Specifications include, but are not limited to: Purple Team Phase – Vendor will Collaborate with County InfoSec Team to determine risk and identify vulnerabilities. Scope of testing to be determined based on hours required to complete project Report findings and establish baseline. Plan for remediation phase of consulting engagement. • OSINT – Use methods like google hacking, searching, dark web, scour dark web. Target and build dossier, learn about Salt Lake County and employees • Social Engineering - use both email phishing and spear phishing techniques looking for data leaks or opportunities for fraud. • Penetration testing - Test both internal & external networks, applications - attempt to get into network • Execution – Conduct purple team exercises in collaboration with County InfoSec Team. Remediation Phase - Vendor "Red-Team" will meet on bi-weekly basis with County InfoSec Team members to address findings of purple-team exercise. Vendor will report on security posture of County InfoSec program. • Roadmap - Create roadmap to remediate findings from purple team phase • Remediation - Consult with County InfoSec Team on remediation process • Red Team - Plan scope for Red Team phase. • Incident Response - Consult with County Infosec Team on Incident Response process improvement Red Team Phase – Vendor will work independently of the County InfoSec Team to determine risk and identify vulnerabilities. Scope of testing to be determined based on hours required to complete project Report findings and establish baseline. Plan for remediation phase of consulting engagement. • OSINT – Use methods like google hacking, searching, dark web, scour dark web. Target and build dossier, learn about Salt Lake County and employees • Social Engineering - use both email phishing and spear phishing techniques looking for data leaks or opportunities for fraud. • Penetration testing - Test both internal & external networks, applications - attempt to get into network • Execution – Conduct red team exercises based on scope developed with the County Remediation Phase - Vendor "Red-Team" will meet on bi-weekly basis with County InfoSec Team members to address findings of purple-team exercise. Vendor will report on security posture of County InfoSec program.