Skip to main content Skip to Footer

CAPABILITY


GSA Advantage    GSA IT-70

OVERVIEW

The Information Technology (IT) Schedule 70 (a Multiple Award Schedule) grants agencies direct access to commercial experts who can thoroughly address the needs of the government IT community through Special Item Numbers (SINs). Accenture's Schedule 70 contract includes the following SIN awards:

SIN 132-51: Information Technology Professional Services - Includes resources and facilities management, database planning and design, systems analysis and design, network services, programming, conversion and implementation support, network services project management, data/records management, and other services relevant to 29CFR541.400.

SIN 132-56: Health Information Technology Services - Includes a wide range of Health IT services to include connected health, electronic health records, health information exchanges, health analytics, personal health information management, innovative Health IT solutions, health informatics, emerging Health IT research, and other Health IT services

SIN 132-45A: Penetration Testing - Is security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network. Related Job Titles include but are not limited to: Blue Team Technician, Penetration Tester, Red Team Technician, and Ethical Hacker. Tasks include but are not limited to:

  • Conducting and/or supporting authorized penetration testing on enterprise network assets
  • Analyzing site/enterprise Computer Network Defense policies and configurations and evaluate compliance with regulations and enterprise directives
  • Assisting with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes

SIN 132-45B: Incident Response - Services help organizations impacted by a Cybersecurity compromise determine the extent of the incident, remove the adversary from their systems, and restore their networks to a more secure state. Related Job Titles include: but are not limited to: Incident Response Analyst, Computer Crime Investigator, and Intrusion Analyst. Tasks include but are not limited to:

  • Collect intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise
  • Perform command and control functions in response to incidents
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation

SIN 132-45C: Cyber Hunt - activities are responses to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Cyber Hunt activities start with the premise that threat actors known to target some organizations in a specific industry, or specific systems, are likely to also target other organizations in the same industry or with the same systems. Use information and threat intelligence specifically focused on the proximate incident to identify undiscovered attacks. Investigates and analyzes all relevant response activities. Related Job Titles include but are not limited to: Computer Crime Investigator, Incident Handler, Incident Responder, Incident Response Analyst, Incident Response Coordinator and Intrusion Analyst. Tasks include but are not limited to:

  • Collecting intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise
  • Coordinating with and provide expert technical support to enterprise-wide Computer Network Defense technicians to resolve Computer Network Defense incidents
  • Correlating incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation

SIN 132-45D: Risk and Vulnerability Assessments (RVA) - conduct assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. RVA services include but are not limited to: Network Mapping, Vulnerability Scanning, Phishing Assessment, Wireless Assessment, Web Application Assessment, Operating System Security Assessment (OSSA), and Database Assessment. Related Job Titles include but are not limited to: Risk/Vulnerability Analyst, Vulnerability Manager, Ethical Hacker, Computer Network Defense (CND) Auditor, Compliance Manager, and Information Security Engineer. Tasks include but are not limited to:

  • Network Mapping - consists of identifying assets on an agreed upon IP address space or network range(s).
  • Vulnerability Scanning - comprehensively identifies IT vulnerabilities associated with agency systems that are potentially exploitable by attackers.
  • Phishing Assessment - includes activities to evaluate the level of awareness of the agency workforce with regard to digital form of social engineering that uses authentic looking, but bogus, emails request information from users or direct them to a fake Website that requests information. Phishing assessments can include scanning, testing, or both and can be conducted as a one- time event or as part of a larger campaign to be conducted over several months.
  • Wireless Assessment - includes wireless access point (WAP) detection, penetration testing or both and is performed while onsite at a customer’s facility. Web Application Assessment - includes scanning, testing or both of outward facing web applications for defects in Web service implementation may lead to exploitable vulnerabilities. Provide report on how to implement Web services securely and that traditional network security tools and techniques are used to limit access to the Web Services.

SIN 132-40: Cloud Computing Services - Includes commercially available cloud computing services such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) and emerging cloud services.

SERVICES

Accenture offers over 400 labor categories with rates for both Government and Contractor Sites. Accenture is able to provide support in locations both CONUS and OCONUS. Federal government agencies and state/local government agencies, through the cooperative purchasing program, are eligible to use Schedule 70. The GSA also has a list of eligible users that are able to use Schedule 70 and may approve additional eligible users on a case-by-case basis.

Samplings of services that may be offered under Accenture’s IT Schedule 70 contract SINs include, but are not limited to:

  • IT Facility Operation and Maintenance

  • IT Systems Development Services

  • IT Systems Analysis Services

  • Automated Information Systems Design and Integration Services

  • Programming Services

  • IT Backup and Security Services

  • IT Data Conversion Services

  • Computer Aided Design/Computer Aided Manufacturing (CAD/CAM) Services

  • IT Network Management Services

  • Creation/Retrieval of IT Related Automated News Services, Data Services, or Other Information Services

  • Cyber Services

  • Health IT Services

  • Cloud Computing Services

ABOUT THE CONTRACT

Contract Number:GS-35F-540GA
Period of Performance:July 12, 2017 – July 11, 2022
Who is Eligible: All federal agencies, state and local (cooperative purchasing), and other eligible users
Vehicle Type: GSA Multiple Award Schedule (MAS)
Award Type: Multiple Award Schedule
Accenture Role: Prime
Subcontractors: Issued under individual task orders
Government User Fee: 0.75% Industrial Funding Fee (IFF) applied to schedule services
Task Order Types: Firm Fixed Price, Labor Hour, Time & Materials

GSA Pricelist
Terms & Conditions/Clauses
GSA Schedule 70
GSA Schedule 70 FAQs
GSA Schedule FAQs
GSA's Cooperative Purchasing FAQs
GSA's Eligible User List

END USER LICENSE AGREEMENTS (EULAS) FOR SIN 132-40

Label: End User License Agreements (EULAS) for SIN 132-40

AWS CUSTOMER ACCESS TERMS [PDF]

CONTACT US

 

Sandi LaCroix
Sales/Main Contact
+1 571-414-3350

Mail to Sandi LaCroix. This opens a new window.

Tom Greiner
Program Manager
+1 703-947-1716

Mail to Tom Greiner. This opens a new window.

Tania Koles
Contract Manager
+1 571-414-4033

Mail to Tania Koles. This opens a new window.

General GSA Schedule Email box

Mail to General GSA Schedule Email box. This opens a new window.