*****THIS POSITION IS CONTINGENT UPON AWARDING OF A GOVERNMENT CONTRACT*****
The Contractor shall provide all personnel, equipment, supplies, facilities, transportation, tools, materials, supervision, and other items and non-personal services necessary to perform C4IM services as defined in this Performance Work Statement except as specified in part 5. The Contractor shall perform to the standards in this contract.
* Assist in course confirmation briefs, hot washes, and after-action reviews, development of training schedules and training support requests, and establish and maintain a Range Facility Management Support System account (RFMSS) to support the Training and Education Branch (TEB), the MRTC Operations section, and appropriate training companies. * Work extensively with the Risk Management program, Systems Approach to Training (SAT), and Program of Instruction (POI) Development, Analysis and Improvement. * Assist in coordinating with the Marine Raider Regiment (MRR), Marine Raider Support Group (MRSG), Weapons Training Battalion (WTBN), and Camp Lejeune Range Control for the conduct of designated courses to include planning, coordinating, and executing scheduled courses and de-conflicting scheduling issues. * Systems Configuration: ensure all systems are configured to the minimum-security baseline in accordance with DoDI 8510.01 and AR 25-2 and local policy. All systems shall be built using the Army Gold Master (AGM) baseline image provided by the local Regional Cyber Center (RCC) or supporting Theater Signal Command (TSC). * IA Vulnerability Alerts: ensure that all applicable IA Vulnerability Alerts (IAVAs) are applied prior to the suspense date and reports actions taken through designated reporting channels. The Contractor shall also take action on Information Assurance Vulnerability Management (IAVM) as required IAW the established timelines. * Information Systems Assessment and Authorization: When requested by the Government Information Systems Security Manager (ISSM), or as required due to changes in the network, assist with the functional support for assessments and authorizations and documentation of all Information Systems in accordance with DoDI 8710.01 (Risk Management Framework (RMF) for DoD Information Technology (IT). These efforts include utilizing the Enterprise Mission Assurance Support Service (eMASS) to record RMF activities such as control implementation of 18-20 Control Families, that consist of approximately 400 Security Controls (security controls are broken down into individual, measurable, statements called assessment procedures or Control Correlation Indicators (CCIs)) in accordance with DoDI 87501.01. Ensure all information systems are configured in accordance with DISA Security Technical Implementation Guides (STIG), applicable patches, and other cybersecurity requirements. . * Software Installation: install DOD approved anti-virus software on all information systems and ensure that all equipment is configured in accordance with Army baseline requirements. The antivirus software for use on Government computers is available via the AGM program as part of the baseline image provided by the supporting RCC or TSC. * Command Software Programs: protect and defend the information systems in accordance with Army policies and procedures. Use the command software program (i.e., ACAS or approved DoD scan tools) to scan the network to support the IAVM program and the accreditation program. The currently designated solution in Automation Equipment, e.g. Hercules or SCCM, shall be used to apply patches and IAVA fixes to computers attached to the network. Defensive vulnerability scans will be conducted by the supporting TSC prior to accreditation and during the length of the contract to ensure that IA requirements are enforced. Ensure that the DOD computer-warning banner is installed on all internal automation and that it conforms to the standard prescribed in AR 25-2. * Networthiness: comply with AR 25-1, AR 25-2, and applicable Information Assurance BBPs. Shall not install or connect non-Government-owned computing systems or devices to Government networks without the COR/TM coordinating and obtaining proper authorization from the appropriate IA office and ensuring that software has a Government Certificate of Networthiness (CoN). The non-Government-owned computing systems or devices include, but are not limited to personal or contractor-owned thumb drives (e.g. memory sticks, flash drives, Universal Serial Bus (USB) drives, jump drives, pen drives), removable or external hard drives, Personal Digital Assistants (PDA), Personal Computer Cards/Express Cards, MP3 players, cell phones, digital media, floppy disks, compact disc (CD)/digital video disk (DVD) burners, optical recordings, photo flash cards, laptops or any devices that can store data. Ensure any sensitive information, including but not limited to Personably Identifiable Information (PII), For Official Use Only (FOUO), proprietary, and Law Enforcement Sensitive information residing on Mobile Computing Devices (MCD) or other external media is protected in accordance with current Data at Rest (DAR) guidelines and requirements using an authorized, approved and prescribed DAR solution. MCD's include but are not limited to laptop, Netbook, notebook, or tablet computers; Blackberry or equivalent devices; external media includes optical disc media such as CDs, DVDs, USB drives, also referred to as flash or thumb drives (when authorization to use them is restored), floppy disks, and other portable digital storage devices.
* Served a minimum of 1 year as an enlisted E-7 or higher * 3 years of experience in a SOF or Marine Corps combat arms unit in an Operations Section at the Battalion level or above * 1 year of experience using MS Word, Outlook, PowerPoint and Excel * Minimum of one year of experience working with the USMC Range Facility Management Support System (RFMSS) * Possess a SECRET clearance on day one of contract execution.
About the company:
As a Service Disabled, Veteran Owned Small Business (SDVOSB) we are a provider of Information Technology (IT) professional services, software solutions and professional development training. Our core competencies evolved from leveraging IT enablers for knowledge management with an emphasis on Web Based Knowledge Portals and Portal Services, Server/System Services, SharePoint Development and System Administration and SQL Server Services. Our capabilities have expanded to include software development, technical training support and field support services.
Guiding Principles o Satisfy the customer - "Exceed expectations" o Set the Example - "Be out front" o Be Responsive - "Timing is everything" o Persevere - "Find a way"
PTP offers a comprehensive benefits program:
o Medical insurance o Dental insurance o Vision insurance o Supplemental benefits (Short Term Disability, Cancer & Accident). o Employer-sponsored Basic Life & AD&D Insurance o Employer-sponsored Long Term Disability o 401(k)
Holidays and Annual Leave o 10 Paid Holidays o 120 hours PTO accrual