Revolutionizing Treasury’s IT Infrastructure: SAIC’s $1.3 Billion T-Cloud Contract Explained

Science Applications International Corp. (SAIC), a prominent technology integrator in the industry, has been awarded a $1.3 billion single-source contract by the Department of the Treasury for T-Cloud, a complete range of cloud and professional services. This seven-year contract is intended to support the Treasury’s adoption and transformation of a multi-cloud environment by centralizing management of the systems infrastructure, platform, and software-as-a-service by a single broker. With this, SAIC is responsible for delivering a shared service cloud infrastructure model that provides enterprise-wide efficiencies in access, contracting, and security.

The T-Cloud contract is designed to empower the Treasury department by providing them with a modern, flexible, and cost-effective approach to using and managing data in the cloud. This contract will also support the department’s efforts to adopt and transform to a multi-cloud environment by centralizing the management of systems infrastructure, platform, and software-as-a-service under a single broker. This simplification will allow the department to operate more effectively and efficiently in this digital age.

SAIC’s responsibilities under the T-Cloud contract

As the recipient of the T-Cloud contract, SAIC must deliver a shared service infrastructure model that provides access, contracting, and security efficiencies. The contract will facilitate greater collaboration and a centralized governance model for the systems infrastructure, platform, and software-as-a-service by a single broker. The aim is to optimize the department’s ability to operate across multiple cloud environments, with best-in-class security protocols in place.

SAIC’s Growth and Technology Accelerators (GTAs)

This contract also marks a milestone for SAIC as it aligns with the company’s strategy to focus on growth and technology accelerants (GTAs) in the area of secure cloud capabilities. SAIC’s unique suite of cloud migration tools called CloudScend will enable the Treasury Department to overcome obstacles and inefficiencies, providing modern solutions with high-security protocols in place. This, in turn, will allow the department to effectively operate in a multi-cloud environment.

SAIC’s Experience with Cloud Transformation

SAIC is a leading technology partner for the U.S. Air Force program Cloud One. As the prime industry partner for this program, SAIC has been leading cloud transformation across the Department of Defense (DoD). Now, with this contract, SAIC is best placed to support the Treasury Department in cloud transformation across the civilian market.

Services provided under the T-Cloud contract

Under the T-Cloud contract, SAIC will provide the Treasury department with a range of services, including business operations, technical, security, network, service desk, subject matter expert, and transition services. The suite of services is designed to enhance the efficiency of the department’s cloud operations by providing them with highly experienced and qualified experts across various fields.

SAIC’s President’s statement

Bob Genter, President of Defense and Civilian Sector at SAIC, said, “T-Cloud will enable the Treasury Department to rapidly and securely adopt a modern, flexible, and cost-effective approach to utilizing and consuming data in the cloud.”

In conclusion, the T-Cloud contract represents a significant opportunity for SAIC, positioning the company to grow and expand its expertise in secure cloud capabilities. The seamless adoption and transformation of a multi-cloud environment by the Treasury Department will pave the way for other government agencies to adopt cloud solutions as well. SAIC’s commitment to fostering a culture of diversity, equity, and inclusion, which is core to the company’s values, is crucial in attracting and retaining exceptional talent. Moving forward, the company will continue to lead the industry in strategic technological advancements and cloud transformation.

Explore more

Maryland Data Center Boom Sparks Local Backlash

A quiet 42-acre plot in a Maryland suburb, once home to a local inn, is now at the center of a digital revolution that residents never asked for, promising immense power but revealing very few secrets. This site in Woodlawn is ground zero for a debate raging across the state, pitting the promise of high-tech infrastructure against the concerns of

Trend Analysis: Next-Generation Cyber Threats

The close of 2025 brings into sharp focus a fundamental transformation in cyber security, where the primary battleground has decisively shifted from compromising networks to manipulating the very logic and identity that underpins our increasingly automated digital world. As sophisticated AI and autonomous systems have moved from experimental technology to mainstream deployment, the nature and scale of cyber risk have

Ransomware Attack Cripples Romanian Water Authority

An entire nation’s water supply became the target of a digital siege when cybercriminals turned a standard computer security feature into a sophisticated weapon against Romania’s essential infrastructure. The attack, disclosed on December 20, targeted the National Administration “Apele Române” (Romanian Waters), the agency responsible for managing the country’s water resources. This incident serves as a stark reminder of the

African Cybercrime Crackdown Leads to 574 Arrests

Introduction A sweeping month-long dragnet across 19 African nations has dismantled intricate cybercriminal networks, showcasing the formidable power of unified, cross-border law enforcement in the digital age. This landmark effort, known as “Operation Sentinel,” represents a significant step forward in the global fight against online financial crimes that exploit vulnerabilities in our increasingly connected world. This article serves to answer

Zero-Click Exploits Redefined Cybersecurity in 2025

With an extensive background in artificial intelligence and machine learning, Dominic Jainy has a unique vantage point on the evolving cyber threat landscape. His work offers critical insights into how the very technologies designed for convenience and efficiency are being turned into potent weapons. In this discussion, we explore the seismic shifts of 2025, a year defined by the industrialization