AAC participates on the following teams to support SPAWAR's Small Business and unrestricted requirements over multiple pillars:
- Business and Force Support (BFS), Unrestricted (Booze Allen Hamilton)
- Business and Force Support (BFS), SBSA (Mandex)
- Integrated Cyber Operations (ICO), SBSA/SB Preferred (Mandex)
- Decision Superiority (DS), SBSA (Mandex)
- Transport and Computing Infrastructure (TCI), Unrestricted (CSC)
Pillar Scope of Work:
Business and Force Support (BFS) Portfolio
The BFS Portfolio is dedicated to improving customers’ ability to execute mission-essential business operations and other business and force support functions by developing, delivering and supporting systems and applications. The BFS Portfolio is focused on transitioning customers to enterprise solutions using state-of-the-art technologies promoting operational efficiency and flexibility while reducing long-term sustainment costs. The BFS Portfolio is also focused on improving network, system, and security services, and providing cost-wise paths for upgrading systems to provide enhanced capabilities, scalable to large enterprises, based on recognized quality standards. These improvements are accomplished and capabilities delivered through an integrated set of technical disciplines and support
Decision Superiority (DS) Portfolio
The DS Portfolio provides full system lifecycle support including research, development, test, evaluation, production and fielding of sustainable, secure, survivable, and interoperable Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, Reconnaissance (C5ISR), Information Operations, Enterprise Information Services (EIS) and Space capabilities.
Integrated Cyber Operations (ICO) Portfolio
The ICO Portfolio delivers the capabilities to operate, secure and defend the network and data in support of the warfighter's mission. The ICO Portfolio brings a close coupling between engineering, development and operational services focused on computer network defense, computer network exploitation, and computer network attack. These efforts are intended to enable U.S. forces to maneuver in the cyber domain while denying the adversary’s ability to maneuver in this domain. Special attention is paid to protecting U.S. critical infrastructure and information in limiting the adversary’s ability to maneuver. Computer network defense systems include network scanning and mapping systems, network vulnerability analysis, network penetration testing, network red teaming, network sensing devices, network packet sniffers, network activity correlation and fusion algorithms, systems enabling the identification and attribution of hostile computer network attack and computer network exploitation. Computer network exploitation includes systems, software and devices enabling intelligence collection on data at rest or moving through the cyber environment. Computer network attack systems include those designed to deny or disrupt the adversary’s use of the cyber domain and are delivered through the cyber domain. All aspects of information assurance are also included in this portfolio, and include cryptographic devices. This portfolio also includes Network User Authentication. The ICO capabilities are understood to include the following examples: CNA (red teaming), CNE (ISR on the net), CND (Perimeter sensing devices, intrusion detection, firewalls), IA (cryptographic devices and software, DITSCAP/DIACAP Services), and Network User Authentication.
Transport and Computing Infrastructure (TCI) Portfolio
TCI Encompasses shore and afloat communications, satellite and joint space communications, networks, network management, common computing environment, infrastructure to include all hardware and software components, cloud computing, Consolidated Afloat Network Enterprise Services (CANES) components, and wireless networking.