GSA has established four (4) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) to provide agencies quicker access to key, pre-vetted support services that will expand agencies’ capacity to test their high-priority IT systems, rapidly address potential vulnerabilities, and stop adversaries before they impact our networks.
Benefits of HACS SINs
- Access to pool of technically evaluated cybersecurity vendors
- Rapid ordering and deployment of services
- Reduction in open market ordering and contract duplication
- Cybersecurity/Acquisition support resources from GSA
Contract Number
47QTCA20D00E2Program Period of Performance
Base Period: August 2020 - August 2025
Option Periods: August 2025 - August 2040
Who Can Use It?
- Federal Agencies
- State and Local Government
Task Order Types Available
- Firm-Fixed-Price (FFP)
- Labor-Hour (LH)
- Time-and-Materials (T&M)
RedTrace Technologies, Inc. Services Offered
- Penetration Testing: is security testing in which assessors mimic real-world attacks to identify methods for circumventing the security features of an application, system, or network.
- Incident Response: services help organizations impacted by a Cybersecurity compromise determine the extent of the incident, remove the adversary from their systems, and restore their networks to a more secure state.
- Cyber Hunt: activities are responses to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Cyber Hunt activities start with the premise that threat actors known to target some organizations in a specific industry, or specific systems, are likely to also target other organizations in the same industry or with the same systems.
- High Value Asset Assessments: includes Risk and Vulnerability Assessments (RVA), Security Architecture Review (SAR), and Systems Security Engineering (SSE). Additionally, the scope of the SIN includes services for the seven step Risk Management Framework (RMF), and Security Operations Center (SOC) services.
- Risk and Vulnerability Assessment: conduct assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. This SIN offers the following services:
- Network Mapping
- Vulnerability Scanning
- Phishing Assessment
- Wireless Assessment
- Web Application Assessment
- Operating System Security Assessment (OSSA)
- Database Assessment
- Penetration Testing