I-FSS-600 Contract Price Lists



[pic]

GENERAL SERVICES ADMINISTRATION

Federal Supply Service

Authorized Federal Supply Schedule Price List

On-line access to contract ordering information, terms and conditions, up-to- date pricing, and the option to create an electronic delivery order are available through GSA Advantage!, a menu-driven database system. The INTERNET address for GSA Advantage! is: .

Multiple Award Schedule

Information Technology

Contract Number: 47QTCA20D00E4

Period Covered by Contract: August 26, 2020 through August 25, 2025

For more information on ordering from Federal Supply Schedules click on the FSS Schedules button at fss..

Contractor:

cyDaptiv Solutions Inc.

7315 Wisconsin Ave Suite 400W

Bethesda, MD, 20814-3224

Phone: 301-804-3205

Fax: 240-383-3704



Contract administration source:

Curtis Hefflin, President/CEO

Phone: 571-274-4407

curt@

Business size: Small

CUSTOMER INFORMATION:

1a. Table of awarded special item number(s) with appropriate cross- reference to item descriptions and awarded price(s).

SIN 54151S: Information Technology Professional Services

SIN 54151HEAL: Health Information Technology Services

1b. Identification of the lowest priced model number and lowest unit price for that model for each special item number awarded in the contract. N/A

1c. If the Contractor is proposing hourly rates, a description of all corresponding commercial job titles, experience, functional responsibility and education for those types of employees or subcontractors who will perform services shall be provided.

See Attachment A for Labor Category Descriptions.

|SIN 54151S |

|Labor Category |Year 1 |Year 2 |Year 3 |Year 4 |Year 5 |

|Program Manager |$134.80 |$138.50 |$142.31 |$146.23 |$150.25 |

|Project Manager |$134.21 |$137.90 |$141.69 |$145.59 |$149.59 |

|Cyber Security Analyst, Senior |$122.42 |$125.78 |$129.24 |$132.80 |$136.45 |

|Cyber Security Analyst |$117.04 |$120.26 |$123.56 |$126.96 |$130.45 |

|Cyber Security Engineer, Senior |$124.13 |$127.54 |$131.05 |$134.66 |$138.36 |

|Cyber Security Engineer |$124.13 |$127.54 |$131.05 |$134.66 |$138.36 |

|Systems Administrator, Senior |$124.13 |$127.54 |$131.05 |$134.66 |$138.36 |

|Systems Administrator |$92.49 |$95.04 |$97.65 |$100.34 |$103.10 |

|Database Administrator, Senior |$104.28 |$107.15 |$110.10 |$113.12 |$116.24 |

|IT Specialist |$72.54 |$74.54 |$76.59 |$78.70 |$80.86 |

|Information Assurance Project |$131.22 |$134.83 |$138.54 |$142.35 |$146.27 |

|Manager | | | | | |

|Sr Cyber Security Engineer / Task|$125.90 |$129.37 |$132.92 |$136.58 |$140.34 |

|Lead | | | | | |

|SIN 54151HEAL |

|Labor Category |Year 1 |Year 2 |Year 3 |Year 4 |Year 5 |

|Health IT Program Manager |$134.80 |$138.50 |$142.31 |$146.23 |$150.25 |

|Health Project Manager |$134.21 |$137.90 |$141.69 |$145.59 |$149.59 |

|Health IT Cyber Security Analyst,|$122.42 |$125.78 |$129.24 |$132.80 |$136.45 |

|Sr. | | | | | |

|Health IT Cyber Security Analyst |$117.04 |$120.26 |$123.56 |$126.96 |$130.45 |

|Health IT Cyber Security |$124.13 |$127.54 |$131.05 |$134.66 |$138.36 |

|Engineer, Sr. | | | | | |

|Health IT Cyber Security Engineer|$124.13 |$127.54 |$131.05 |$134.66 |$138.36 |

|Health IT Systems Administrator, |$124.13 |$127.54 |$131.05 |$134.66 |$138.36 |

|Sr. | | | | | |

|Health IT Systems Administrator |$92.49 |$95.04 |$97.65 |$100.34 |$103.10 |

|Health IT Database Administrator,|$104.28 |$107.15 |$110.10 |$113.12 |$116.24 |

|Sr. | | | | | |

|Health IT Specialist |$72.54 |$74.54 |$76.59 |$78.70 |$80.86 |

|Health IT Information Assurance |$131.22 |$134.83 |$138.54 |$142.35 |$146.27 |

|Project Manager | | | | | |

|Health IT Cyber Security |$125.90 |$129.37 |$132.92 |$136.58 |$140.34 |

|Engineer, Sr. / Task Lead | | | | | |

2. Maximum order. SIN 54151S - $500,000; SIN 54151HEAL - $500,000

3. Minimum order. $100.00

4. Geographic coverage (delivery area). Worldwide

5. Point(s) of production (city, county, and State or foreign country). N/A

6. Discount from list, prices or statement of net price. All pricing in table above are Net.

7. Quantity discounts. 1% for single task orders over $250,000

8. Prompt payment terms. NET 30 days

Information for Ordering Offices: Prompt payment terms cannot be negotiated out of the contractual agreement in exchange for other concessions.

9a. Notification that Government purchase cards are accepted at or below the micro-purchase threshold. Government purchase cards are accepted in full.

9b. Notification whether Government purchase cards are accepted or not accepted above the micro-purchase threshold. Government purchase cards are accepted.

10. Foreign items (list items by country of origin) N/A

11a. Time of delivery. 30-days ARO

l1b. Expedited Delivery. Contact the Contractor’s representative to affect a faster delivery.

l1c. Overnight and 2-day delivery. Contact the Contractor’s representative to affect a faster delivery.

11d. Urgent Requirements. Contact the Contractor’s representative to affect a faster delivery.

12. F.O.B. point(s). F.O.B. Destination.

13a. Ordering address(es).

cyDaptiv Solutions Inc.

7315 Wisconsin Ave Suite 400W

Bethesda, MD, 20814-3224

13b. Ordering procedures: For supplies and services, the ordering procedures, information on Blanket Purchase Agreements (BPAs), and a sample EPA can be found at the GSA/FSS Schedule homepage (fss.schedules).

14. Payment address(es)

cyDaptiv Solutions Inc.

7315 Wisconsin Ave Suite 400W

Bethesda, MD, 20814-3224

15. Warranty provision. N/A

16. Export packing charges, if applicable. N/A

17. Terms and conditions of Government purchase card acceptance (any thresholds above the micro-purchase level) Standard Terms and conditions as any Credit Card Purchase.

18. Terms and conditions of rental, maintenance, and repair (if applicable) N/A

19. Terms and conditions of installation (if applicable). N/A

20. Terms and conditions of repair parts indicating date of parts price lists and any discounts from list prices (if applicable). N/A

20a. Terms and conditions for any other services (if applicable) N/A

21. List of service and distribution points (if applicable). N/A

22. List of participating dealers (if applicab1e). N/A

23. Preventive maintenance (if applicable). N/A

24a. Special attributes such as environmental attributes (e.g., recycled content, energy efficiency, and/or reduced pollutants) N/A

24b. If applicable, indicate that Section 508 compliance information

is available on Electronic and Information Technology (EIT) supplies and services and show where full details can be found (e.g. contractor’s website or other location.) The EIT standards can he found at . N/A

25. Data Universal Number System (DUNS) number. 079403104

26. Notification regarding registration in System for Award Management database.

cyDaptiv Solutions Inc.’s SAM registration is current.

Attachment A

cyDaptiv Solutions Inc. offers the following Labor Category Descriptions to support the effort contemplated herein.

|SIN 54151S |

|Labor Category |Functional Responsibilities |Minimum Education |Minimum Years of |

| | | |Experience |

|Program Manager |Plans, organizes, and directs all project activities. Ensures that |Bachelor’s degree |10 |

| |project goals and objectives are met within contract terms and | | |

| |conditions. Interacts with client management and is adept in oral and | | |

| |written communication. | | |

|Project Manager |Accountable for all aspects of project performance. Provides overall |Bachelor’s degree |7 |

| |direction to all project activities and interactions with clients. | | |

| |Demonstrates oral and written communication skills.BA/BS or equivalent| | |

| |and seven years in a related field with supervisory or managerial | | |

| |experience | | |

|Cyber Security Analyst, |BA/BS or equivalent and seven years applicable experience. Leads a |Bachelor’s degree |7 |

|Senior |medium-to-large team performing tasking in a discipline and related | | |

| |areas (operations analysis, T&E/IV&V, CM, DM, QA, technical | | |

| |documentation, program support, etc.) or independently performs highly| | |

| |complex tasks in a discipline or related areas. | | |

|Cyber Security Analyst |Leads a medium-to-large team performing tasking in a discipline and |Bachelor’s degree |5 |

| |related areas (operations analysis, T&E/IV&V, CM, DM, QA, technical | | |

| |documentation, program support, etc.) or independently performs highly| | |

| |complex tasks in a discipline or related areas. | | |

|Cyber Security Engineer, |BA/BS or equivalent and 7 years applicable experienceLeads a |Bachelor’s degree |7 |

|Senior |medium-to-large team performing tasking in a discipline and related | | |

| |areas, or independently performs highly complex tasks in a discipline | | |

| |or related areas. Leads a medium-to-large team performing tasking in a| | |

| |discipline and related areas, or independently performs highly complex| | |

| |tasks in a discipline or related areas | | |

|Cyber Security Engineer |Leads a medium-to-large team performing tasking in a discipline and |Bachelor’s degree |5 |

| |related areas, or independently performs highly complex tasks in a | | |

| |discipline or related areas | | |

|Systems Administrator, |Bachelor’s degree from an accredited college in a related |Bachelor’s degree |7 |

|Senior |discipline, or equivalent experience/combined education, with 7 | | |

| |years of professional experience. Considered career, or journey, | | |

| |level. BS/5-8 Maintains smooth operation of multi-user computer | | |

| |systems, including coordination with network administrators. Duties | | |

| |may include setting up administrator and service accounts, maintaining| | |

| |system documentation, tuning system performance, installing system | | |

| |wide software and allocate mass storage space. Interacts with users | | |

| |and evaluates vendor products. Makes recommendations to purchase | | |

| |hardware and software, coordinates installation and provides backup | | |

| |recovery. Develops and monitors policies and standards for allocation | | |

| |related to the use of computing resources. | | |

|Systems Administrator |Bachelor’s degree from an accredited college in a related |Bachelor’s degree |5 |

| |discipline, or equivalent experience/combined education, with 5 | | |

| |years of professional experience. Considered experienced, but still | | |

| |a learner. BS/2-4 Maintains smooth operation of multi-user computer | | |

| |systems, including coordination with network administrators. Duties | | |

| |may include setting up administrator and service accounts, maintaining| | |

| |system documentation, tuning system performance, installing system | | |

| |wide software and allocate mass storage space. Interacts with users | | |

| |and evaluates vendor products. Makes recommendations to purchase | | |

| |hardware and software, coordinates installation and provides backup | | |

| |recovery. Develops and monitors policies and standards for allocation | | |

| |related to the use of computing resources. | | |

|Database Administrator, |Implements and maintains smooth operation and physical design of |Bachelor’s degree |7 |

|Senior |databases. Reviews database design and integration of systems, | | |

| |provides backup recovery and makes recommendations regarding | | |

| |enhancements and/or improvements. Maintains security and integrity | | |

| |controls. Formulates policies, procedures, and standards relating to | | |

| |database management, and monitors transaction activity and | | |

| |utilization. Responsibilities include: database loading; development | | |

| |and management of operational procedures; environment management; | | |

| |database health (e.g. monitoring, proactive and reactive responses); | | |

| |resource planning; database upgrade planning; backup and recovery | | |

| |strategy planning and implementation; environment transition planning | | |

| |(development, test, stage, production). Bachelor’s degree from an | | |

| |accredited college in a related discipline, or equivalent | | |

| |experience/combined education, with 7 years of professional | | |

| |experience. Considered career, or journey, level. BS/5-8 | | |

|IT Specialist |Monitors and operates electronic digital computers to process |Bachelor’s degree |4 |

| |business, scientific, engineering, or other data according to | | |

| |operating instructions. Normally required to set control switches; | | |

| |ensure that correct peripheral equipment is utilized and move switches| | |

| |to clear system and operate the equipment; selects and loads input and| | |

| |output units with materials such as tapes and printout forms. Observes| | |

| |equipment and control panels for operator messages or error | | |

| |indicators. Sets up and runs diagnostic test and reacts appropriately | | |

| |to the messages and reports errors or machine malfunctions as | | |

| |required. May perform clerical work incidental to machine operations | | |

| |such as labeling tape containers, maintaining production records, | | |

| |replenishing specified stock items, and distributing output materials.| | |

| |Normally required to operate peripheral equipment to perform such | | |

| |operations as tape-to-printer. Takes corrective action according to | | |

| |supervisor's instructions. May include working with multiple systems. | | |

|Information Assurance |Must have seven years of general experience including five years of |Bachelor’s degree |7 |

|Project Manager |specialized Cybersecurity and of which two years were direct | | |

| |supervisory experience. Functional esponsibility includes responsible | | |

| |for the performance of relatively small technical projects or a | | |

| |definable portion of a larger technical program in accordance with | | |

| |contract requirements and company policies, procedures and guidelines.| | |

| |Directs and supervises all support resources for the performance of | | |

| |project assignments and activities. Manages the technical direction of| | |

| |a project through the design, implementation, and testing in | | |

| |accordance with project objectives. Responsible for acquiring | | |

| |follow-on business associated with assigned projects and for | | |

| |supporting new business development by leading relatively small | | |

| |proposals or assisting with major proposals. | | |

|Sr Cyber Security |Monitors, evaluates, and maintains systems and procedures to protect |Bachelor’s degree |7 |

|Engineer / Task Lead |the data systems and databases from unauthorized users. Identifies | | |

| |potential threats and responds to reported security violations. | | |

| |Determines causes of security breaches. Researches, recommends, and | | |

| |implements changes to procedures to protect data from future | | |

| |violations. Defines, plans, designs, and evaluates information | | |

| |security system. Assesses architecture and current hardware | | |

| |limitations, defines and designs system specifications, input/output | | |

| |processes and working parameters for hardware/software compatibility. | | |

| |Designs and conducts tests of designs and architectures. Leads and | | |

| |guides less experienced engineers. Capable of independent management | | |

| |of projects. | | |

|SIN 54151HEAL |

|Labor Category |Functional Responsibilities |Minimum Education |Minimum Years of|

| | | |Experience |

|Health IT Program Manager |Plans, organizes, and directs all health IT project activities. |Bachelor’s degree |10 |

| |Ensures that project goals and objectives are met within contract| | |

| |terms and conditions. Interacts with client management and is | | |

| |adept in oral and written communication. | | |

|Health Project Manager |Accountable for all aspects of health IT project performance. |Bachelor’s degree |7 |

| |Provides overall direction to all project activities and | | |

| |interactions with clients. Demonstrates oral and written | | |

| |communication skills. | | |

|Health IT Cyber Security |Gathers and organizes technical information about an |Bachelor’s degree |7 |

|Analyst, Sr. |organization’s mission goals and needs within a cybersecurity | | |

| |environment, Health IT infrastructure, and existing security/IA | | |

| |products. Assists in developing security/IA policies, procedures,| | |

| |and standards. Responsibilities will include working with the | | |

| |customer to minimize risks and assess and secure networks. | | |

| |Evaluates and recommends security products for various platforms | | |

| |and initiatives. May act as a project leader and provide | | |

| |technical leadership and guidance. Must have more than 7 years of| | |

| |experiance | | |

|Health IT Cyber Security |Gathers and organizes technical information about an |Bachelor’s degree |5 |

|Analyst |organization’s mission goals and needs within a cybersecurity | | |

| |environment, Health IT infrastructure, and existing security/IA | | |

| |products. Assists in developing security/IA policies, procedures,| | |

| |and standards. Responsibilities will include working with the | | |

| |customer to minimize risks and assess and secure networks. | | |

| |Evaluates and recommends security products for various platforms | | |

| |and initiatives. May act as a project leader and provide | | |

| |technical leadership and guidance. | | |

|Health IT Cyber Security |Must have a minimum of seven years’ experience in Health IT cyber|Bachelor’s degree |7 |

|Engineer, Sr. |security engineering field. Monitors, evaluates, and maintains | | |

| |systems and procedures to protect the data systems and databases | | |

| |from unauthorized users. Identifies potential threats and | | |

| |responds to reported security violations. Determines causes of | | |

| |security breaches. Researches, recommends, and implements changes| | |

| |to procedures to protect data from future violations. Defines, | | |

| |plans, designs, and evaluates information security system. | | |

| |Assesses architecture and current hardware limitations, defines | | |

| |and designs system specifications, input/output processes and | | |

| |working parameters for hardware/software compatibility. Designs | | |

| |and conducts tests of designs and architectures. Leads and guides| | |

| |less experienced engineers. Capable of independent management of | | |

| |projects.. | | |

|Health IT Cyber Security |Must have a minimum of five years’ experience in Health IT cyber |Bachelor’s degree |5 |

|Engineer |security engineering field. Monitors, evaluates, and maintains | | |

| |systems and procedures to protect the health data systems and | | |

| |databases from unauthorized users. Identifies potential threats | | |

| |and responds to reported security violations. Determines causes | | |

| |of security breaches. Researches, recommends, and implements | | |

| |changes to procedures to protect data from future violations. | | |

| |Evaluates information security system. Assesses architecture and | | |

| |current hardware limitations, recommends system specifications, | | |

| |input/output processes and working parameters for | | |

| |hardware/software compatibility. Conducts tests of designs and | | |

| |architectures. | | |

|Health IT Systems |Provides Tier 2 on-site systems administration support to local |Bachelor’s degree |7 |

|Administrator, Sr. |customers at assigned Medical Training Facilities (MTFs). Support| | |

| |includes, but not limited to, receiving trouble tickets, | | |

| |analyzing issues, developing/implementing solutions, escalating | | |

| |issues and tracking customer service to completion for all | | |

| |service requests. Technical support for communications may | | |

| |include installing, maintaining and troubleshooting desktop | | |

| |hardware, software including web-based applications, and | | |

| |peripherals associated with Medical Information Systems. Ensures | | |

| |HIPAA compliance. | | |

|Health IT Systems |Provides Tier 2 on-site systems administration support to local |Bachelor’s degree |5 |

|Administrator |customers at assigned Medical Training Facilities (MTFs). Support| | |

| |includes, but not limited to, receiving trouble tickets, | | |

| |analyzing issues, developing/implementing solutions, escalating | | |

| |issues and tracking customer service to completion for all | | |

| |service requests. Technical support for communications may | | |

| |include installing, maintaining and troubleshooting desktop | | |

| |hardware, software including web-based applications, and | | |

| |peripherals associated with Medical Information Systems. Ensures | | |

| |HIPAA compliance. | | |

|Health IT Database |Must have a minimum of seven years’ experience with minimum five |Bachelor’s degree |7 |

|Administrator, Sr. |years in Health IT environments supporting applications | | |

| |processing Protected Health Information (PHI). Responsible for | | |

| |the implementation, configuration, maintenance, and ensuring the | | |

| |availability and consistent performance of health data platforms.| | |

| |Additional tasks include database loading; development and | | |

| |management of operational procedures; environment management; | | |

| |database health (e.g. monitoring, proactive and reactive | | |

| |responses); resource planning; database upgrade planning; backup | | |

| |and recovery strategy planning and implementation; environment | | |

| |transition planning (development, test, stage, production). | | |

|Health IT Specialist |Manages the company's firewalls and intrusion detection systems. |Bachelor’s degree |4 |

| |Develops, tests, and operates firewalls, intrusion detection | | |

| |systems, enterprise anti-virus systems and software deployment | | |

| |tools. Safeguards the network against unauthorized infiltration, | | |

| |modification, destruction or disclosure. May research, evaluate, | | |

| |test, recommends communicate and implement new security software | | |

| |or devices. Implements, enforces, communicates and develops | | |

| |security policies or plans for data, software applications, | | |

| |hardware, and telecommunications. Provides information to | | |

| |management regarding the negative impact caused by theft, | | |

| |destruction, alteration or denial of access to health | | |

| |information. Provides recommendations on information assurance | | |

| |engineering standards, implementation dependencies, and changing | | |

| |information assurance related technologies. Manages the company's| | |

| |firewalls and intrusion detection systems. Develops, tests, and | | |

| |operates firewalls, intrusion detection systems, enterprise | | |

| |anti-virus systems and software deployment tools. Safeguards the | | |

| |network against unauthorized infiltration, modification, | | |

| |destruction or disclosure. Researches, evaluates, tests, | | |

| |recommends communicate and implement new security software or | | |

| |devices. Implements, enforces, communicates and develops security| | |

| |policies or plans for data, software applications, hardware, and | | |

| |telecommunications. Provides information to management on the | | |

| |negative impact caused by theft, destruction, alteration or | | |

| |denial of access to information. Provides recommendations on | | |

| |information assurance engineering standards, implementation | | |

| |dependencies, and changing information assurance related | | |

| |technologies. May supervise lower level staff. Requires | | |

| |Bachelor's degree or equivalent and four years related | | |

| |experience. | | |

|Health IT Information |Must have a minimum of seven years’ experience with minimum five |Bachelor’s degree |7 |

|Assurance Project Manager |years in Health IT environments supporting Medical Devices and | | |

| |Equipment, Clinical Applications, and Facility Related Controls | | |

| |Systems. Responsible for ensuring the implementation of periodic | | |

| |security inspections, assessments, tests, and reviews. Provide | | |

| |support for taskers related to information management and | | |

| |assurances. Also responsible for the performance of relatively | | |

| |small technical projects or a definable portion of a larger | | |

| |technical program in accordance with contract requirements and | | |

| |company policies, procedures and guidelines. Directs and | | |

| |supervises all support resources for the performance of project | | |

| |assignments and activities. Manages the technical direction of a | | |

| |project through the design, implementation, and testing in | | |

| |accordance with project objectives. Responsible for acquiring | | |

| |follow-on business associated with assigned projects and for | | |

| |supporting new business development by leading relatively small | | |

| |proposals or assisting with major proposals. | | |

|Health IT Cyber Security |Must have a minimum of seven years’ experience with minimum five |Bachelor’s degree |7 |

|Engineer, Sr. / Task Lead |years in Health IT environment supporting Medical Devices and | | |

| |Equipment, Clinical Applications, and Facility Related Controls | | |

| |Systems. Monitors, evaluates, and maintains systems and | | |

| |procedures to protect the health data systems and databases from | | |

| |unauthorized users. Identifies potential threats to the | | |

| |information and responds to reported security violations. | | |

| |Determines causes of security breaches. Researches, recommends, | | |

| |and implements changes to procedures to protect data from future | | |

| |violations. Defines, plans, designs, and evaluates information | | |

| |security system. Assesses architecture and current hardware | | |

| |limitations, defines and designs system specifications, | | |

| |input/output processes and working parameters for | | |

| |hardware/software compatibility. Designs and conducts tests of | | |

| |designs and architectures. Leads and guides less experienced | | |

| |engineers. Capable of independent management of projects. | | |

-----------------------

Labor Category Descriptions

-----------------------

[pic]

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download