SlideShare a Scribd company logo
Page 1
Factor 5 Oral Technical Evaluation Criteria
Addendum to SCP-FSS-004 SPECIFIC PROPOSAL INSTRUCTIONS FOR SCHEDULE 70
132- 45A Penetration Testing
Expected tasks within the scope of this SIN include but are not limited to:
● Conducting and/or supporting authorized penetration testing on enterprise network assets
● Analyzing site/enterprise Computer Network Defense policies and configurations and evaluate
compliance with regulations and enterprise directives
● Assisting with the selection of cost-effective security controls to mitigate risk (e.g., protection of
information, systems, and processes)
Minimum Knowledge Areas:
● Knowledge of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit, etc.)
● Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access,
escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
● Ability to identify systemic security issues based on the analysis of vulnerability and configuration data
132- 45B Incident Response
Expected tasks within the scope of this SIN include but are not limited to:
● Collect intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable
mitigation of potential Computer Network Defense incidents within the enterprise
● Perform command and control functions in response to incidents
● Correlate incident data to identify specific vulnerabilities and make recommendations that enable
expeditious remediation
Minimum Knowledge Areas:
● Knowledge of incident categories, incident responses, and timelines for responses
● Knowledge of incident response and handling methodologies
● Knowledge of intrusion detection methodologies and techniques for detecting host and network-based
intrusions via intrusion detection technologies
132- 45C Cyber Hunt
Expected tasks within the scope of this SIN include but are not limited to:
● Collecting intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable
mitigation of potential Computer Network Defense incidents within the enterprise
Page 2
● Coordinating with and provide expert technical support to enterprise-wide Computer Network Defense
technicians to resolve Computer Network Defense incidents
● Correlating incident data to identify specific vulnerabilities and make recommendations that enable
expeditious remediation
Minimum Knowledge Areas:
● Knowledge of different operational threat environments (e.g., first generation [script kiddies], second
generation [non- nation state sponsored], and third generation [nation state sponsored])
● Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access,
escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
● Knowledge of incident categories, incident responses, and timelines for responses
132- 45D Risk and Vulnerability Assessments (RVA)
Expected tasks within the scope of this SIN include but are not limited to the following.
● Network Mapping - consists of identifying assets on an agreed upon IP address space or network
range(s).
● Vulnerability Scanning - comprehensively identifies IT vulnerabilities associated with agency systems
that are potentially exploitable by attackers.
● Phishing Assessment - includes activities to evaluate the level of awareness of the agency workforce
with regard to digital form of social engineering that uses authentic looking, but bogus, emails request
information from users or direct them to a fake Website that requests information. Phishing
assessments can include scanning, testing, or both and can be conducted as a one- time event or as part
of a larger campaign to be conducted over several months.
● Wireless Assessment - includes wireless access point (WAP) detection, penetration testing or both and is
performed while onsite at a customer’s facility.
● Web Application Assessment - includes scanning, testing or both of outward facing web applications for
defects in Web service implementation may lead to exploitable vulnerabilities. Provide report on how to
implement Web services securely and that traditional network security tools and techniques are used to
limit access to the Web Service to only those networks and systems that should have legitimate access.
● Operating System Security Assessment (OSSA) - assesses the configuration of select host operating
systems (OS) against standardized configuration baselines.
● Database Assessment - assesses the configuration of selected databases against configuration baselines
in order to identify potential misconfigurations and/or database vulnerabilities.
Minimum Knowledge Areas:
● Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP) and
Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure
Library, v3 (ITIL))
● Knowledge of system and application security threats and vulnerabilities
Page 3
● Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System
(DNS), and directory services
● Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile
code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented
attacks, and malicious code)
● Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access,
escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
● Knowledge of network access, identity and access management (e.g., public key infrastructure, PKI)
● Knowledge of network security architecture concepts including topology, protocols, components, and
principles (e.g., application of Defense-in-Depth)
● Knowledge of IA principles and organizational requirements (relevant to confidentiality, integrity,
availability, authentication, non-repudiation)
● Skill in assessing the robustness of security systems and designs
● Skill in the use of social engineering techniques
● Skill in applying host/network access controls (e.g., access control list)
● Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems
● Skill in using network analysis tools to identify vulnerabilities
● Ability to identify systemic security issues based on the analysis of vulnerability and configuration data
● Conducting required reviews as appropriate within environment (e.g., Technical Surveillance
Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews)
● Perform technical (evaluation of technology) and non-technical (evaluation of people and operations)
risk and vulnerability assessments of relevant technology focus areas (i.e., local computing environment,
network and infrastructure, enclave boundary, and supporting infrastructure)
● Maintaining knowledge of applicable Computer Network Defense policies, regulations, and compliance
documents specifically related to Computer Network Defense auditing
Oral Technical Evaluation Procedure
Pre-scenario Questions:
1. Services Provided
a. Which cybersecurity services do you offer?
2. Logistics
a. How quickly can you deploy resources for an engagement (Pentest/IR/Hunt/RVA)?
b. What is your average team makeup for each type of engagement?
c. Do you have resources to deploy nation-wide?
After addressing the aforementioned questions, the offeror will be evaluated on their knowledge of the
proposed services. The oral technical evaluation will require the offeror to respond to a specific scenario
Page 4
and general questions to assess the offeror’s expertise. The questions and evaluation topics for each SIN
are as follows:
1. SIN 132-45 A - Penetration Test Evaluation Overview - the following questions and
topics will be discussed during the Penetration Test SIN evaluation.
a. What activities do you carry out during the Pre-Engagement,
Testing/Assessment, and Post-Engagement phases?
b. Provide us with a background of your organization's Penetration Testing
capabilities.
c. What processes and methods are used to conduct reconnaissance activities?
d. What specific tools, techniques, and procedures (TTPs) do you utilize to discover
and enumerate vulnerabilities for potential exploitation?
e. What are some specific tools, techniques, and procedures (TTPs) used to exploit
identified vulnerabilities?
f. After gaining access to systems and/or data, describe TTPs used for "pivoting" in
order to establish a new source of attack on the newly compromised target?
2. SIN 132-45 B - Incident Response Evaluation Overview - the following questions and
topics will be discussed during the Incident Response SIN evaluation.
a. What activities do you carry out during the Pre-Deployment phase, Incident
Identification, Intrusion Detection, and Analysis phase, and the Post-Incident
phase?
b. Provide us with a background of your organization's Incident Response Service
capabilities:
c. What malware analysis and reverse engineering capabilities do you have?
d. What are the specific processes and methods used to conduct preparation
activities?
e. What are the specific tools and procedures used by the vendor to detect and
analyze potential incidents?
f. What are some specific techniques and procedures used to contain and
remediate incidents?
g. What post-incident support processes or procedures would be put in place?
3. SIN 132-45 C - Cyber Hunt Evaluation Overview - the following questions and topics will
be discussed during the Cyber Hunt SIN evaluation.
a. What activities do you carry out during the various phases of your Cyber Hunt
missions?
b. Provide us with a background of your organization's Cyber Hunt Service
capabilities.
c. What are the specific processes and methods used for hypothesis
generation/creation?
d. What are the specific tools, techniques, and procedures (TTPs) used by the
vendor to test hypotheses?
e. What are some specific techniques and procedures used to identify malicious
patterns of behavior?
f. Describe how the Analytic Automation processes or procedures will be put in
place.
4. SIN 132-45 D - Risk and Vulnerability Assessment Evaluation Overview - the following
questions and topics will be discussed during the Penetration Test SIN evaluation.
Page 5
a. What activities do you carry out during the Pre-Engagement,
Testing/Assessment, and Post-Engagement phases?
b. Provide us with a background of your organization's Risk and Vulnerability
Assessment capabilities.
c. Describe the scope and general level of effort (LOE) for each type of service
provided.
d. What is your process for conducting RVA testing activities?
e. Describe the tools utilized during the testing/assessment phase.
f. What is your process for conducting RVA post assessment testing activities?
Oral Technical Evaluation Criteria
The offeror’s responses to the government’s questions during the oral technical evaluation session shall be used
to determine whether the Offeror has the requisite experience and expertise to perform tasks expected to be
performed within the scope of these SINs. Each oral technical proposal will be evaluated and rated on an
acceptable/unacceptable basis. The rating definitions provided below will be used for the evaluation of the
offeror’s responses to questions during the oral evaluation.
TECHNICAL RATINGS
Rating Definition
Acceptable/Pass The proposal clearly meets the minimum requirements of the solicitation.
Unacceptable/Fail The proposal does not clearly meet the minimum requirements of the
solicitation.

More Related Content

What's hot

Orion Network Performance Monitor (NPM) Optimization and Tuning Training
Orion Network Performance Monitor (NPM) Optimization and Tuning TrainingOrion Network Performance Monitor (NPM) Optimization and Tuning Training
Orion Network Performance Monitor (NPM) Optimization and Tuning Training
SolarWinds
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation HadoopVarun Narang
 
"Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2...
"Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2..."Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2...
"Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2...
Markus Michalewicz
 
AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...
AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...
AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...
Sandesh Rao
 
AIXpert - AIX Security expert
AIXpert - AIX Security expertAIXpert - AIX Security expert
AIXpert - AIX Security expertdlfrench
 
Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...
Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...
Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...
Cathrine Wilhelmsen
 
MapR Tutorial Series
MapR Tutorial SeriesMapR Tutorial Series
MapR Tutorial Series
selvaraaju
 
Make Your Application “Oracle RAC Ready” & Test For It
Make Your Application “Oracle RAC Ready” & Test For ItMake Your Application “Oracle RAC Ready” & Test For It
Make Your Application “Oracle RAC Ready” & Test For It
Markus Michalewicz
 
Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)
Harish Chand
 
Taking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionTaking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout Session
Splunk
 
DRP (Stretch Cluster) for HDP - Future of Data : Paris
DRP (Stretch Cluster) for HDP - Future of Data : Paris DRP (Stretch Cluster) for HDP - Future of Data : Paris
DRP (Stretch Cluster) for HDP - Future of Data : Paris
Mohamed Mehdi Ben Aissa
 
Oracle Latch and Mutex Contention Troubleshooting
Oracle Latch and Mutex Contention TroubleshootingOracle Latch and Mutex Contention Troubleshooting
Oracle Latch and Mutex Contention Troubleshooting
Tanel Poder
 
Flash for Apache Spark Shuffle with Cosco
Flash for Apache Spark Shuffle with CoscoFlash for Apache Spark Shuffle with Cosco
Flash for Apache Spark Shuffle with Cosco
Databricks
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
xKinAnx
 
Release and patching strategy
Release and patching strategyRelease and patching strategy
Release and patching strategy
Jitendra Singh
 
Galera cluster for high availability
Galera cluster for high availability Galera cluster for high availability
Galera cluster for high availability
Mydbops
 
Introduction to Hadoop and Hadoop component
Introduction to Hadoop and Hadoop component Introduction to Hadoop and Hadoop component
Introduction to Hadoop and Hadoop component
rebeccatho
 
Oracle RAC 12c Overview
Oracle RAC 12c OverviewOracle RAC 12c Overview
Oracle RAC 12c Overview
Markus Michalewicz
 
Secondary storage structure-Operating System Concepts
Secondary storage structure-Operating System ConceptsSecondary storage structure-Operating System Concepts
Secondary storage structure-Operating System Concepts
Arjun Kaimattathil
 
Apache Spark Introduction
Apache Spark IntroductionApache Spark Introduction
Apache Spark Introduction
sudhakara st
 

What's hot (20)

Orion Network Performance Monitor (NPM) Optimization and Tuning Training
Orion Network Performance Monitor (NPM) Optimization and Tuning TrainingOrion Network Performance Monitor (NPM) Optimization and Tuning Training
Orion Network Performance Monitor (NPM) Optimization and Tuning Training
 
Seminar Presentation Hadoop
Seminar Presentation HadoopSeminar Presentation Hadoop
Seminar Presentation Hadoop
 
"Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2...
"Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2..."Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2...
"Changing Role of the DBA" Skills to Have, to Obtain & to Nurture - Updated 2...
 
AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...
AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...
AIOUG : OTNYathra - Troubleshooting and Diagnosing Oracle Database 12.2 and O...
 
AIXpert - AIX Security expert
AIXpert - AIX Security expertAIXpert - AIX Security expert
AIXpert - AIX Security expert
 
Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...
Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...
Table Partitioning in SQL Server: A Magic Solution for Better Performance? (P...
 
MapR Tutorial Series
MapR Tutorial SeriesMapR Tutorial Series
MapR Tutorial Series
 
Make Your Application “Oracle RAC Ready” & Test For It
Make Your Application “Oracle RAC Ready” & Test For ItMake Your Application “Oracle RAC Ready” & Test For It
Make Your Application “Oracle RAC Ready” & Test For It
 
Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)Performance tuning and optimization (ppt)
Performance tuning and optimization (ppt)
 
Taking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout SessionTaking Splunk to the Next Level - Architecture Breakout Session
Taking Splunk to the Next Level - Architecture Breakout Session
 
DRP (Stretch Cluster) for HDP - Future of Data : Paris
DRP (Stretch Cluster) for HDP - Future of Data : Paris DRP (Stretch Cluster) for HDP - Future of Data : Paris
DRP (Stretch Cluster) for HDP - Future of Data : Paris
 
Oracle Latch and Mutex Contention Troubleshooting
Oracle Latch and Mutex Contention TroubleshootingOracle Latch and Mutex Contention Troubleshooting
Oracle Latch and Mutex Contention Troubleshooting
 
Flash for Apache Spark Shuffle with Cosco
Flash for Apache Spark Shuffle with CoscoFlash for Apache Spark Shuffle with Cosco
Flash for Apache Spark Shuffle with Cosco
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Release and patching strategy
Release and patching strategyRelease and patching strategy
Release and patching strategy
 
Galera cluster for high availability
Galera cluster for high availability Galera cluster for high availability
Galera cluster for high availability
 
Introduction to Hadoop and Hadoop component
Introduction to Hadoop and Hadoop component Introduction to Hadoop and Hadoop component
Introduction to Hadoop and Hadoop component
 
Oracle RAC 12c Overview
Oracle RAC 12c OverviewOracle RAC 12c Overview
Oracle RAC 12c Overview
 
Secondary storage structure-Operating System Concepts
Secondary storage structure-Operating System ConceptsSecondary storage structure-Operating System Concepts
Secondary storage structure-Operating System Concepts
 
Apache Spark Introduction
Apache Spark IntroductionApache Spark Introduction
Apache Spark Introduction
 

Similar to GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals

Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber HuntHighly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
David Sweigert
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
Bhavin Shah
 
Penetration Testing Services - Redfox Cyber Security
Penetration Testing Services - Redfox Cyber SecurityPenetration Testing Services - Redfox Cyber Security
Penetration Testing Services - Redfox Cyber Security
Karan Patel
 
penetration test
penetration testpenetration test
penetration test
Hajer alriyami
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
Marcelo Silva
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
Nasir Bhutta
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
SUBHI7
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
abhimanyubhogwan
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
amaranthbeg113
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
amaranthbeg53
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
amaranthbeg73
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Whitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest MindsWhitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest Minds
Happiest Minds Technologies
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
ThavaselviMunusamy1
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
ElanusTechnologies
 

Similar to GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals (20)

Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber HuntHighly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
Highly Adaptive Cybersecurity Services (HACS) -- Cyber Hunt
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
 
Penetration Testing Services - Redfox Cyber Security
Penetration Testing Services - Redfox Cyber SecurityPenetration Testing Services - Redfox Cyber Security
Penetration Testing Services - Redfox Cyber Security
 
penetration test
penetration testpenetration test
penetration test
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
Whitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest MindsWhitepaper: Network Penetration Testing - Happiest Minds
Whitepaper: Network Penetration Testing - Happiest Minds
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
What is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdfWhat is the process of Vulnerability Assessment and Penetration Testing.pdf
What is the process of Vulnerability Assessment and Penetration Testing.pdf
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

cyberagent_For New Investors_EN_240424.pdf
cyberagent_For New Investors_EN_240424.pdfcyberagent_For New Investors_EN_240424.pdf
cyberagent_For New Investors_EN_240424.pdf
CyberAgent, Inc.
 
Corporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdfCorporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdf
Probe Gold
 
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
ybout
 
Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24
Philip Rabenok
 
Snam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial PresentationSnam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial Presentation
Valentina Ottini
 
2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf
Sysco_Investors
 
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd
 

Recently uploaded (7)

cyberagent_For New Investors_EN_240424.pdf
cyberagent_For New Investors_EN_240424.pdfcyberagent_For New Investors_EN_240424.pdf
cyberagent_For New Investors_EN_240424.pdf
 
Corporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdfCorporate Presentation Probe June 2024.pdf
Corporate Presentation Probe June 2024.pdf
 
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
一比一原版(UW毕业证)华盛顿大学毕业证成绩单专业办理
 
Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24Osisko Development - Investor Presentation - June 24
Osisko Development - Investor Presentation - June 24
 
Snam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial PresentationSnam 2023-27 Industrial Plan - Financial Presentation
Snam 2023-27 Industrial Plan - Financial Presentation
 
2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf2024-deutsche-bank-global-consumer-conference.pdf
2024-deutsche-bank-global-consumer-conference.pdf
 
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
Osisko Gold Royalties Ltd - Corporate Presentation, June 2024
 

GSA calls out Cyber Hunt skills in final Cybersecurity Contract Orals

  • 1. Page 1 Factor 5 Oral Technical Evaluation Criteria Addendum to SCP-FSS-004 SPECIFIC PROPOSAL INSTRUCTIONS FOR SCHEDULE 70 132- 45A Penetration Testing Expected tasks within the scope of this SIN include but are not limited to: ● Conducting and/or supporting authorized penetration testing on enterprise network assets ● Analyzing site/enterprise Computer Network Defense policies and configurations and evaluate compliance with regulations and enterprise directives ● Assisting with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes) Minimum Knowledge Areas: ● Knowledge of penetration testing principles, tools, and techniques (e.g., metasploit, neosploit, etc.) ● Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.) ● Ability to identify systemic security issues based on the analysis of vulnerability and configuration data 132- 45B Incident Response Expected tasks within the scope of this SIN include but are not limited to: ● Collect intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise ● Perform command and control functions in response to incidents ● Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation Minimum Knowledge Areas: ● Knowledge of incident categories, incident responses, and timelines for responses ● Knowledge of incident response and handling methodologies ● Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies 132- 45C Cyber Hunt Expected tasks within the scope of this SIN include but are not limited to: ● Collecting intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise
  • 2. Page 2 ● Coordinating with and provide expert technical support to enterprise-wide Computer Network Defense technicians to resolve Computer Network Defense incidents ● Correlating incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation Minimum Knowledge Areas: ● Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non- nation state sponsored], and third generation [nation state sponsored]) ● Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.) ● Knowledge of incident categories, incident responses, and timelines for responses 132- 45D Risk and Vulnerability Assessments (RVA) Expected tasks within the scope of this SIN include but are not limited to the following. ● Network Mapping - consists of identifying assets on an agreed upon IP address space or network range(s). ● Vulnerability Scanning - comprehensively identifies IT vulnerabilities associated with agency systems that are potentially exploitable by attackers. ● Phishing Assessment - includes activities to evaluate the level of awareness of the agency workforce with regard to digital form of social engineering that uses authentic looking, but bogus, emails request information from users or direct them to a fake Website that requests information. Phishing assessments can include scanning, testing, or both and can be conducted as a one- time event or as part of a larger campaign to be conducted over several months. ● Wireless Assessment - includes wireless access point (WAP) detection, penetration testing or both and is performed while onsite at a customer’s facility. ● Web Application Assessment - includes scanning, testing or both of outward facing web applications for defects in Web service implementation may lead to exploitable vulnerabilities. Provide report on how to implement Web services securely and that traditional network security tools and techniques are used to limit access to the Web Service to only those networks and systems that should have legitimate access. ● Operating System Security Assessment (OSSA) - assesses the configuration of select host operating systems (OS) against standardized configuration baselines. ● Database Assessment - assesses the configuration of selected databases against configuration baselines in order to identify potential misconfigurations and/or database vulnerabilities. Minimum Knowledge Areas: ● Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP) and Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure Library, v3 (ITIL)) ● Knowledge of system and application security threats and vulnerabilities
  • 3. Page 3 ● Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services ● Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code) ● Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.) ● Knowledge of network access, identity and access management (e.g., public key infrastructure, PKI) ● Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth) ● Knowledge of IA principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) ● Skill in assessing the robustness of security systems and designs ● Skill in the use of social engineering techniques ● Skill in applying host/network access controls (e.g., access control list) ● Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems ● Skill in using network analysis tools to identify vulnerabilities ● Ability to identify systemic security issues based on the analysis of vulnerability and configuration data ● Conducting required reviews as appropriate within environment (e.g., Technical Surveillance Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews) ● Perform technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (i.e., local computing environment, network and infrastructure, enclave boundary, and supporting infrastructure) ● Maintaining knowledge of applicable Computer Network Defense policies, regulations, and compliance documents specifically related to Computer Network Defense auditing Oral Technical Evaluation Procedure Pre-scenario Questions: 1. Services Provided a. Which cybersecurity services do you offer? 2. Logistics a. How quickly can you deploy resources for an engagement (Pentest/IR/Hunt/RVA)? b. What is your average team makeup for each type of engagement? c. Do you have resources to deploy nation-wide? After addressing the aforementioned questions, the offeror will be evaluated on their knowledge of the proposed services. The oral technical evaluation will require the offeror to respond to a specific scenario
  • 4. Page 4 and general questions to assess the offeror’s expertise. The questions and evaluation topics for each SIN are as follows: 1. SIN 132-45 A - Penetration Test Evaluation Overview - the following questions and topics will be discussed during the Penetration Test SIN evaluation. a. What activities do you carry out during the Pre-Engagement, Testing/Assessment, and Post-Engagement phases? b. Provide us with a background of your organization's Penetration Testing capabilities. c. What processes and methods are used to conduct reconnaissance activities? d. What specific tools, techniques, and procedures (TTPs) do you utilize to discover and enumerate vulnerabilities for potential exploitation? e. What are some specific tools, techniques, and procedures (TTPs) used to exploit identified vulnerabilities? f. After gaining access to systems and/or data, describe TTPs used for "pivoting" in order to establish a new source of attack on the newly compromised target? 2. SIN 132-45 B - Incident Response Evaluation Overview - the following questions and topics will be discussed during the Incident Response SIN evaluation. a. What activities do you carry out during the Pre-Deployment phase, Incident Identification, Intrusion Detection, and Analysis phase, and the Post-Incident phase? b. Provide us with a background of your organization's Incident Response Service capabilities: c. What malware analysis and reverse engineering capabilities do you have? d. What are the specific processes and methods used to conduct preparation activities? e. What are the specific tools and procedures used by the vendor to detect and analyze potential incidents? f. What are some specific techniques and procedures used to contain and remediate incidents? g. What post-incident support processes or procedures would be put in place? 3. SIN 132-45 C - Cyber Hunt Evaluation Overview - the following questions and topics will be discussed during the Cyber Hunt SIN evaluation. a. What activities do you carry out during the various phases of your Cyber Hunt missions? b. Provide us with a background of your organization's Cyber Hunt Service capabilities. c. What are the specific processes and methods used for hypothesis generation/creation? d. What are the specific tools, techniques, and procedures (TTPs) used by the vendor to test hypotheses? e. What are some specific techniques and procedures used to identify malicious patterns of behavior? f. Describe how the Analytic Automation processes or procedures will be put in place. 4. SIN 132-45 D - Risk and Vulnerability Assessment Evaluation Overview - the following questions and topics will be discussed during the Penetration Test SIN evaluation.
  • 5. Page 5 a. What activities do you carry out during the Pre-Engagement, Testing/Assessment, and Post-Engagement phases? b. Provide us with a background of your organization's Risk and Vulnerability Assessment capabilities. c. Describe the scope and general level of effort (LOE) for each type of service provided. d. What is your process for conducting RVA testing activities? e. Describe the tools utilized during the testing/assessment phase. f. What is your process for conducting RVA post assessment testing activities? Oral Technical Evaluation Criteria The offeror’s responses to the government’s questions during the oral technical evaluation session shall be used to determine whether the Offeror has the requisite experience and expertise to perform tasks expected to be performed within the scope of these SINs. Each oral technical proposal will be evaluated and rated on an acceptable/unacceptable basis. The rating definitions provided below will be used for the evaluation of the offeror’s responses to questions during the oral evaluation. TECHNICAL RATINGS Rating Definition Acceptable/Pass The proposal clearly meets the minimum requirements of the solicitation. Unacceptable/Fail The proposal does not clearly meet the minimum requirements of the solicitation.