-level network aptitude based upon experience. Proven high<br />

aptitude for technical and project leadership. Proven ability to work effectively individually or as<br />

part of a project team.<br />

B11: <strong>Network</strong> Security Project Manager<br />

(1) Experience Requirements:<br />

a) Total Experience. Ten (10) years of technical management in the area of network security.<br />

b) Specialized Experience. Four (4) years of specialized experience in the area of designing and<br />

implementing network security architectures in support of both legacy and distributed topologies<br />

(2) Functional Responsibility. Provides direct supervision and management to a team of network<br />

security engineers and analysts with respect to deliverable execution. Responsible for program<br />

management based on work break down structures to accomplish specific network security tasks.<br />

Must be familiar with Microsoft Project and Excel.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business or other related disciplines<br />

a) Substitution. Education may be substituted by an additional two (2) years of experience for each<br />

year of education requirement<br />

B12: <strong>Network</strong> Security Senior Consultant<br />

(1) Experience Requirements.<br />

a) Total Experience. Six (6) years of network security consulting<br />

(b) Specialized Experience. Four (4) years of specialized network security experience in the areas<br />

of PKI, VPN and firewall engineering<br />

(2) Functional Responsibility. Advises customer on procedures and processes on PKI and VPN related<br />

issues in support of distributed architectures based on customer’s network security requirements.<br />

Familiar with firewall installations, configurations, and implementations in support of the customer.<br />

Assists customer with design and implementation of secure network architectures. Familiar with<br />

network security COTS based products.<br />

(3) Education and Other Requirements. A Masters of Science degree from an accredited college or<br />

university with a major in Computer Science, Business or other related disciplines.<br />

a) Substitution. Substitution not allowed for this category.<br />

B13: Senior <strong>Network</strong> Security Engineer


(1) Experience Requirements:<br />

(a) Total Experience. Six (6) years of network security experience.<br />

b) Specialized Experience. Four (4) years of specialized in the area of PKI, VPN and firewall<br />

engineering<br />

(2) Functional Responsibility. Serves as a senior engineer on a team that is responsible for providing<br />

secure solutions in both legacy and distributed environments. Must have hands-on experience with<br />

developing and implementing VPNs using PKI COTS based products. Experienced with conducting<br />

network security test and evaluation processes leading up to certification and accreditation on<br />

distributed networks. Understands and is familiar with the installation, configuration and<br />

implementation of various COTS based firewalls.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business, or other related disciplines<br />

(a) Substitution. Substitution not allowed for this category<br />

B14: <strong>Network</strong> Security Engineer<br />

(1) Experience Requirements:<br />

(a) Total Experience. Four (4) years of network security experience<br />

(b) Specialized Experience. Two (2) years of specialized in the area of firewall engineering and<br />

PKI<br />

(2) Functional Responsibility. Serves as an engineer on a team that is responsible for providing secure<br />

solutions in both legacy and distributed environments. Must have hands-on experience with<br />

developing and implementing firewalls using COTS based products. Experienced with conducting<br />

network security test and evaluation processes leading up to certification and accreditation on<br />

distributed networks. Understands and is familiar with the installation, configuration and<br />

implementation of various PKI encryption products.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business, or other related disciplines.<br />

(a) Substitution. Substitution not allowed for this category.<br />

B15: Junior <strong>Network</strong> Security Engineer<br />

(1) Experience Requirements:<br />

(a) Total Experience. Two (2) years of network security experience.<br />

(2) Functional Responsibility. Serves as a junior engineer on a network security team that is<br />

responsible for providing secure solutions in both legacy and distributed environments. Must have<br />

hands-on experience with developing and implementing firewalls and access control applications,<br />

including MLS, using COTS based products. Some experience with conducting network security test<br />

and evaluation processes leading up to certification and accreditation on distributed networks.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business, or other related disciplines


(a) Substitution. Education may be substituted by an additional 2 years of experience for each<br />

year of education requirement<br />

B16: Senior <strong>Network</strong> Security Analyst<br />

(1) Experience Requirements:<br />

(a) Total Experience. Six (6) years of network security experience<br />

(b) Specialized Experience. Four (4) years of specialized in the area of <strong>Network</strong> Security Policy,<br />

including certification and accreditation processes<br />

(2) Functional Responsibility. Serves as a senior analyst on a team that is responsible for providing<br />

secure solutions in both legacy and distributed environments. Must have hands-on experience with<br />

developing and implementing network security policy and procedure. Working knowledge of<br />

certification and accreditation processes of critical applications in support of both legacy and<br />

distributed network architectures. Familiar with OMB A-130 and DITSCAP requirements<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business, or other related disciplines.<br />

(a) Substitution. Substitution not allowed for this category<br />

B17: <strong>Network</strong> Security Analyst<br />

(1) Experience Requirements:<br />

(a) Total Experience. Four (4) years of network security experience.<br />

(b) Specialized Experience. Two (2) years of specialized in the area of <strong>Network</strong> Security Policy,<br />

including certification and accreditation processes.<br />

(2) Functional Responsibility: Serves as an analyst on a network security team that is responsible for<br />

providing secure solutions in both legacy and distributed environments. Must have hands-on<br />

experience with developing and implementing network security policy and procedure. Working<br />

knowledge of certification and accreditation processes of critical applications in support of both legacy<br />

and distributed network architectures. Familiar with OMB A-130 and DITSCAP requirements<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business or other related disciplines.<br />

(a) Substitution. Substitution not allowed for this category<br />

B18: Junior <strong>Network</strong> Security Analyst<br />

(1) Experience Requirements:<br />

a) Total Experience. Two (2) years of network security experience.<br />

(2) Functional Responsibility. Serves as an analyst on a network security team that is responsible for<br />

providing secure solutions in both legacy and distributed environments. Some hands-on experience<br />

with developing and implementing network security policy and procedure<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Business or other related disciplines.


(a) Substitution. Education may be substituted by an additional 2 years of experience for each year<br />

of education requirement<br />

B19: Senior Technical Writer (<strong>Network</strong> Security)<br />

(1) Experience Requirements:<br />

(a) Total Experience. Five (5) years of technical writing or documentation experience<br />

(b) Specialized Experience. Three (3) years of specialized network security oriented technical<br />

documentation experience.<br />

(2) Functional Responsibility. Prepares and edits network security IT/ADP documentation<br />

incorporating information provided by user, specialist, analyst, programmer, and operations personnel.<br />

Must have a substantial knowledge of the capabilities of network security. Duties include writing,<br />

editing, and graphic presentation of technical information for both technical and non-technical<br />

personnel. Interprets technical documentation standards and prepares documentation according to<br />

standards. Must be capable of working independently. Plans and supervises multiple projects and/or<br />

tasks involving a wide wide-range of IT network security related tasks.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in English, Computer Science, Business or other related disciplines.<br />

a) Substitution. Substitution not allowed for this category<br />

B20: Technical Writer (<strong>Network</strong> Security)<br />

(1) Experience Requirements:<br />

(a) Total Experience. Three (3) years of network security technical writing or documentation<br />

experience<br />

(b) Specialized Experience. One (1) year of specialized network security technical documentation<br />

experience<br />

(2) Functional Responsibility. Prepares and edits network security IT/ADP documentation<br />

incorporating information provided by user, specialist, analyst, programmer, and operations personnel.<br />

Must have a substantial knowledge of the capabilities of network security in support of information<br />

systems. Duties include writing, editing, and graphic presentation of technical information for both<br />

technical and non-technical personnel. Interprets technical network security documentation standards<br />

and prepares documentation according to standards. Must be capable of working independently. This<br />

category provides incidental support for other approved requirements.<br />

(3) Education and Other Requirements. An Associate's degree from an accredited college or university<br />

or two (2) years of college or university study in English, Computer Science or related discipline.<br />

(a) Substitution. Substitution not allowed for this category<br />

B21. <strong>Network</strong> Manager<br />

(1) Experience Requirements:


(a) Total Experience. Five (5) years experience in one or more of the following areas: data<br />

communications engineering, data communications hardware or software analysis, network<br />

administration or management, or data communication equipment installation and maintenance.<br />

(b) Task Leader. Indicates this category may serve as a task leader on one or more task orders.<br />

Management experience will be required since the category qualifications do not require<br />

managerial experience. Task leaders must have supervisory or project leader experience. This<br />

experience is not in addition to the experience requirements for the skill category. Project leader<br />

experience is experience that demonstrates an individual's ability to accomplish projects/tasks<br />

through others.<br />

(2) Functional Responsibility. Performs a variety of network management functions in support of MIS<br />

services related to the operation, performance or availability of data communications networks.<br />

Modifies command language programs, network start up files, assigns/re-assigns network device<br />

logicals, analyzes network performance and recommends adjustments to wide variety of complex<br />

network management functions with responsibility for overall performance and availability of<br />

networks. LAN/WAN consultant skilled in network analysis, integration and tuning. Experience with<br />

cable/LAN meters, protocol analyzers, SNMP and RMON based software products. Knowledge of<br />

Ethernet, FDDI and high speed WAN's and routers. Analyze client LAN's/WAN's, isolate source of<br />

problems, recommend reconfiguration and implementation of new network hardware to increase<br />

performance. Working knowledge of network operating systems. Modifies command language<br />

programs, network start up files, assigns/re-assigns network device logicals. Conducts load balancing<br />

efforts to achieve optimum device utilization and network performance. Manages network E-mail<br />

functions. Establishes mail boxes and monitors mail performance on the network. Coordinates with<br />

engineering groups to resolve hardware problems. Works with customer and operations staff in<br />

scheduling preventative and emergency maintenance activities. May serve as task leader on one or<br />

more task orders.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information Technology, Engineering, or a related<br />

discipline. If applicable, shall be certified as a network engineer for the specific network operating<br />

system as defined in the Government task request. The certification criteria are determined by the<br />

network operating system vendor.<br />

(a) Substitution. Substitution not allowed for this category.<br />

B22. <strong>Network</strong> Administrator<br />

(1) Experience Requirements.<br />

(a) Total Experience. Three (3) years experience in one or more of the following areas: data<br />

communications engineering, data communications hardware or software analysis, network<br />

administration or management, data communication equipment installation and maintenance, or<br />

computer systems administration and management.<br />

(2) Functional Responsibility. Performs a variety of network management functions related to the<br />

operation, performance or availability of data communications networks. Experience with cable/LAN<br />

meters, protocol analyzers, SNMP and RMON based software products. Knowledge of Ethernet, FDDI<br />

and high speed WAN's and routers. Analyze client LAN's/WAN's, isolate source of problems,<br />

recommend reconfiguration and implementation of new network hardware to increase performance.<br />

Working knowledge of network operating systems. Modifies command language programs, network<br />

start up files, assigns/re-assigns network device logicals, participates in load balancing efforts<br />

throughout the network to achieve optimum device utilization and performance. Establishes new user<br />

accounts on the network granting access to required network files and programs. Manages network E-<br />

mail functions. Establishes mail boxes and monitors mail performance on the network. Troubleshoots


network/user problems, presents resolutions for implementation. Prepares a variety of network<br />

resource reports.<br />

(3) Education and Other Requirements. An Associate's degree from an accredited college or<br />

university in a related field, or two (2) years of college or university study in a related field. If<br />

applicable, should be certified as a network administrator for a specific network operating system as<br />

defined in the Government task request. Certification criteria are determined by the network operating<br />

system vendor.<br />

C. RESERVED<br />

a) Substitution. Substitution not allowed for this category<br />

D. COMPUTER OPERATIONS SERIES (D1-D6)<br />

D1. Reserved<br />

D2. Computer <strong>Systems</strong> Analyst<br />

(1) Experience requirements.<br />

(a) Total Experience. Three (3) years progressive experience in the analysis and design of business<br />

or scientific applications using database management systems or high-order programming<br />

languages.<br />

(2) Functional Responsibility. Performs systems analysis, design, programming, documentation, or<br />

implementation of complex system applications and related IT/ADP systems concepts for effective<br />

implementation. Participates in all phases of the software development life cycle with emphasis on the<br />

planning, analysis, programming, testing and acceptance phases. Designs and prepares technical<br />

reports and related documentation, and makes charts and graphs to record results. Prepares and delivers<br />

presentations and briefings as required.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering, or other related<br />

scientific or technical discipline.<br />

(a) Substitution. Substitution not allowed for this category<br />

D3. Applications Engineer<br />

(1) Experience requirements.<br />

(a) Total Experience. Eight (8) years of progressive in managing or performing software<br />

engineering activities.<br />

(b) Specialized Experience. Six (6) years of specific experience working with C++, SQL, and<br />

third/fourth generation languages in the design and implementation of systems and using database<br />

management systems. General experience includes increasing responsibilities in software<br />

engineering activities. Knowledgeable of applicable standards.<br />

(2) Functional Responsibility. Analyzes and studies complex system requirements. Designs software<br />

tools and subsystems to support software reuse and domain analyses and manages their<br />

implementation. Manages software development and support using formal specifications, data flow<br />

diagrams, other accepted design techniques and Computer Aided Software Engineering (CASE) tools.<br />

Estimates software development costs and schedule. Reviews existing programs and assists in making


efinements, reducing operating time, and improving current techniques. Supervises software<br />

configuration management.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in Computer Science, Information <strong>Systems</strong>, Engineering, Business or other<br />

related scientific or technical discipline.<br />

(a) Substitution:<br />

– With a Master degree (in the fields described in section b above): six (6) years general<br />

experience of which at least four (4) years specialized experience is required<br />

– With eleven (11) years of general experience of which at least nine (9) years of specialized<br />

experience, a degree is not required<br />

D4. Operations Manager<br />

(1) Experience: Seven years experience, of which at least give years must be specialized. Specialized<br />

experience includes: supervision and operation experience on a large-scale computer system,<br />

knowledge of hardware, software and operating systems. General experience includes operations<br />

experience on a large scale computer system or a multi-server local area network.<br />

(2) Functional Responsibility: Manages computer operations. Ensures production schedules are met.<br />

Ensures computer system resources are used effectively. Coordinates the resolution of production<br />

related problems. Ensures proper relationships are established between customers, teaming partners,<br />

and vendors to facilitate the delivery of information technology services. Provides users with<br />

computer output. Supervises staff operations.<br />

(3) Educational Requirement(s): A Bachelor's degree in Computer Science, Information <strong>Systems</strong>,<br />

Engineering, Business, or other related discipline.<br />

D5. Reserved<br />

- With a Master's degree (in the fields described in above): five (5) years general experience of<br />

which at least three (3) years must be specialized experience is required<br />

- With ten years of general experience of which at lest eight (8) years must be specialized<br />

experience, a degree is not required<br />

D6. <strong>Systems</strong> operator<br />

(1) Experience: Minimum of three years experience, of which at least two years must be specialized<br />

experience operating a large-scale computer system or a multi-server local area network. Must<br />

demonstrate sufficient knowledge of programming to understand how programs use computer<br />

hardware.<br />

(2) Functional Responsibility: Monitors and supports computer processing. Coordinates input, output,<br />

and file media. Distributes output and controls computer operation which may be mainframe, mini, or<br />

client/server based.<br />

(3) Educational Requirement(s): An Associate's degree in Computer Science, Information <strong>Systems</strong>,<br />

Engineering, Business, or other related discipline is required.<br />

-- With a Bachelor's degree (in the fields described above): two (2) years general experience of<br />

which at least one (1) year must be specialized experience is required


-- With seven (7) years general experience of which at least five (5) years is specialized, a degree<br />

is not required.<br />

E. Technician Series (E1-E2)<br />

E1. RESERVED<br />

E2. Communications Technician<br />

(1) Experience Requirements:<br />

(a) Total Experience. Three (3) years experience installing and maintaining communications and<br />

cable systems. Experience should include termination of voice and data circuits including copper<br />

and fiber house wiring.<br />

(2) Functional Responsibility. Responds to help calls referred by the Help Desk or Customer Support.<br />

Implements, installs, and repairs voice and data cable systems. Creates and maintains records on cable<br />

assignments, terminations and directory headings, telephone, circuit, and other communication<br />

equipment types.<br />

(3) Education and Other Requirements.<br />

(a) A high school diploma<br />

(b) Two (2) years technical school training related field<br />

(c) Substitution. Substitution not allowed for this category<br />

F. Support Series (F1-F6)<br />

F1: SENIOR TECHNICAL WRITER<br />

(1) Experience Requirements.<br />

(a) Total Experience. Five (5) years of technical writing or documentation experience<br />

(b) Specialized Experience. Three (3) years of specialized IT oriented technical documentation<br />

experience<br />

(2) Functional Responsibility. Prepares and edits IT/ADP documentation incorporating information<br />

provided by user, specialist, analyst, programmer, and operations personnel. Must have a substantial<br />

knowledge of the capabilities of computer systems. Duties include writing, editing, and graphic<br />

presentation of technical information for both technical and non-technical personnel. Interprets<br />

technical documentation standards and prepares documentation according to standards. Must be<br />

capable of working independently. Plans and supervises multiple projects and/or tasks involving a<br />

wide range of IT related tasks.<br />

(3) Education and Other Requirements. A Bachelor of Science degree from an accredited college or<br />

university with a major in English, Computer Science, Business, or other related disciplines.<br />

F2. Tech Writer<br />

(a) Substitution. Substitution not allowed for this category.


(1) Experience Requirements:<br />

(a) Total Experience. Three (3) years of technical writing or documentation experience<br />

(b) Specialized Experience. One (1) year of specialized ADP technical documentation experience<br />

(2) Functional Responsibility. Prepares and edits IT/ADP documentation incorporating information<br />

provided by user, specialist, analyst, programmer, and operations personnel. Must have a substantial<br />

knowledge of the capabilities of computer systems. Duties include writing, editing, and graphic<br />

presentation of technical information for both technical and non-technical personnel. Interprets<br />

technical documentation standards and prepares documentation according to standards. Must be<br />

capable of working independently. This category provides incidental support for other approved<br />

requirements.<br />

(3) Education and Other Requirements. An Associate's degree from an accredited college or university<br />

or two (2) years of college or university study in English, Computer Science or related discipline<br />

(a) Substitution. Substitution not allowed for this category<br />

F3. Administrative Support/Graphics Specialist<br />

(1) Experience: At a minimum, one years of specialized experience using commercial automated word<br />

processing (e.g. MS Word, WordPerfect), graphics systems (Harvard, Freelance, PowerPoint, etc.) and<br />

desktop publishing systems. Demonstrated ability to work independently or under only general<br />

direction.<br />

(2) Functional Responsibility: Directly supports Program Manager or Project Manager by maintaining<br />

personnel and other files; prepares correspondence, schedules and coordinates travel. Assists in the<br />

preparation of presentation graphics and supports the development of contract deliverables and reports<br />

by developing and updating graphic presentations to improve the quality and enhance the usability of<br />

these documents. Responsible for integrating the graphics generated with automated tools and the<br />

deliverable documents.<br />

(3) Education: High school diploma and a minimum of two years experience in office administration<br />

and developing graphic/artistic presentations for publications and documents (preferably technical<br />

documentation).<br />

F4. Help Desk Manager<br />

(1) Experience: Minimum of seven years experience. Of which at least five years must be specialized.<br />

Specialized experience includes: management of help desks in a multi-server environment,<br />

comprehensive knowledge of PC operating systems, E.g. DOS, Windows, NT, as well as networking<br />

and mail standards and supervision of help desk employees. General experience includes information<br />

systems development, network and other work in the client/server field, or related fields.<br />

Demonstrated ability to communicate orally in writing and a positive customer service attitude.<br />

(2) Functional Responsibility: Provides daily supervision and direction to staff who are responsible for<br />

phone and in-person support to users in the areas of e-mail, directories, standard Windows desktop<br />

applications, and applications developed or deployed under a particular contract. These personnel<br />

serve at the second point of contact for trouble shooting hardware/software, PC, printer and network<br />

problems<br />

(3) Education: Bachelor's degree in Computer Science, Information <strong>Systems</strong>, Engineering, Business<br />

or other related discipline


-- With a Master's degree (in the fields described above): five years general experience of which<br />

at least three years must be specialized experience is required<br />

-- With ten years general experience of which at least eight years is specialized, a degree is not<br />

required<br />

F5. HELP DESK SPECIALIST<br />

(1) Experience: Minimum of five years experience, of which at least three years must be specialized.<br />

Specialized experience includes; knowledge of PC operating systems, e.g., DOS, Windows, NT, as<br />

well as networking and mail standards and work on a help desk. General experience includes<br />

information systems development and other work in the client/server field, or related fields.<br />

Demonstrated ability to communicate orally and in writing and a positive customer service attitude.<br />

(2) Functional Responsibility: Provides phone and in-person support to users in the areas of e-mail,<br />

directories, standard Windows desktop application, and applications developed under this contract or<br />

predecessors. Serves as the initial point of contact for troubleshooting hardware/software, PC, printer,<br />

and network problems.<br />

(3) Education: An Associate's degree in Computer Science, Information <strong>Systems</strong>, Engineering,<br />

Business, or other related discipline is required.<br />

-- With a Bachelor's degree (in the fields described above): four years general experience of which<br />

at least two years must be specialized experience is required<br />

-- With eight years general experience of which at least six years is specialized, a degree is not<br />

required<br />

F6. TECHNICAL TYPIST<br />

(1) Experience Requirements:<br />

(a) Total Experience. One (1) year of technical typing<br />

(2) Functional Responsibility. Prepares draft and final form technical documents. Must be capable of<br />

typing at average or above average speed. Must be capable of typing technical narratives and data.<br />

Responsible for spelling, grammar, and proper format, and for proofreading finished documents. Must<br />

be capable of using various word processing equipment. This category provides incidental support for<br />

other approved requirements.<br />

(3) Education and Other Requirements. High School diploma<br />

(a) Substitution. Substitution not allowed for this category


<strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong> (FNS)<br />

Contract Number: GS-35F-0440N<br />

GSA Group 70 Schedule Pricing Base Year: March 25, 2003 - March 24, 2004<br />

FNS Facility Base Year Year 2 Year 3 Year 4 Year 5<br />

Management (A1 – A3)<br />

A1. Program Manager $203.71 $211.04 $218.64 $226.51 $234.67<br />

A2. Project Manager $169.15 $175.24 $181.55 $188.08 $194.85<br />

A3. Project Administrator $62.15 $64.39 $66.71 $69.11 $71.59<br />

[A4 through A14 Reserved]<br />

Technology (A15 – A23)<br />

A15. Chief Technologist $297.20 $307.90 $318.98 $330.47 $342.36<br />

A16. Principal Technologist $228.13 $236.34 $244.85 $253.67 $262.80<br />

A17. Divisional Technologist $201.48 $208.73 $216.25 $224.03 $232.10<br />

A18. Senior Technical Professional $171.12 $177.28 $183.66 $190.27 $197.12<br />

A19. Technical Professional $152.80 $158.30 $164.00 $169.90 $176.02<br />

A20. Staff Technical Professional $115.49 $119.65 $123.95 $128.42 $133.04<br />

A21. Senior Project Administrator $95.63 $99.07 $102.64 $106.33 $110.16<br />

A22. Senior Data Control Specialist $90.41 $93.66 $97.04 $100.53 $104.15<br />

B. NETWORK SERIES(B1-B24)<br />

B1. Senior <strong>Network</strong> Engineer $141.42 $146.51 $151.79 $157.25 $162.91<br />

B2. <strong>Network</strong> Engineer $118.67 $122.94 $127.37 $131.95 $136.70<br />

B3. Junior <strong>Network</strong> Engineer $84.60 $87.65 $90.80 $94.07 $97.46<br />

B4. Senior <strong>Systems</strong> Engineer $138.14 $143.11 $148.27 $153.60 $159.13<br />

B5. <strong>Systems</strong> Engineer $124.36 $128.84 $133.48 $138.28 $143.26<br />

B6. Junior <strong>Systems</strong> Engineer $104.69 $108.46 $112.36 $116.41 $120.60<br />

B7. Sustaining Engineer $124.36 $128.84 $133.48 $138.28 $143.26<br />

B8. Junior Sustaining Engineer $113.45 $117.53 $121.77 $126.15 $130.69<br />

B9. Senior Sales Engineer $169.15 $175.24 $181.55 $188.08 $194.85<br />

B10. Sales Engineer $152.80 $158.30 $164.00 $169.90 $176.02<br />

B11. <strong>Network</strong> Security Project Manager $152.80 $158.30 $164.00 $169.90 $176.02<br />

B12. <strong>Network</strong> Security Senior Consultant $171.12 $177.28 $183.66 $190.27 $197.12<br />

B13. Senior <strong>Network</strong> Security Engineer $141.42 $146.51 $151.79 $157.25 $162.91<br />

B14. <strong>Network</strong> Security Engineer $124.36 $128.84 $133.48 $138.28 $143.26<br />

B15. Junior <strong>Network</strong> Security Engineer $113.45 $117.53 $121.77 $126.15 $130.69<br />

B16. Senior <strong>Network</strong> Security Analyst $152.80 $158.30 $164.00 $169.90 $176.02<br />

B17. <strong>Network</strong> Security Analyst $113.45 $117.53 $121.77 $126.15 $130.69<br />

B18. Junior <strong>Network</strong> Security Analyst $90.41 $93.66 $97.04 $100.53 $104.15<br />

B19. Senior Technical Writer, <strong>Network</strong> Security $113.45 $117.53 $121.77 $126.15 $130.69<br />

B20. Technical Writer, <strong>Network</strong> Security $90.41 $93.66 $97.04 $100.53 $104.15<br />

B21 RESERVED<br />

B22. RESERVED<br />

D. Computer Operations Series (D1-D7)<br />

D1. RESERVED<br />

D2. RESERVED


D3 Applications Engineer $124.36 $128.84 $133.48 $138.28 $143.26<br />

D4. RESERVED<br />

D6 RESERVED<br />

E. Technician Series (E1.-E2)<br />

E1. RESERVED<br />

E2. Communications Technician $90.41 $93.66 $97.04 $100.53 $104.15<br />

F. Support Series (F1-F6)<br />

F3. Administrative Support/Graphics Specialist $49.59 $51.38 $53.22 $55.14 $57.13<br />

F4. RESERVED<br />

F5. RESERVED<br />

F6. Technical Typist $49.59 $51.38 $53.22 $55.14 $57.13


<strong>Federal</strong> <strong>Network</strong> <strong>Systems</strong> <strong>LLC</strong> (FNS)<br />

Contract Number: GS-35F-0440N<br />

GSA Group 70 Schedule Pricing Base Year: March 25, 2003 - March 24, 2004<br />

Customer Facility Base Year Year 2 Year 3 Year 4 Year 5<br />

Management (A1 – A3)<br />

A1. Program Manager $145.04 $150.26 $155.67 $161.27 $167.08<br />

A2. Project Manager $118.30 $122.55 $126.97 $131.54 $136.27<br />

A3. Project Administrator $56.07 $58.08 $60.17 $62.34 $64.59<br />

[A4 through A14 Reserved]<br />

Technology (A15 – A23)<br />

A15. RESERVED<br />

A16. Principal Technologist $159.55 $165.30 $171.25 $177.41 $183.80<br />

A17. RESERVED<br />

A18. Senior Technical Professional $101.99 $105.66 $109.47 $113.41 $117.49<br />

A19. Technical Professional $96.36 $99.83 $103.43 $107.15 $111.01<br />

A20. Staff Technical Professional $73.32 $75.96 $78.70 $81.53 $84.47<br />

A21. RESERVED<br />

A22. Senior Data Control Specialist $53.37 $55.29 $57.28 $59.34 $61.48<br />

B. NETWORK SERIES(B1-B24)<br />

B1. Senior <strong>Network</strong> Engineer $98.89 $102.45 $106.14 $109.96 $113.92<br />

B2. <strong>Network</strong> Engineer $86.97 $90.10 $93.35 $96.71 $100.19<br />

B3. Junior <strong>Network</strong> Engineer $49.42 $51.19 $53.04 $54.95 $56.93<br />

B4. Senior <strong>Systems</strong> Engineer $92.92 $96.26 $99.73 $103.32 $107.04<br />

B5. <strong>Systems</strong> Engineer $86.97 $90.10 $93.35 $96.71 $100.19<br />

B6. Junior <strong>Systems</strong> Engineer $56.34 $58.37 $60.47 $62.65 $64.90<br />

B7. Sustaining Engineer $86.97 $90.10 $93.35 $96.71 $100.19<br />

B8. Junior Sustaining Engineer $79.33 $82.18 $85.14 $88.21 $91.38<br />

B9. RESERVED<br />

B10. RESERVED<br />

B11. <strong>Network</strong> Security Project Manager $91.31 $94.59 $98.00 $101.53 $105.18<br />

B12. RESERVED<br />

B13. Senior <strong>Network</strong> Security Engineer $98.89 $102.45 $106.14 $109.96 $113.92<br />

B14. <strong>Network</strong> Security Engineer $86.97 $90.10 $93.35 $96.71 $100.19<br />

B15. Junior <strong>Network</strong> Security Engineer $74.11 $76.78 $79.55 $82.41 $85.38<br />

B16. Senior <strong>Network</strong> Security Analyst $106.87 $110.72 $114.70 $118.83 $123.11<br />

B17. <strong>Network</strong> Security Analyst $79.33 $82.18 $85.14 $88.21 $91.38<br />

B18. Junior <strong>Network</strong> Security Analyst $63.24 $65.52 $67.88 $70.32 $72.85<br />

B19. RESERVED<br />

B20. Technical Writer, <strong>Network</strong> Security $42.03 $43.54 $45.11 $46.73 $48.42<br />

B21 <strong>Network</strong> Manager $103.62 $107.35 $111.22 $115.22 $119.37<br />

B22. <strong>Network</strong> Administrator $56.07 $58.08 $60.17 $62.34 $64.59<br />

D. Computer Operations Series (D1-D7)<br />

D1. RESERVED<br />

D2. Computer <strong>Systems</strong> Analyst $79.33 $82.18 $85.14 $88.21 $91.38


D3 Applications Engineer $86.97 $90.10 $93.35 $96.71 $100.19<br />

D4. Operations Manager $103.62 $107.35 $111.22 $115.22 $119.37<br />

D6. <strong>Systems</strong> Operator $56.07 $58.08 $60.17 $62.34 $64.59<br />

E. Technician Series (E1.-E2)<br />

E1. RESERVED<br />

E2. RESERVED<br />

F. Support Series (F1-F6)<br />

F1. RESERVED<br />

F2. RESERVED<br />

F3. RESERVED<br />

F4. Help Desk Manager $103.62 $107.35 $111.22 $115.22 $119.37<br />

F5. Help Desk Specialist $56.07 $58.08 $60.17 $62.34 $64.59<br />

F6. RESERVED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!