FBI Offers Updates on IT Support Services Recompete

The FBI is still in the process of evaluating quotes and plans to announce in the coming weeks the top 60 vendors that will move to the second phase of the solicitation for the IT Supplies and Support Services recompete contract.

“I anticipate the release of the ‘Top 60’ within the next few weeks along with instructions for Phase II,” Jeffrey Markovich, contracting officer at FBI, wrote in a FedBizOpps notice published Monday.

In April 2018, the bureau issued a request for information on potential IT vendors in support of the recompete contract, which is now called the IT Enterprise Contract Services Schedule 70 blanket purchase agreement.

Once the FBI finalizes the selection process, Nextgov reported 20 large companies and 10 small businesses will have spots on the BPA, which will have a one-year base term and four option years. FBI components can use ITECS to award task orders for mobile device platforms, cloud-related professional services, access and identity management and other security services.

Check Also

John Cooney

Former ITA Official John Cooney to Lead SkyWater’s Government Engagements

John Cooney, a former official at the Department of Commerce's International Trade Administration, has joined semiconductor foundry services provider SkyWater Technology as director of U.S. government relations.

Ellen Lord

DoD Launches Pilot Programs for Software Procurement; Ellen Lord Quoted

The Department of Defense (DoD) has made continued efforts to transform software procurement across the military,  FedScoop reported Thursday. Ellen Lord, undersecretary of defense for acquisition and sustainment and four-time Wash100 Award recipient, has developed pilot programs to test the acquisition.

Analyst1

Analyst1 to Help DoD’s Innovation Org Develop Cyber Threat Intell Platform

Analyst1 has been selected help the Defense Innovation Unit transform cybersecurity operations through the development of an enterprise-grade technology that will work to automatically process threat intelligence data.