- Contracting with MacB
- Small Business Registration
- OASIS Contract
- Major IDIQ Contracts
- CAAS IV - Contract Information
- Active Task Orders
- EAGLE II
- Current Task Orders
- List of Experience Within DHS
- MacB DHS EAGLE II POCs
- MacB's Integrated Quality Management Solution
- MacB EAGLE II Team Members
- CAAS IV - Contract Information
- Defense System Technical Area Tasks (DS-TATs)
- GSA Schedules
- Alliant GWAC
- Terms and Conditions
Technical Area Tasks (TATs) are separately funded work efforts over and above basic Information Analysis Center (IAC) products and services. SNIM TATs complement the work already being done at the Data & Analysis Center for Software, the Information Assurance Technology Analysis Center, and the Modeling and Simulation Information Analysis Center (DACS, IATAC, and MSIAC). They provide valuable analysis and R&D solutions to tough information assurance, software data and analysis and modeling and simulation problems.
TATs create new scientific and technical information (STI), which is added to the appropriate IAC repository (i.e., DACS, IATAC, or MSIAC), making it readily available to the scientific community. This allows the STI to be researched and reused by others in the community, thus saving federal resources.
TATs are very flexible and can vary from a fraction of a staff year to several staff years. Costs may vary from a few thousand dollars to several million dollars. TATs may be ordered by Department of Defense (DoD) components, other government agencies, industry and academia.
IA-1. Provide studies or analyses pertinent to aspects of historical, technical, scientific, and other information assurance (IA)- related areas. Specific areas of emphasis include emerging technologies relating to the survivability, vulnerability, authenticity, or continuity of DoD information systems (IS); the system security and detection of intrusion on hardware and software systems; the modeling of systems vis-à-vis IA threats; the identification and development of attack detection and mitigation strategies, tools and technologies (including use of the electromagnetic spectrum); or develop indications and warning methodologies and technologies.
IA-2. Develop IA planning framework; assess IA policy, plans, intelligence, IO incidents or joint IA doctrine; develop procedures and metrics for assessing infrastructure and information dependencies.
IA-3. Review and analyze the documentation of existing IT tactical operational requirements and mission needs statements.
IA-4. Identify and propose mitigation of IA-related IT risks/vulnerabilities for an identified program; conduct IA risk analysis and develop a comprehensive risk management approach.
IA-5. Analyze systems requiring trade-off analysis between commercial off-the-shelf (COTS), performance, and potential vulnerabilities.
IA-6. Provide assistance in performing a Red Team IA assessment on information systems.
IA-7. Provide technical IA analysis to IA initiatives related to non-terrestrial space.
Software Data and Analysis
SD-1. Establish data analysis procedures, statistical methods, or routines to aide studies or conduct investigations of software engineering technology issues or topics or the assessment of state-of-the-art software engineering tools, technologies, and methods.
SD-2. Conduct studies, analyses, experiments, data collection, or other tasks in the development, evaluation, validation, demonstration, or application of software measurement technology for predicting, measuring, or assessing software products and the overall software process. Evaluate and assess the quality of existing user software systems, using current software quality measurement technology to determine quality levels of various factors, such as reliability, flexibility, testability, portability, maintainability, etc.
SD-3. Perform software evaluation that includes conducting detailed needs and risk analysis that would relate the capabilities of the software package to specific mission requirements and priorities.
SD-4. Develop, update, review, or evaluate software engineering standards, specifications, guidebooks, handbooks, or manuals that promote the utilization of modern software engineering technology. Aide revision or development of military standards and specifications, problem-solving techniques, or verification/validation of solution sets and protocols.
SD-5. Perform engineering and technology to assist user organizations with the aspects of software acquisition. Perform activities to test, demonstrate, evaluate, and validate software engineering tools and methods in a controlled environment.
SD-6. Develop life cycle cost models, including research/data collection, analysis, or model development that facilitates software reliability, software testing, model-based testing, security, or interoperability assurance.
SD-7. Provide engineering and analysis in the development of “secure” Internet home pages and website assistance.
SD-8. Develop or customize software technology analytical tools, models, decision aids, screening methods and/or techniques to evaluate and assist with the authenticity, and continuity of DoD, national, commercial, or international information systems.
Modeling and Simulation (M&S)
MS-1. Provide M&S capability for training exercises, mission rehearsals, analytical studies, etc., or identification of viable options for simulation assistance.
MS-2. Conduct M&S scientific or technical analysis functions tailored to help the M&S community, to include the development of R&D best practices that enhance the ability to access, acquire, collect, analyze, synthesize, generate and report M&S-related technical information.
MS-3. Provide M&S aide for program reviews, strategic planning, exercise management, knowledge acquisition, or operations coordination and monitoring.
MS-4. Provide help in executing the approved release of specific M&S software and documentation.
MS-5. Provide help for DoD certification of compliance with high-level architecture (HLA) and other M&S standards.
MS-6. Provide help to quantify the impact(s) of simulations, to include defining the measures for determining effectiveness, on overall program success.
MS-7. Conduct assessments of a system’s mapping, vulnerability and survivability. Apply standard verification and validation (V&V) processes to models and simulations, document the V&V results in a standard format, and transition the validation process and lessons learned to DoD and industry users. Provide assistance with the use of standardized V&V products, compare V&V results with objective model acceptance criteria for M&S accreditation.
MS-8. Provide aide in the evaluation and improvement of models and databases.
MS-9. Evaluate, develop, or implement collaborative modeling and analysis tools.
Knowledge Management and Information Sharing
KM-1. Conduct scientific, technical, or DoD-related conferences, symposia, or workshops.
KM-2. Develop comprehensive collection of empirical data on the development, operation, or maintenance of a software system.
KM-3. Develop, conduct, or evaluate training which may have included classroom, computer-based-instruction, videotape, distance learning or other forms of instruction.
KM-4. Evaluate, analyze or recommend new technologies, applications or processes to enhance knowledge management and information-sharing.
KM-5. Develop advanced collaborative analysis tools that allow for the integration of existing or in-process social networking and intelligence data exploitation tools in a collaborative environment.
KM-6. Evaluate, develop or implement a wide variety of intelligence and collaboration systems.
Latest News and Events
- WashingtonExec: Sid Fuchs, President and CEO, MacAulay-Brown, Inc.
- TECHEXPO Job Fair - Tysons Corner
- Enlighten IT Consulting Partners on U.S. Air Force Contract for Cyberspace Analytics
- WashingtonExec: Enlighten IT Consulting Teams Up on Air Force Contract for Cyber Analytics
- Connections Job Fair - Blacksburg, VA