Government Acquisition Support


Acquisition of Managed Services.

The government is expanding its use of the “managed services” model (using COCO and GOCO contracts) as compared to the traditional “staff augmentation” model. Axiologic Solutions provides expertise to the government for procuring managed services, particularly in the following areas:

  • Business case generation
  • Requirements definition
  • Defining unique contract terms, such as service level requirements, penalties/credits, innovation, and supply chain security
  • Authoring key documents, e.g., PWS, QASP, SLA
  • Specialized techniques for reviewing response compliance with SLAs
  • Creating strategies for transitioning to managed services
  • Contract performance monitoring

Data Science and Data Analysis in Support of Acquisition Decision Making.

For larger more complex acquisitions, Axiologic Solutions offers specialized data science and data analysis expertise in the following areas:

  • Creating a baseline of current service/product demand and performance, including differences in trends, seasonality, or relationships with other services or mission activities
  • Profiling/baselining current services, to identify important “latent” features that may be the focus of improvement or replacement
  • Developing an accurate total-cost-of-ownership (TCO) profile for current services/products
  • Creating a future demand model
  • Creating an IGCE for different alternatives
  • Creating models to evaluate the likelihood of meetings SLAs

Performing Acquisitions Securely.

Government acquisitions must be conducted with a special focus on security when:

  • Procuring cyber security related services/products, e.g., malware, cyber-range; or
  • Procuring services/products that have cyber security implied and/or explicit requirements.

Axiologic Solutions leverages the NIST Risk Management Framework (SP 800-37) for software/system development and tailors it to the acquisition lifecycle by performing the following:

  • Defining security and privacy requirements, including understanding the expected deployment/usage of the acquired products/services
  • Evaluating security and privacy proposals
  • Evaluating the security risk profile of potential suppliers (products, services), as part of supply chain risk management
  • Training acquisition team members on proper cyber security hygiene
  • Securing data/documentation at storage and during exchange
  • Ensuring the integrity and accuracy of all acquisition related data
  • Evaluating the trustworthiness of third-party data/information/models (e.g., market research)