- Contracting with MacB
- Small Business Registration
- OASIS Contract
- Major IDIQ Contracts
- CAAS IV - Contract Information
- EAGLE II
- Current Task Orders
- List of Experience Within DHS
- MacB DHS EAGLE II POCs
- MacB's Integrated Quality Management Solution
- MacB EAGLE II Team Members
- CAAS IV - Contract Information
- Defense System Technical Area Tasks (DS-TATs)
- GSA Schedules
- Alliant GWAC
- Terms and Conditions
Technical Area Tasks (TATs) are separately funded work efforts over and above basic Information Analysis Center (IAC) products and services. SNIM TATs complement the work already being done at the Data & Analysis Center for Software, the Information Assurance Technology Analysis Center, and the Modeling and Simulation Information Analysis Center (DACS, IATAC, and MSIAC). They provide valuable analysis and R&D solutions to tough information assurance, software data and analysis and modeling and simulation problems.
TATs create new scientific and technical information (STI), which is added to the appropriate IAC repository (i.e., DACS, IATAC, or MSIAC), making it readily available to the scientific community. This allows the STI to be researched and reused by others in the community, thus saving federal resources.
TATs are very flexible and can vary from a fraction of a staff year to several staff years. Costs may vary from a few thousand dollars to several million dollars. TATs may be ordered by Department of Defense (DoD) components, other government agencies, industry and academia.
IA-1. Provide studies or analyses pertinent to aspects of historical, technical, scientific, and other information assurance (IA)- related areas. Specific areas of emphasis include emerging technologies relating to the survivability, vulnerability, authenticity, or continuity of DoD information systems (IS); the system security and detection of intrusion on hardware and software-supported systems; the modeling of systems vis-à-vis IA threats; the identification and development of attack detection and mitigation strategies, tools and technologies (including use of the electromagnetic spectrum); or develop indications and warning methodologies and technologies.
IA-2. Develop IA planning framework; assess IA policy, plans, intelligence support, IO incidents or joint IA doctrine; develop procedures and metrics for assessing infrastructure and information dependencies.
IA-3. Review and analyze the documentation of existing IT tactical operational requirements and mission needs statements.
IA-4. Identify and propose mitigation of IA-related IT risks/vulnerabilities for an identified program; conduct IA risk analysis and develop a comprehensive risk management approach.
IA-5. Analyze systems requiring trade-off analysis between commercial off-the-shelf (COTS), performance, and potential vulnerabilities.
IA-6. Provide support in performing a Red Team IA assessment on information systems.
IA-7. Provide technical IA analysis to IA initiatives related to non-terrestrial space.
Software Data and Analysis
SD-1. Establish data analysis procedures, statistical methods, or routines to support studies or conduct investigations of software engineering technology issues or topics or the assessment of state-of-the-art software engineering tools, technologies, and methods.
SD-2. Conduct studies, analyses, experiments, data collection, or other tasks in the development, evaluation, validation, demonstration, or application of software measurement technology for predicting, measuring, or assessing software products and the overall software process. Evaluate and assess the quality of existing user software systems, using current software quality measurement technology to determine quality levels of various factors, such as reliability, flexibility, testability, portability, maintainability, etc.
SD-3. Perform software evaluation that includes conducting detailed needs and risk analysis that would relate the capabilities of the software package to specific mission requirements and priorities.
SD-4. Develop, update, review, or evaluate software engineering standards, specifications, guidebooks, handbooks, or manuals that promote the utilization of modern software engineering technology. Support revision or development of military standards and specifications, problem-solving techniques, or verification/validation of solution sets and protocols.
SD-5. Perform engineering and technology support to assist user organizations with the aspects of software acquisition. Perform activities to test, demonstrate, evaluate, and validate software engineering tools and methods in a controlled environment.
SD-6. Develop life cycle cost models, including research/data collection, analysis, or model development that facilitates software reliability, software testing, model-based testing, security, or interoperability assurance.
SD-7. Provide engineering and analysis in the development of “secure” Internet home pages and web site support.
SD-8. Develop or customize software technology analytical tools, models, decision aids, screening methods and/or techniques to evaluate and support the authenticity, and continuity of DoD, national, commercial, or international information systems.
Modeling and Simulation (M&S)
MS-1. Provide M&S capability for training exercises, mission rehearsals, analytical studies, etc., or identification of viable options for simulation support.
MS-2. Conduct M&S scientific or technical analysis functions tailored to support the M&S community, to include the development of R&D best practices that enhance the ability to access, acquire, collect, analyze, synthesize, generate and report M&S-related technical information.
MS-3. Provide M&S support of program reviews, strategic planning, exercise management, knowledge acquisition, or operations coordination and monitoring.
MS-4. Provide support in executing the approved release of specific M&S software and documentation.
MS-5. Provide support for DoD certification of compliance with high level architecture (HLA) and other M&S standards.
MS-6. Provide support to quantify the impact(s) of simulations, to include defining the measures for determining effectiveness, on overall program success.
MS-7. Conduct assessments of a system’s mapping, vulnerability and survivability. Apply standard verification and validation (V&V) processes to models and simulations, document the V&V results in a standard format, and transition the validation process and lessons learned to DoD and industry users. Provide support in the use of standardized V&V products, compare V&V results with objective model acceptance criteria in support of M&S accreditation.
MS-8. Provide support in the evaluation and improvement of models and databases.
MS-9. Evaluate, develop, or implement collaborative modeling and analysis tools.
Knowledge Management and Information Sharing
KM-1. Conduct scientific, technical, or DoD-related conferences, symposia, or workshops.
KM-2. Develop comprehensive collection of empirical data on the development, operation, or maintenance of a software system.
KM-3. Develop, conduct, or evaluate training which may have included classroom, computer-based-instruction, videotape, distance learning or other forms of instruction.
KM-4. Evaluate, analyze or recommend new technologies, applications or processes to enhance knowledge management and information sharing.
KM-5. Develop advanced collaborative analysis tools that allow for the integration of existing or in-process social networking and intelligence data exploitation tools in a collaborative environment.
KM-6. Evaluate, develop or implement a wide variety of intelligence and collaboration systems.
Latest News and Events
- MacB Technical Expert to Present FPGA Assurance Whitepaper at GOMACTech
- MacB’s Enlighten IT Consulting Awarded Prime Contract for U.S. Cyber Command
- MacB Adds Next Generation Cyber Mission Tools to Deployment Framework
- WashingtonExec: MacB’s Enlighten IT Consulting Wins U.S. Cyber Command Contract
- Intelligence Community News: MacB’s Enlighten IT Consulting awarded USCYBERCOM prime contract