Opportunity Details
Tracking Number

CFIC-2026-125

Organization

CFIC / ARCYBER / ArCTIC

Start Date

Mar 25, 2026  ET

End Date

May 5, 2026  ET

Current Status

Open

Registration

N/A

No Attachments

To find out more information about this Opportunity, please signin or register for an account.
More Opportunities

No additonal Opportunities were found.

testimonial
Behavioral Anomaly Detection Mission Application (ACECARD)
Opportunity Summary
Description
CFIC, in collaboration with ARCYBER and ArCTIC, invites qualified industry partners to submit proposals for the development of a containerized, cloud-native software application prototype designed to operate within the Could based Gabriel Nimbus big data platform. This prototype application will aggregate and correlate multi-source security logs to identify behavioral anomalies and indicators of compromise (IoCs) consisten with malicious cyber activity and Living-off-the-land (LoTL) techniques.
Opportunity Details

Request to Attend NLT 05 May 2026 at or before 12:00 PM (Noon) ET

U.S. Citizens Only 

Purpose

The Cyber Fusion Innovation Center (CFIC), in collaboration with U.S. Army Cyber Command (ARCYBER) and Army Cyber Technology and Innovation Center (ArCTIC), invites qualified industry partners to attend an in-person-only Collaboration Event to brainstorm limiting factors and potential solutions for the development of a containerized, cloud-native software application prototype designed to operate within the Cloud based Gabriel Nimbus big data platform. This prototype application will aggregate and correlate multi-source security logs to identify behavioral anomalies and indicators of compromise (IoCs) consistent with malicious cyber activity and Living-off-the-Land (LoTL) techniques.?

Background/Synopsis

For some systems, security logs are ingested into Gabriel Nimbus and distributed across separate data Lakehouse buckets and tables organized by log type (Windows Event, DNS, HTTP, EDR, Netflow, Zeek, etc.). This siloed architecture creates significant operational friction:

  • Manual Context Reassembly: Security analysts must manually correlate logs across multiple tables to establish behavioral context
  • Inconsistent Analytics: Lack of automated correlation leads to missed detections and delayed threat identification
  • Scalability Constraints: Current manual processes do not scale to enterprise-wide monitoring requirements
  • Operational Inefficiency: Valuable analyst time is consumed on data wrangling rather than threat investigation
  • The expectation is government purpose rights (GPR) in full perpetuity will be required

Questions?

For submission-related questions, please contact Brandon Sizemore at bsizemore@cyberfic.org and Amanda Green at agreen@cyberfic.org.

Keywords
CFIC, ARCYBER, ArCTIC, Gabriel Nimbus, LoTL techniques
Reference URL
Point of Contact

Name

Brandon Sizemore

Email

bsizemore@cyberfic.org

Title

Not Provided

Phone

Not Provided