The services that are tendered in this contract correspond to the tasks of support to the operation of the security, which must allow the CESICAT to provide catalog services within the scope of the Security Operation Center.
Mainly dedicated to the development of security perimeters, both monitoring and management of events and security attacks received, prevention of cyber threats by analyzing the possible impact of external threats, as well as managing the life cycle of vulnerabilities (identification, analysis and management).
Dedicated in search of vulnerabilities through the execution of penetration tests and analysis of advanced vulnerabilities in infrastructures, systems and applications throughout the environment. As externally as internally, all environments will be tested specifically and manually to help detect all those vulnerabilities that automatic detection tools have failed to detect.
Dedicated to the complete management of cyber threats, both the contextualization of all information and actors, available internally and externally to analyze how any asset can be affected as well as the best way to prevent any affectation. However, the management of the exchange of intelligence sources with other organizations will be carried out. Additionally, the operational intelligence and incident search service, based on the information collected, will perform proactive analysis, or "hunting," of possible security incidents not detected so far.
Dedicated to the tasks of management, engineering and operational support, through the maintenance and configuration of all the security tools used by the different CESICAT services, mainly with tasks of Administration of solutions and development of evolutionary cybersecurity on them. These services will have a set of transversal functions associated, the objective will be to ensure operational excellence in terms of efficiency and effectiveness, continuous improvement of services and customer satisfaction.