GovCon Bid and Proposal Insights

Technical and Programmatic Support Services (TPSS) -Department of the Army-USACE

BidExecs

USACE is set to release TPSS III—a $98M MATOC supporting cybersecurity, ESS, and building control systems. Up to 10 awards, with strong small business participation, and global scope.
Key Details:
• Value: $98M
• Set-Aside: Partial Small Business
• Scope: Cybersecurity, ESS, UMCS, FRCS
Interested in Army tech support contracts? Listen now to get ready for TPSS III.

Contact ProposalHelper at sales@proposalhelper.com to find similar opportunities and help you build a realistic and winning pipeline.

Speaker 1:

Welcome back to the Deep Dive. Today we're plunging into a document that well looks pretty dense at first glance, of performance work statement, or PWS.

Speaker 2:

Right for technical and programmatic support.

Speaker 1:

Exactly. But we're here to peel back those layers, cut through the jargon and really uncover the hidden complexity behind some essential global government operations.

Speaker 2:

It's pretty fascinating stuff when you get into it.

Speaker 1:

Our mission today extract the key insights. We're talking about maintaining critical electronic mechanical systems, mainly for the US Army, but other agencies too.

Speaker 2:

Yeah, and the scope is just well huge.

Speaker 1:

What are the real challenges? What makes this work so specialized? That's what we're diving into.

Speaker 2:

And what's really striking is how this one document outlines such a comprehensive critical set of services I mean from its global reach to these highly specific technical needs and security requirements.

Speaker 1:

Yeah.

Speaker 2:

We're going to see just how interdependent these systems are and what it really takes day to day to keep them running smoothly.

Speaker 1:

OK, let's unpack this. You think about government ops, maybe keeping the lights on, or cybersecurity doesn't immediately jump to mind in this level of detail, but the precision needed here to make sure these essential systems work as intended, it's kind of astonishing.

Speaker 2:

It really is.

Speaker 1:

So the document kicks off saying the contractor provides, you know, personnel, equipment, tools, materials, supervision, all for restoration, adjustment services.

Speaker 2:

Right for building systems.

Speaker 1:

That sounds broad.

Speaker 2:

Yeah.

Speaker 1:

What are the main service buckets here?

Speaker 2:

Okay, so basically we're looking at technical and programmatic support services, tpss, and that focuses on three main areas.

Speaker 1:

Which are.

Speaker 2:

Cyber electronic security systems, that's ESS, and Utility Monitoring and Control Systems. Umcs Got it and the US Army Engineering and Support Center in Huntsville, cehnc. They act as a center of expertise for this, so they support the Army but also other DOD and even non-DOD agencies.

Speaker 1:

Okay, so CEHNC is the hub and this restoration adjustment. What's the main goal? Is it like bringing a complicated machine back to factory specs?

Speaker 2:

That's a pretty good analogy. Actually, the main goal is helping bring existing facilities back into compliance, back to their original design intent and optimal performance. Okay, but and this is important it's not about major renovations or brand new construction. Oh, okay. Yeah, the PWS specifically says no architect, engineer services or complex repairs that need a whole new design.

Speaker 1:

So it's about tweaking and fixing what's already there.

Speaker 2:

Exactly Restoring, adjusting, often through minor repairs, alterations, optimizing what exists to meet its original purpose.

Speaker 1:

And it mentions commissioning, recommissioning or retro-commissioning. Now for someone trying to grasp the nitty-gritty, what's the difference there? And, like, what's the hidden value in retro-commissioning?

Speaker 2:

Right, good question. So commissioning is usually for new systems, making sure they work right from the start, day one. Recommissioning is doing that again later. But retro-commissioning that's where it gets interesting. It's more like an investigative audit of an existing building.

Speaker 1:

An audit how so?

Speaker 2:

Well, they might go in and find, say, a ventilation system that should be super efficient, but it's actually running full blast 24-7. Oh, wow, yeah, maybe just because one small sensor is off. Retro commissioning finds and fixes those hidden problems.

Speaker 1:

So it saves money energy.

Speaker 2:

Huge potential savings energy costs, better climate control all without ripping out old equipment necessarily. It's about making sure systems, even old ones, perform how they were designed to, or even better.

Speaker 1:

OK, that makes sense. Now here's where it gets. I think really interesting the geographic scale.

Speaker 2:

Oh yeah.

Speaker 1:

This isn't just local work, is it? We're talking global.

Speaker 2:

Absolutely not local. The contractor has to be ready to handle multiple jobs, diverse locations all across the continental US conus. That includes Alaska, Hawaii, US territory.

Speaker 1:

That's already big.

Speaker 2:

And then it goes outside. The continental United States conus Specifically calls out Germany, Italy, Japan, South Korea.

Speaker 1:

Yeah, that's a massive footprint.

Speaker 2:

It's immense.

Speaker 1:

What does that kind of reach tell you about the systems, the operations, and what kind of unexpected hurdles pop up working across so many places?

Speaker 2:

Well, it definitely highlights the constant need right Maintaining critical infrastructure at military bases, government sites worldwide. The challenge isn't just where, it's how.

Speaker 1:

How do you know?

Speaker 2:

Maintaining consistent standards, consistent security, reliable supply chains across different countries, time zones, legal systems, you name it.

Speaker 1:

Yeah, the logistics must be intense.

Speaker 2:

It's a logistical nightmare, frankly, even for big private companies doing this for complex interconnected government systems globally. It's vital for national security, for daily ops. These aren't isolated buildings or nodes in a network.

Speaker 1:

OK, let's dig into the actual work. Then the PWS lists a whole bunch of activities beyond just restoring. What are some hands on tasks that really show the technical depth here? Things that might surprise you.

Speaker 2:

Well, there's that retro commissioning we about getting systems back to original parameters, but also doing detailed surveys, assessments, reviewing technical docs from other contractors.

Speaker 1:

OGCs right.

Speaker 2:

Other government contractors yeah, and even buying special gear for testing and demos is pretty broad.

Speaker 1:

I'm seeing things like calibrating sensors, altering direct digital control systems, DDC systems, programming, diagnostic apps. This is way more than just swapping a fuse right, oh, absolutely Highly specialized. What kind of specific knowledge is needed for, say, altering a DDC system?

Speaker 2:

Deep knowledge of building automation, control sequences, programming logic for that specific system, which can vary widely. And then there's testing, adjusting and balancing tab for HVAC, air and water systems.

Speaker 1:

TTB.

Speaker 2:

Yeah, that's critical for efficiency and comfort. Fine-tuning air flows, water flows it's precise work, plus configuring complex systems, tech support for data collection and, crucially, assessing equipment for information assurance. Ia standards.

Speaker 1:

Bridging the physical and the cyber. Exactly, and it even mentions incidental technical solutions like procuring and modifying UMCS or ESS components controllers, sensors, cameras, card readers, switches. So they are buying new stuff sometimes. Doesn't that blur the line with that excluded new design work?

Speaker 2:

It can seem like it, but that word incidental is key.

Speaker 1:

Okay.

Speaker 2:

These purchases and mods are okay as long as they don't cross into that architect-engineer territory. It's about supporting the main service getting systems back to peak performance. Sometimes that means integrating minor upgrades to meet current needs.

Speaker 1:

Right, not building something totally new from scratch?

Speaker 2:

Exactly. It's about making the existing system whole and functional again, maybe even slightly modernized as part of the restoration.

Speaker 1:

Okay Now, given everything today, cybersecurity has to be huge here.

Speaker 2:

Absolutely central.

Speaker 1:

How does this contract handle that, Especially with you know, older electronic and mechanical systems that maybe weren't built with today's cyber threats in mind?

Speaker 2:

That's a fantastic point and it's a core challenge. These legacy systems. Securing them is tough, so what do they do? The contractor provides really comprehensive support helping get an authority to operate an ATO for systems Security engineering services, making sure there's a secure, compliant baseline with all the right documents. They might even provide people for roles like an ISO information system security officer or a configuration manager. The real trick is applying modern cyber frameworks to physical systems that might be old, proprietary. It's a constant adaptation game.

Speaker 1:

And what framework are they using for all this? Is it one size fits all?

Speaker 2:

Good question. How do you standardize this? They follow the risk management framework RMF.

Speaker 1:

RMF.

Speaker 2:

Yeah, it's a very structured lifecycle approach. They kick off RMF activities like registering systems in EMSS.

Speaker 1:

EMSS, that's the government tracking system.

Speaker 2:

Right For managing security assessments. They assign cyber controls, put together authorization teams.

Speaker 1:

So it's definitely not a one-time setup. Sounds like a continuous process.

Speaker 2:

Oh, absolutely ongoing. They implement controls, validate them with things like vulnerability scans, fix the findings Right. And what's really interesting is they have to develop all the RMF paperwork, policies, sops, training stuff Wow Okay and prepare the plan of actions and milestones, the POANM, for any leftover vulnerabilities. Then they have to maintain that authorization, constantly monitor the security posture, do regular reviews. It never really stops because the threats always change.

Speaker 1:

And they're doing this under a massive umbrella of regulations. You look at that list Army regs, Air Force instructions, NIST, FISMA, DIDE stuff, DISA, STIGs. What's the biggest headache in keeping all that straight?

Speaker 2:

across so many different systems. It's a huge list, you're right.

Speaker 1:

Yeah.

Speaker 2:

AR-25-1, ar-25-2, nist 800 series, fisma DOD 8570.01,. Acumen for Workforce DISA STIGs.

Speaker 1:

STIG Secure technical implementation guys.

Speaker 2:

Exactly, and the biggest challenge with Stig's they aren't just general ideas, they are incredibly granular. Like, how granular Like specifying the exact password complexity allowed on a network-connected temperature sensor, or demanding you disable specific obscure network ports on a security camera. It requires this obsessive attention to detail on a security camera. It requires this obsessive attention to detail and ensuring that level of precision consistently across a global portfolio of systems old, new, different manufacturers that's incredibly demanding. One tiny slip could be a vulnerability.

Speaker 1:

Yeah, I can imagine. This definitely sounds like you need a very specific, highly qualified team. What kinds of pros are we talking about? What's unique about the qualifications needed?

Speaker 2:

Well, the PWS lists out quite a few key personnel. You've got your program manager, contracts manager, but then the really specialized engineers senior electrical mechanical engineer, senior electronic security system engineer, even a fire protection engineer and, on the IT cyber side, a lead IT cybersecurity manager, senior system security engineers, plus a quality control manager overseeing everything.

Speaker 1:

That blend of traditional engineering and cutting edge cyber. That seems unique.

Speaker 2:

It really is. You need people who understand both the physical systems and the digital threats against them.

Speaker 1:

What kind of background certs are needed, especially for those cyber roles? Sounds like it's more than just a college degree.

Speaker 2:

Oh, definitely Many roles need a bachelor's in engineering or similar, plus maybe seven, 10 years relevant experience, often managing projects or teams. Okay, senior engineers usually need a professional engineer's license, a PE, but for cyber roles like that lead IT, cyber manager or the senior system security engineers, they have to meet specific DoD directives.

Speaker 1:

Like 8140 and 8570.

Speaker 2:

Exactly DoD directive 8140.01 for cyberspace workforce management and 857.01 IM for the IA workforce improvement program, and usually at high levels like level three.

Speaker 1:

Level three. What does that mean practically?

Speaker 2:

It means advanced certifications, things like CISSP, CISSM, maybe specific vendor certs, plus verified hands-on experience securing complex government systems way beyond standard commercial IT certs, and project managers typically need a PMP.

Speaker 1:

Okay, and the government isn't just trusting the contractor's resume, right, seems like they're checking closely.

Speaker 2:

Precisely. The government reviews and approves these key people based on their own assessment, verifying the documents. The contracting officer has the final say.

Speaker 1:

So they can reject someone.

Speaker 2:

Absolutely, and the contractor can't just swap out key personnel without written consent beforehand. It ensures continuity, keeps that expertise locked in. It's a very hands-on approval process showing how critical these roles are.

Speaker 1:

Makes sense. So, with this critical work, how does the government actually ensure quality and safety across all these different jobs and locations?

Speaker 2:

It's basically a two-pronged approach checks and balances. It's basically a two-pronged approach, checks and balances. Okay, the contractor has their own responsibility. A quality control plan or QCP. They create it, maintain it, make sure their work meets the PWS standards.

Speaker 1:

That's internal.

Speaker 2:

Right, then the government uses a quality assurance surveillance plan, qasp, to watch over the contractor's shoulder, essentially to evaluate their performance.

Speaker 1:

Okay, the QAST. So what happens if something's not up to snuff? You mentioned these really tight deadlines for fixing things 24 hours for critical issues.

Speaker 2:

Yeah, the corrective action request system, the SOAR system.

Speaker 1:

Right. Is there a risk that fixing something that fast means it's not fixed thoroughly or that small stuff gets missed?

Speaker 2:

That's a fair question. The PWS tries to prevent that. The QASB defines what's acceptable, how they'll check. If there's a problem, they issue a CRR.

Speaker 1:

Critical major or minor.

Speaker 2:

Exactly Critical non-conformance could be hazardous. 24 hours to respond and propose a fix. Major affects usability 72 hours. Minor may be 15 business days.

Speaker 1:

And if they don't meet that?

Speaker 2:

Penalties yeah, could be reduced payments, bad performance reviews, even ending the contract. The pressure is definitely on for immediate and thorough fixes. The oversight is designed to catch corner cutting.

Speaker 1:

Okay and beyond, quality safety has to be huge Working with electricity heavy gear.

Speaker 2:

Paramount. Everything has to follow the US Army Corps of Engineers Safety Manual EM-38511.

Speaker 1:

That sounds serious it is Very detailed.

Speaker 2:

They need an abbreviated accident prevention plan just for a site visit, a full site-specific accident prevention plan, before doing any real installation work.

Speaker 1:

Wow.

Speaker 2:

And for really hazardous screen lifts high voltage. You need a full-time site safety and health officer and SSHO right there, plus monthly safety reports on injuries, hours worked. It's a very High voltage. You need a full-time site safety and health officer and SSHO right there, plus monthly safety reports on injuries hours worked. It's a very strict safety culture.

Speaker 1:

Okay, and one last piece the security of the people themselves and the sensitive info they're handling inside these facilities. Lots of checks there too.

Speaker 2:

Multiple layers absolutely.

Speaker 1:

Right.

Speaker 2:

Everyone needs basic eight-level eye awareness training just to get on an army installation.

Speaker 1:

AT anti-terrorism.

Speaker 2:

Then for IT access, US citizens need designations ITI-2 or 3, which trigger background checks SSBI and ACLC Depends on the level and they need a common access card, a CAC.

Speaker 1:

What about non-US citizens?

Speaker 2:

Need approval from the USE HQ foreign disclosure officer. Plus, everyone gets training, like I watch each core watch reporting suspicious stuff, threat awareness reporting program, tarp training and they use E-Verify for checking employment eligibility.

Speaker 1:

And classified info.

Speaker 2:

Whole other level. Contractor needs a facility clearance. Personnel need individual clearances. Anyone without a clearance needs an escort at all times in secure areas. It's exhaustive, covering personnel, physical and information security.

Speaker 1:

Okay, so we've really dug into what looks like, you know, a pretty dry government document. What's the big takeaway here for you, the listener?

Speaker 2:

Why does understanding this level of detail matter. I think this deep dive really shows the massive, often invisible, effort that goes into keeping critical infrastructure running Stuff that impacts our daily lives. National security From the global reach, the super specialized skills, those intense security and quality rules. Every bit of this document is about ensuring reliability, safety, efficiency, whether it's the AC in a command center or the cybersecurity protecting sensitive data.

Speaker 1:

It's like a hidden army, as you said.

Speaker 2:

Exactly Quietly, keeping everything humming.

Speaker 1:

It really drives home that these complex systems we rely on depend on this intricate web Specialized skills, rigid standards, constant careful oversight. So maybe next time you hear critical infrastructure you'll think about this detailed work, these experts behind the scenes.

Speaker 2:

Yeah, and it leaves you with a pretty important question, I think. As technology just keeps accelerating, systems get even more connected, more complex. How do requirements like these, so detailed and comprehensive, now adapt? How do we make sure critical systems stay secure and functional against threats and innovations we haven't even seen yet?

Speaker 1:

What new unseen complexities are just around the corner.

Speaker 2:

Exactly, that's the ongoing challenge.