Cyber Security Audit - Infrastructure Audit
Sashastra Seema Bal (ssb)
JAMMU, JAMMU & KASHMIR
Bid Publish Date
29-Mar-2025, 12:44 pm
Bid End Date
28-Apr-2025, 1:00 pm
EMD
₹30,000
Location
Progress
Quantity
1
Bid Type
Two Packet Bid
Public procurement opportunity for National Highways Logistics Management Limited Cyber Security Audit - NATIONAL HIGHWAYS LOGISTICS MANAGEMENT LIMITED (NHLML) IT INFRASTRUCTURE & APPLICATIONS in SOUTH WEST DELHI, DELHI. Quantity: 1 issued by. Submission Deadline: 28-04-2025 13: 00: 00. View full details and respond.
Sashastra Seema Bal (ssb)
JAMMU, JAMMU & KASHMIR
Sashastra Seema Bal (ssb)
BALRAMPUR, UTTAR PRADESH
Sashastra Seema Bal (ssb)
EAST CHAMPARAN, BIHAR
Sashastra Seema Bal (ssb)
Pauri Garhwal, UTTARAKHAND
Employees Provident Fund Organisation (epfo)
ALLAHABAD, UTTAR PRADESH
Tender Results
Loading results...
Discover companies most likely to bid on this tender
Experience Criteria
Certificate (Requested in ATC)
Additional Doc 1 (Requested in ATC)
Additional Doc 2 (Requested in ATC) *In case any bidder is seeking exemption from Experience / Turnover Criteria
the supporting documents to prove his eligibility for exemption must be uploaded for evaluation by the buyer
Key insights about DELHI tender market
The eligibility requirements include being a registered entity, demonstrating expertise in conducting cyber security audits, and having valid certificates that support your credentials in IT and cybersecurity. Additionally, bidders should provide references of past similar projects to enhance their credibility.
Bidders must possess certifications, including but not limited to ISO/IEC 27001, relevant cybersecurity certifications such as CEH (Certified Ethical Hacker), or CISSP (Certified Information Systems Security Professional). These certificates validate the bidder's expertise and compliance with industry standards required for the audit.
The registration process involves submitting an application through the tender portal. Bidders are required to fill out the registration forms accurately and upload all necessary documentation, including proof of business registration, qualifications, and prior experience in related projects.
The technical specifications for the audit require bidders to have a detailed methodology for risk assessment and vulnerability analysis. Bidders should also outline tools and technologies they intend to use, ensuring these align with industry best practices in cybersecurity.
Payments are typically made in phases, based on the completion of audit milestones outlined in the contract. The precise details regarding payment terms should be outlined in the financial proposal, ensuring clarity on when and how payments will be processed upon fulfilling contractual obligations.
Sign up now to access all documents
Main Document
SCOPE_OF_WORK
ATC
GEM_GENERAL_TERMS_AND_CONDITIONS