Jobs Career Advice Signup
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

  • Posted: Feb 6, 2023
    Deadline: Not specified
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Never pay for any CBT, test or assessment as part of any recruitment process. When in doubt, contact us

    The overall objective of the Micro-Enterprises Support Programme Trust (MESPT) is to promote economic growth, employment creation and poverty alleviation through support to enterprises. MESPT works with intermediaries that provide financial or business development services to improve the performance of enterprises. The aim is to strengthen financial intermed...
    Read more about this company

     

    Provision of a Vulnerability Management Solution

    KEY FEATURES OF THE VULNERABILITY MANAGEMENT SOLUTION

    • Ability to perform a Network Asset Inventory; The solution should be able to do this either by pulling information from Active Directory and/or a high-level network scan that probes for active IP addresses.
    • Baseline Scan: The solution should be able to identify the operating system and applications running on identified hosts.
    • Identifying possible vulnerabilities: Retrieve information on vulnerabilities that might affect the hosts and identify possible vulnerabilities across all major operating systems, applications, network devices and database systems. E.g. configuration flaws, missing patches, default passwords, insecure protocols etc.
    • Prioritization: The solution should be able to prioritize the actions that will have the greatest impact on MESPT’s security posture. This can be achieved by incorporating information about the severity and impact of the vulnerability, the priority of the system and any compliance issues that may exist.
    • Quality and Speed of Updates: Frequency of releasing new vulnerability updates. Ability to accurately detect vulnerabilities.
    • Support for Cloud Services. The product should include the ability to detect issues with configurations in the cloud. This is for environments of any tools we use for Infrastructure as a Service, Platform as a Service or Software as a Service.
    • Compliance. The product should provide support for compliance programs such as ISO 27001, GDPR etc. Ability to use the product to perform required scans and complete self-assessments.
    • Active and Passive Detection. The product should integrate both traditional active scanning of systems with passive vulnerability detection based upon observation of network traffic.
    • Authenticated and Unauthenticated Scanning. The product should support authenticated and unauthenticated scanning. The product should support scanning with agents installed and without agents.
    • Remediation Guidance. The product should provide remediation guidance for identified vulnerabilities. The product should provide enough information to remediate the vulnerability.
    • Audit trails; The solution should provide audit trails on user activity e.g. Alerts on system and administrative activity e.g. new accounts creation, permissions addition/deletion, configuration changes etc.
    • Role based Access: The solution should provide role-based access by function.
    • Report Creation: The solution must provide an intuitive reporting interface that can leverage existing reports or the creation of new reports. The reports should also provide for drill down capabilities.
    • Dashboards: The solution should provide dashboards with drill down capability to make it easier to identify and select certain vulnerabilities or vulnerabilities affecting a particular system.
    • Scheduled Reports: The solution should have the ability to schedule reports and/or alerts.
    • Scheduled Scans: The solution should allow for scheduled vulnerability scans and scheduled Asset discovery scans.

    KEY DELIVERABLES
    Detailed Project Schedule, with major deliverables, including but not limited to:

    • Project plan and schedule
    • Resource allocations
    • Product installation
    • Training
    • Add-ons or customizations
      • Documentation / Manuals: Provide electronic copies of the technical and user documentation with your response to the RFP
      • Detailed Cost Schedules: Provide detailed, itemized unit and total costs for each component and service proposed, indicating as appropriate optional and required components and services, including:
      • Recommended hardware specifications, itemized, to meet MESPT’s requirements
      • Recommended software, itemized, to meet MESPT’s requirements and including any 3rd party software license fees
      • Installation/Implementation costs e.g. number of estimated hours / weeks to complete project
      • On-site training costs, e.g. number of estimated hours
      • Provide a post-implementation cost schedule for support, maintenance and upgrades (including any 3rd party licensing fees)

    Contract / license agreement: Submit a copy of any contract / license agreement you will require to be executed at time of award.
    Non-disclosure Agreements: Submit a copy of any non-disclosure contracts you would require to be executed as part of the evaluation process.
    Staff Qualifications: Describe the qualifications and experience of the staff who would be assigned to the implementation. Provide an electronic copy of resumes for your project manager and technical leads.

    Method of Application

    Request for full tender document by writing to procurement@mespt.org

    Build your CV for free. Download in different templates.

  • Apply Now
  • Send your application

    View All Vacancies at Micro Enterprises Support Prog... Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail