web cap brief 20200507 · threat management, risk management, and insider threat are some of the...

13
This information includes data that shall not be disclosed outside the Agency and shall not be duplicated, used, or disclosed—in whole or in part— for any purpose other than to evaluate this proposal. If, however, a contract is awarded to this offeror as a result of—or in connection with—the submission of this data, the Agency shall have the right to duplicate, use, or disclose the data to the extent provided in the resulting contract. This restriction does not limit the Agency’s right to use the information contained in this data if it is obtained from another source without restriction. The data subject to this restriction is contained in all the accompanying sheets. Corporate Overview

Upload: others

Post on 26-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

This information includes data that shall not be disclosed outside the Agency and shall not be duplicated, used, or disclosed—in whole or in part— for any purpose other than to evaluate this proposal. If, however, a contract is awarded to this offeror as a result of—or in connection with—the submission of this data, the Agency shall have

the right to duplicate, use, or disclose the data to the extent provided in the resulting contract. This restriction does not limit the Agency’s right to use the informationcontained in this data if it is obtained from another source without restriction. The data subject to this restriction is contained in all the accompanying sheets.

Corporate Overview

Page 2: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

NAICS CODES236220 Commercial & Institutional Building Construction334210 Telephone Apparatus Manufacturing 517911 Telecommunications Reseller518210 Data Processing Hosting & Related Services 519190 All Other Information Services541330 Engineering Services541511 Custom Computer Programming541512 Computer Digital Systems Design Services541513 Computer Facilities Management 541519 Other Computer Related Service541611 Administrative/General Management Consulting Services

1

541614 Other Consulting Services541618 Other Management Consulting Services 541690 Other Scientific/Technical Consulting Services 561110 Office Administrative Services561210 Facilities Support Services561499 All Other Business Support Services561612 Security Guards & Patrol Services561920 Convention and Trade Show Organizers611420 Computer Training611430 Professional and Management Development Training

Page 3: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Growth & Financial Capability

Differentiators• 96% D&B Customer Satisfaction Rating• Proven Internal Program Review Process• Excellent Employee Satisfaction

Financial Responsibility and Accounting • $1.5 Million Line of Credit• Line of credit increases with contract award• DCAA Compliant and Audit Ready

2

2014 2015 2016 2017 2018 2019 2020Revenue $136,214 $427,645 $1,313,046 $4,092,345 $5,602,643 $7,166,923 $12,000,000Employees 3 5 14 45 47 53 65

0

10

20

30

40

50

60

70

$-

$2,000,000

$4,000,000

$6,000,000

$8,000,000

$10,000,000

$12,000,000

$14,000,000

Num

ber o

f Em

ploy

ees

Reve

nue

GCubed Growth & Revenue Chart

Page 4: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Mission Support & Professional Service SolutionsGCubed delivers distinctive, mission-critical, technology-based capabilities relevant to the most difficult and enduring customerchallenges.

Cybersecurity

Enterprise Information Technology

Program and Risk Management

Web Collaboration Services

Counterintelligence and Security

GCubed provides enterprise level data center support including information assurance, NIPR and SIPR support, tier-one through three service desk operations support, service desk touch labor support, service desk administration and information assurance support.Enterprise IT and cybersecurity services are provided to Center for Army Analysis, Joint Service Provider (Pentagon), Washington Headquarters Services.

The right mix of planning, monitoring, and controlling can make the difference in completing a project on time, on budget, and with high quality results. Our outstanding Project Managers are CMMI, PMI, and ITIL certified. They are leaders and team players who exhibit collaborative leadership skills like negotiation, agility, and strategy every day.

We support Defense Security Services with senior level CI/HUMIT/Cybersecurity expertise providing training, input into policy, and operational analysis.Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise.

Understanding the current operating environments of government agencies and private sectors; we leverage mature capabilities and industry best practices to improve Security processes and procedures to reasonably mitigate risk.Our past performance and thorough understanding of FedRAMP and NIST 800-53 r4 Risk Management Framework has allowed us to be successful in development of Cyber operations and strategies to focus collection efforts on priority threats to the network and its resources. This includes BCP/COOP/DRP planning

We supported the Rapid Web Development initiative under the WHS Enterprise Information Technology Services Directorate (EITSD) which focused on creating a “One Stop Shop” for all of EITSD web service requirements utilizing Amazon Web Services.

3

Page 5: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Program & Risk Management

Risk Management

Program Management• Demonstrated outstanding performance providing supervision and

guidance for Program personnel.• Responsible for all aspects of program performance to include

technical, contractual and administrative, including managing and supervising personnel.

• Proven record for overseeing the successful completion of all tasks.

• Risk management is a continuous effort that starts prior to the commencement of work. GCubed’s management staff meets weekly to review test activities in progress or planned and their corresponding risks.

• Following the risk management standard process shown below we will maintain an Active Risk (AR) database with risks cataloged and ranked in terms of potential severity and the vulnerability of the assignment to experience that risk.

Mission Success

4

Page 6: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Enterprise Information Technology• Enterprise IT Solutions

• Enterprise IT Management

• Enterprise-wide Implementation &

Support Services

• Cyber Operations

• Network Engineering & Administration• Network Design

• Firewall Configuration

• Virtualization

• Hosting

• Hardware Design/Configuration

• Enterprise Network Help Desk Support• Information Assurance

• DIACAP/DITSCAP/NIST RMF Policy

and Guidance

• Certification & Accreditation

• Authority to Connect/Authority to

Operate

• Compliance Assessments & Support

• Web Site/Portal Design, Hosting,Maintenance

• Cabling/Fiber Optics• Asset Management/ERP System

Implementation• Training• Operation & Maintenance

1. Operations & Maintenance(O&M)

Implements a Cohesive Operations and Maintenance

Program to address customer Enterprise

Requirements

2. Application Development, Engineering, & Sustainment(ADES)

Utilizing Dev OPS, Waterfall, and Agile development

approaches to build effective, efficient, and secure

applications.

3. Hardware BPAs • Support Centralized IT Asset Management

Program for acquiring all IT assets

4. IT Security

• ISSO Support

• Assessment & Authorization Services

• Security Operations Center (SOC)

• Emerging Technology & Modernization Support

5. Mission Needs & Requirements • Cohesive management of planning tasks

(requirements, business case analysis, operational

support plan, enterprise code library management,

validation & integration of security, technical

standards, configuration management, determine

development/solution method)

6. IT Program Management Services

• Skilled IT Project Managers (modern project types)

• Project Services (Risk Adjusted CBA, Integrated

Master Schedule dev. & mgmt., operational

analysis, cost estimation, life cycle support

services, etc.)

• Vendor & Service Management

• Enterprise Architecture

• Capital Planning & Investment Control

7. Independent Verification & Validation (IV&V)

Supporting the Risk Management Framework

5

Page 7: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Counterintelligence & Cybersecurity

OPERATIONS ANALYSIS - Identifying and responding to significant events, vulnerabilities, unmitigated threats, and policy gaps within the national industrial base / National Industrial Security Program.

COLLECTION REQUIREMENTS - Ensures CI collection activities meet requirements / provide actionable intelligence for Federal Law Enforcement and Intelligence counterparts.

COUNTERINTELLIGENCE TRAINING - Introductory and advanced CI/ Insider Threat training (tailored to audience).

SUBJECT MATTER EXPERTS - In the DSS Enterprise; LE/CI/IC community collaboration; DSS CI interface with: the Operations Analysis Group, the DoD Insider Threat Management and Analysis Center, the Vetting Risk Operations Center and the DoD Central Adjudication and DSS Vetting Directorate.

CYBER CI - The Cyber Division develops and executes cyber intelligence in accordance with the National Industrial Security Program (NISP) to combat the foreign intelligence entity threat to cleared contractors.

Our cybersecurity services give you the confidence to securely operate your business with partners, customers, and suppliers.

STRATEGIC CONSULTINGServices to formulate an effective security strategy, including organization, governance, metrics, process, technology deployment, and meeting legal and regulatory compliance.

TECHNICAL CONSULTINGWhen it comes to cyber security, enterprises need to know how they stand in reality – not where their policy says they stand. Today, regulatory and compliance mandates demand it.

BUSINESS CONTINUITY & DISASTER RECOVERYBC/DR plans are the bedrock of preparedness. For organizations, they are components of sound risk management; a means of preserving resiliency during extreme duress.

CYBER ASSURANCEIdentifying, managing, measuring, and reporting on IT security compliance requirements through a complete end-to-end framework and program of standards, processes, and tools.

IT ASSESSMENTSOur proven processes and experienced security experts can help you quickly and cost-effectively certify your products to the standard required by many government and civilian agencies.

MANAGED SECURITY SERVICESConfidently adopt an outside-in approach and securely embrace third-platform and disruptive trends while guarding against rapidly changing risks.

6

Page 8: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Web Collaboration Services

• Developing a reusable System/Network Architecture and Security Architecture for the Web Center of Excellence

• Developing automation of IT system configuration in the cloud

• Providing demonstrable server platform deployment (minutes) on the AWS infrastructure

• Using cost effective website development without maintaining a separate developmentenvironment

• Initiating Enterprise System Administration/Engineering and Monitoring

• Deploying VPN dedicated access, installed cloud based HBSS, ACAS, and TA which provided a platform for the cloud CNDSP

• Providing an Information Assurance process based on the Security Requirement Guide (SRG) and FedRAMP RMF security controls

• Identifying the tools and developing successful system scans

• Program\Project Management• Amazon Web Services• Microsoft Azure• Scripted Provisioning• Cloud Migration• Cost Model Offerings• Web Design & Development• Application Development• Paas, Iaas, Saas

• 508 Compliance• Content Management• Systems Architecture• System Performance

Management• Information Technology

Governance• Information Assurance• Network Security• Incident Management

GCubed supported the Rapid Web Development initiative under the WHS Enterprise InformationTechnology Services Directorate (EITSD) which focused on creating a “One Stop Shop” for all of EITSD web service requirements utilizing Amazon Web Services. The project included:

7

Page 9: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Customers9 Prime Contracts & 2 Sub-Contracts

9

•Center for Army Analysis•Joint Service Provider•Washington Headquarters Services•U.S. Army Audit Agency•Bureau of Safety and Environmental Enforcement•Defense Counterintelligence and Security Agency•Consolidated Adjudications Facility•U.S. Army Acquisition Support Center•U.S. Department of Homeland Security

Page 10: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Contract VehiclesGSA Schedules are a convenient, effective option for government customers. Schedules support compliance but also allow for flexibility to meet your buying needs by providing negotiated contract ceiling prices, opportunities for discounts at the order level and less administrative time and contract documentation hassle. Our full catalog of services provided is available through GSA Advantage. We offer services under the following SINs:

Prime Contracts Sub ContractsGSA Schedule IT-70Contract number: 47QSWA18D0090SIN 132-51 – INFORMATION TECHNOLOGY (IT) PROFESSIONAL SERVICESFPDS Code D301 IT Facility Operation and MaintenanceFPDS Code D302 IT Systems Development ServicesFPDS Code D306 IT Systems Analysis ServicesFPDS Code D307 Automated Information Systems Design and Integration ServicesFPDS Code D308 Programming ServicesFPDS Code D310 IT Backup and Security ServicesFPDS Code D311 IT Data Conversion ServicesFPDS Code D316 IT Network Management Services

GSA Schedule PSSContract number: 47QRAA18D00BHSIN 874 1-Integrated Consulting Services

To learn more about our capabilities, search either of the contract numbers listed above, or search “GCubedEnterprises, Inc.” at GSA Advantage or GSA eBuy.

ITES-3SContract Number: W52P1J-18-D-A079• GCubed is a subcontractor to Trowbridge &

Trowbridge on this contract.• Army Information Technology Enterprise Solutions 3

Services (ITES-3S) Multiple Award Contract (MAC)

NIH CIO-SP3HUBZone Contract Number: HHSN316201800045W• GCubed is a subcontractor to Delmock

Technologies, Inc. on this contract.• The Chief Information Officer-Solution and Partners

3 (CIO-SP3) Small Business Government Wide Acquisition Contract (GWAC) is managed by the National Institutes of Health Information Technology Acquisition and Assessment Center (NITAAC).

10

Page 11: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Corporate Leadership Team

Vernon Green Jr. Founder & CEO [email protected] Army Chief Warrant Officer with over 20 years of experience in a vast range of IT specialty areas.

Wendy Maurer COO [email protected] 20 years of business experience leading organizations large and small.

Chris McKee Capture Manager [email protected] 20 years of experience in business development, capture management, project management, and process improvement in both the federal and commercial sectors.

Kelly Flynn Finance Manager [email protected] five years of finance experience in the government sector growing small businesses into large businesses.

Nicole Albertson Operations Manager [email protected] Certified Auditor with over five years of experience in project management and quality assurance.

GCubed’s team of experts ensures customer satisfaction by continually exceeding expectations.

11

Olivia Blackwell Marketing Manager [email protected] with nine years of experience in a range of artistic fields, with a current focus on providing value tostakeholders through strong creative strategies.

Keith King Security Architect [email protected]. S. Army veteran with over eight years of IT experience supporting the Department of State andDepartment of Defense.

Page 12: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

Awards & Certifications

12

Page 13: Web Cap Brief 20200507 · Threat Management, Risk Management, and Insider Threat are some of the areas in which we provide subject matter expertise. Understanding the current operating

www.gcubedinc.com10 Center Street, Suite 107

Stafford, VA 22556O 540-412-0753 F 866-549-3696

[email protected]

/GCubedInc @g_cubedinc @G_CubedINCGCubed, Inc.

13