This Sources Sought Notice from the U.S. Army MICC, Fort Eustis, Virginia, seeks qualified vendors for Cyber Battle Lab Experimentation Support Services. The Army requires assistance in identifying gaps and vulnerabilities in Cyber Electromagnetic Activities through experimentation, data collection, network engineering, prototyping, satellite communications, and cybersecurity. The work supports the Cyber Battle Lab (CBL) at Fort Gordon, Georgia, with a Single Award Indefinite Delivery, Indefinite Quantity (SA-IDIQ) contract over a seven-year ordering period. The notice emphasizes that this is market research, not an RFP, and responses will help determine if the requirement will be set aside for small businesses. Respondents must provide organizational information, tailored capability statements, and address security clearance requirements (minimum Secret, some Top Secret SCI eligibility) and their ability to meet the draft Performance Work Statement. The NAICS code is 541512, with a small business size standard of $34 million. Submissions are due by January 12, 2026, 2 p.m. EST.
This Performance Work Statement (PWS) outlines a non-personal services contract for Cyber Battle Lab (CBL) Experimentation Support at Fort Gordon, Georgia, with a maximum ceiling of $58.3M. The contract requires comprehensive support for Cyber Electromagnetic Activities (CEMA), including systems engineering, analysis, prototyping, cybersecurity, and distributed simulation. Key objectives include validating new technical solutions for capability gaps in Cyberspace Operations, Electronic Warfare, Network, and Information Advantage. The PWS details contractor responsibilities for quality control, personnel security clearances (minimum Secret, some Top Secret/SCI), facility access, and mandatory training in areas like Anti-Terrorism, OPSEC, SHARP, and Cybersecurity. It also specifies guidelines for key personnel, travel, other direct costs, data rights, non-disclosure, and organizational conflict of interest, ensuring strict compliance with government regulations and security protocols.