Highly Adaptive Cyber Services (HACS) 
Schedule 70: GS-35F-0569V

Foxhole Technology has performed as a prime contractor on over $90M in cybersecurity related projects for the federal government. Our cybersecurity experts are on the forefront of solving information assurance challenges at the Department of Defense (DoD); Department of Education (ED), Federal Aviation Administration (FAA), and the United States Agency for International Development (USAID). Our Information Assurance teams protect warfighters and civilian clients from cyber intrusions; ensure risks are understood at mitigated; and protect millions of Privately Identifiable Information (PII) records. Our teams understand the business of an organization, and fully support leadership in making risk-based decisions and investments. Our technology agnostic approach empowers our customers to choose the best tools for their environment, and to support business use case development for cyber security architecture.

Contracting Officers can issue sole source solicitations to qualified Service-Disabled Veteran-Owned Small Businesses.

  • Many sole source solicitations can be completed within 30 days or less.
  • Maximum award including options is $3 million for services. (13 C.F.R. 125.20 and FAR 19.14).
  • Helps individual commands, DoN, and DoD meet SDVOSB contracting goals set by The Veterans Entrepreneurship and Small Business Development Act of 1999 (Public Law 106-50) and Executive Order 13360.

cyber hunt

Foxhole Technology provides expert forensics support to conduct deep-dive malware analysis. We employ senior analysts that use both classified and open source threat intelligence and tailor the information for specific customers to proactively prevent mitigate attacks. Our personnel are familiar with technique, tactics, and procedures used by all three generations of operational threats.

Incident response

Foxhole Technology provides 24/7/365 security operations capabilities for incident response and enterprise monitoring. Our teams provide command and control and leverage play-books to isolate and mitigate threats to customer networks and mission systems. Our security engineers support global deployments of Computer Network Defense (CND) software – including one of the largest ArcSight deployments in the world.

VULNERABILITY and Risk Assessment


Foxhole Technology currently designs, integrates and deploys world-wide systems for Department of Defense and civilian agencies. Our cybersecurity consultants have the ability to establish quantitative risk management frameworks that align to NIST, OMB and Presidential Directives, as well as with the specific goals of the organization.

Penetration Testing

Our teams performs penetration testing, vulnerability assessments and enterprise scanning to identify and track vulnerabilities for mitigation.