INFOSEC CALL FOR PROPOSAL

INFOSEC CALL FOR PROPOSAL

Dar Teknohama Business Incubator
(also referred to as “DTBi”) is a non-profit entity limited by guarantee established by the Tanzania Commission for Science and Technology (COSTECH) in collaboration with infoDev World Bank, the academia and other partners from the private and civil society sectors in 2011. The main aim of DTBi is to nurture and accelerate growth of early stage ICT SMEs and techno-entrepreneurs with ideas leading into successful and sustainable businesses impacting the economy.

DTBi intends to procure the service of a security consultant to provide security audits to 10 DTBi Incubatee solutions; build security systems for 5 selected products, mostly mobile based and thereafter provide 5 days information security training covering ethical hacking aspects. This training should cover the Open Web- Application Security Project (OWASP) top 10 risks and OWASP standards.

1.ELIGIBILITY This call is directed towards Companies involving in Information Security for not less than 3 years in the United Republic of Tanzania and must be registered in Tanzania.

2. SUBMISSION The proposals are to be submitted by email to finance@teknohama.or.tz and copy to info@teknohama.or.tz not later than 23.00 pm 19th December 2016, (hand submissions will not be entertained) and must contain the following components;

(i) Project narrative (Problem statement, objectives, and the proposed solution etc.)
(ii) Budget and implementation plan
(iii) Curriculum Vitae of the key personnel.
(iv) Legal documents (license, VAT e.t.c)

3. EVALUATION CRITERIA
Applications received before the deadline and deemed by DTbi to be compliant with the requirements set out in this Call for proposal will be evaluated in accordance with the following criteria:

(i) Clarity of the proposal
(ii) Staff experience and competence
(iii) Experience of the Company
(iv) Technological relevance of the proposed solution to the Dtbi context
(v) Proof of similar activities undertaken on government/Private sector based information security projects.
(vi) Training and support capacity
(vii) Compliance with the requirements

NB: Training should cover secure software development lifecycle and practices in line with OWASP standards.

 

Incubation for Promoting ICT Innovation and Wealth Creation