EAGLE II - Streamlining Homeland Security Acquisitions for Information Technology

EAGLE II - Streamlining Homeland Security Acquisitions for Information Technology

These days, the homeland security mission moves fast… and acquisition lead times just do not support the speed to mission that agencies need to stay ahead of the threat. Acquiring information technology support services such as data analytics, cybersecurity, information sharing, and IT strategy and transformation must happen faster than ever before – yet bring more innovation and lower risk at the same time.

Contracting Officer Representatives (CORs) are at the nexus of selecting IT providers but must wade through the complications of acquisition strategies, a myriad of contract vehicles (DHS alone has more than 60), and an over-worked acquisition workforce.

One of the Department of Homeland Security’s (DHS) most flexible contract vehicles, and a cornerstone of the Department’s strategic sourcing strategy, is EAGLE II.  It is a multiple-award IDIQ contract vehicle, the preferred source of IT services for the majority of DHS’s enterprise infrastructure and initiatives across three functional categories (FC). 

FC2 includes Information Technology Program Support Services. It includes many types of projects: strategic planning, business process re-engineering (BPR)/ process improvement, IT transformation and strategy, enterprise architecture, data management, information sharing, information security, capital planning and investment control (CPIC), workforce planning, budget execution, performance management, training, enterprise resource management, organizational change management, and program management office (PMO) support. It is ideally suited for data analytics, cybersecurity, and information sharing – all major trends in IT.

 

The EAGLE II contract structure provides flexibility over time to meet mission and technology program schedules. Here are our lessons learned with EAGLE II:

  • To get a flexible solution, use a combination of Firm Fixed Price (FFP) contract line item numbers (CLINs) with optional Time and Materials CLINs for surge support or special projects
  • Providing a draft RFP prior to the release of the actual task order increases the quality of proposed solutions and allows providers to identify more complete staffing solutions
  • Documenting the evaluation criteria clearly in terms of the quality in technical approach, management approach, and past performance helps justify best value and allows you to select the right provider to supply the best mission results
  • Use true performance-based contracting… using a Statement of Objectives and asking contractors to provide a Performance Works Statement and metrics for a Quality Assurance Surveillance Plan… and, if you use FFP, include specific outcomes and deliverables and don’t treat it like T&M with a not-to-exceed
  • Conduct quick market research sessions in person, organized by the small business liaisons… you can do these in 20 minutes per company!
  • Include “Innovative ideas that save money and increase mission performance” as an evaluation criteria to incent unique and different ways to approach the work

EAGLE II offers you a set of pre-vetted, highly qualified prime contractors to deliver against a broad scope of IT requirements. Find out more information about EAGLE II .

Contributors

Tim Faulkner |

Tim is a Director at Arc Aspicio with over 20 years of experience in public and private sector management consulting, focusing on commercial consulting for telecommunications companies (both wireline and wireless) before transitioning to government consulting ten years ago. For the past six years, his focus has been exclusively on the Department of Homeland Security, supporting programs for CBP, USCIS, TSA, ICE, and DHS HQ. His areas of expertise include program/ project management, strategic planning, knowledge management, capital planning and investment control, communications/ change management, and performance management. Tim graduated with a BA in American History and an MA in Early Modern European History from UVA.

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

Running IT Like a Business: How Technology Business Management is Shaping the Future of Federal Agencies

As the Government continually looks for ways to increase efficiency and encourage innovation, Information Technology (IT) is emerging as a solution to these needs. Recent Federal guidance mandates all agencies to adopt a new framework for better understanding IT costs. Technology Business Management (TBM) is a framework that incorporates IT departments into the overall business network, shifting away from treating IT as an independent unit. This provides a clear way to evaluate and manage IT, running IT as a business and communicating the value of new IT investments.

Behavioral Science – Using Behavioral Science to Affect Action

Behavioral Science – Using Behavioral Science to Affect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

Washington, DC, October 19, 2018 — LeadersNest named Arc Aspicio CEO Lynn Ann Casey a FedFem Award Honoree. The FedFem awards salute high-impact women executives and leaders of the government contracting community. FedFem Award Honorees blend their entrepreneurial courage and Federal government support that effectively impacts the industry, national economy, and the local marketplace. 

Boosting the Mission: Developing Acquisition Requirements Guidance

Boosting the Mission: Developing Acquisition Requirements Guidance

To keep up with the fast pace of change in the field of Government acquisitions, Department of Homeland Security (DHS) components are developing their own acquisition requirements (AR) policies. However, without specific timeframes to finalize these policies, DHS agencies often lack guidance on how to develop ARs. Among DHS agencies, the U.S. Coast Guard is leading the way with their own formal policy to describe this process. To compliment the U.S. Coast Guard’s policy, DHS created the Joint Requirements Integration and Management System (JRIMS) to offer direction for agencies—to review, validate, and suggest solutions for capability gaps and requirements.