SPAWAR Pillar Vehicles

Contract Ceiling: 
Period of Performance date: 
Prime Contractor: 
About SPAWAR Pillar Vehicles: 

AAC participates on the following teams to support SPAWAR's Small Business and unrestricted requirements over multiple pillars:

  • Business and Force Support (BFS), Unrestricted (Booze Allen Hamilton)
  • Business and Force Support (BFS), SBSA (Mandex)
  • Integrated Cyber Operations (ICO), SBSA/SB Preferred (Mandex)
  • Decision Superiority (DS), SBSA (Mandex)
  • Transport and Computing Infrastructure (TCI), Unrestricted (CSC)

Pillar Scope of Work:

Business and Force Support (BFS) Portfolio

The BFS Portfolio is dedicated to improving customers’ ability to execute mission-essential business operations and other business and force support functions by developing, delivering and supporting systems and applications. The BFS Portfolio is focused on transitioning customers to enterprise solutions using state-of-the-art technologies promoting operational efficiency and flexibility while reducing long-term sustainment costs. The BFS Portfolio is also focused on improving network, system, and security services, and providing cost-wise paths for upgrading systems to provide enhanced capabilities, scalable to large enterprises, based on recognized quality standards. These improvements are accomplished and capabilities delivered through an integrated set of technical disciplines and support

Decision Superiority (DS) Portfolio

The DS Portfolio provides full system lifecycle support including research, development, test, evaluation, production and fielding of sustainable, secure, survivable, and interoperable Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, Reconnaissance (C5ISR), Information Operations, Enterprise Information Services (EIS) and Space capabilities.  

Integrated Cyber Operations (ICO) Portfolio

The ICO Portfolio delivers the capabilities to operate, secure and defend the network and data in support of the warfighter's mission. The ICO Portfolio brings a close coupling between engineering, development and operational services focused on computer network defense, computer network exploitation, and computer network attack. These efforts are intended to enable U.S. forces to maneuver in the cyber domain while denying the adversary’s ability to maneuver in this domain. Special attention is paid to protecting U.S. critical infrastructure and information in limiting the adversary’s ability to maneuver. Computer network defense systems include network scanning and mapping systems, network vulnerability analysis, network penetration testing, network red teaming, network sensing devices, network packet sniffers, network activity correlation and fusion algorithms, systems enabling the identification and attribution of hostile computer network attack and computer network exploitation. Computer network exploitation includes systems, software and devices enabling intelligence collection on data at rest or moving through the cyber environment. Computer network attack systems include those designed to deny or disrupt the adversary’s use of the cyber domain and are delivered through the cyber domain. All aspects of information assurance are also included in this portfolio, and include cryptographic devices. This portfolio also includes Network User Authentication. The ICO capabilities are understood to include the following examples: CNA (red teaming), CNE (ISR on the net), CND (Perimeter sensing devices, intrusion detection, firewalls), IA (cryptographic devices and software, DITSCAP/DIACAP Services), and Network User Authentication.

Transport and Computing Infrastructure (TCI) Portfolio

TCI Encompasses shore and afloat communications, satellite and joint space communications, networks, network management, common computing environment, infrastructure to include all hardware and software components, cloud computing, Consolidated Afloat Network Enterprise Services (CANES) components, and wireless networking.

Contract Features: 
CPFF, Fixed Price
AAC Team Capabilities: 
The Team provides enterprise IT policy and planning, integrated solutions management, performance benchmarking, business process reengineering, requirement analysis, market research and prototyping, information and knowledge engineering, custom application development, product integration, test and evaluation, asset management, communications/network engineering, security engineering certification and accreditation, telecommunications support, computer-telephony integration, web services, software applications and licenses, data center support, and managed services.