Federal IT Recompete Calendar 2026-2027
An eight-quarter view of expected federal IT recompetes by agency, value band, and vulnerability signal
Executive Summary
Federal IT services represent roughly $80B in annual contract obligations, of which approximately $52B is concentrated in IDIQs, BPAs, and follow-on contracts that come up for recompete on predictable schedules. This report maps the expected recompete calendar across eight quarters (Q3 2026 through Q2 2028), with agency breakdown, value-band distribution, and vulnerability indicators per quarter.
Key Findings
~1,840
Federal IT services contracts expected to recompete between Q3 2026 and Q2 2028, aggregate value approximately $52B.
Source: FPDS, aggregated by NAICS 541511-518210, expiration FY2026Q3-FY2028Q2
Q1 2027
Peak recompete quarter — approximately 320 contracts ($11B value). Driven by 5-year cohort awarded in early FY2022 reaching end of base+option periods.
31%
Share of expected recompetes where the incumbent shows 4+ visible vulnerability signals — the addressable opportunity for challenger primes.
DoD: $24B
Largest agency share of expected IT recompetes. DoD includes Army, Navy, Air Force, DLA, and DISA IT contracts.
$1M-$10M
Most common value band for expected recompetes (~58% of contracts by count). This is the addressable mid-market for small and mid-size GovCon IT firms.
11 months
Median visible lead time between today and the next expected recompete RFP for contracts with public PoP end dates. Capture investment 18 months ahead is the proven win pattern.
Methodology
Recompete events were identified by analyzing publicly available FPDS data for contracts expiring between Q3 2026 and Q2 2028 with NAICS codes 541512, 541511, 541513, 541519, and 518210 (the primary federal IT NAICS family). For each contract, we modeled period of performance extensions, option year exercise patterns, and historical recompete-vs-extension behavior at the agency-office level. Vulnerability signals were derived using Aliff's six-factor model applied to FPDS, USASpending, GAO bid protest decisions, and public CPARS proxies. Aggregate counts and dollar bands are reported; individual contract identifiers are not.
Why the Recompete Calendar Matters
Federal IT recompetes are predictable in aggregate. Contracts have known periods of performance, option year structures, and historical recompete-vs-extension patterns at the agency level. Treating recompete capture as opportunistic rather than calendar-driven is one of the most expensive mistakes mid-market IT firms make.
The calendar lets you align BD investment to revenue events. Instead of reacting to RFPs as they drop, you can sequence customer relationship building, capability investments, teaming, and pricing analysis 12-18 months ahead of high-probability recompete events. The 11-month median lead time is a floor — for known multi-year programs, the visibility is often 24-30 months.
Aggregate patterns reveal structural opportunities. The Q1 2027 peak (320 contracts, $11B) is driven by a 5-year cohort awarded in early FY2022. Capture investment for those programs should begin no later than Q3 2025 — work that is in the past at publication time, but signals the rhythm: capture work for FY2028 recompetes should be starting now.
Quarterly Breakdown — Q3 2026 to Q2 2028
Q3 2026 (~190 contracts, ~$5.5B): Moderate volume, weighted toward DoD service branches and HHS subordinates. Notable cluster of FAA NextGen-adjacent IT contracts.
Q4 2026 (~210 contracts, ~$6.2B): Mixed agency distribution. Heavy in DHS components (CBP, ICE, USCIS IT modernization) and VA T4NG task orders.
Q1 2027 (~320 contracts, ~$11B): Peak quarter. Driven by 5-year cohort awarded in early FY2022. DoD and HHS dominate; expect Army ITES-3S and Navy SeaPort-NxG task order recompetes plus NIH CIO-SP3-to-CIO-SP4 transitions.
Q2 2027 (~250 contracts, ~$7.4B): Sustained high volume. Notable cluster of GSA Schedule task order recompetes and DOE National Lab IT support contracts.
Q3 2027 (~200 contracts, ~$6B): Returns to baseline. DoD and HHS still dominant; growing share of state-funded but federally-tracked education IT.
Q4 2027 (~180 contracts, ~$5.3B): Lower volume. Notable cybersecurity-specific recompetes at DHS/CISA driven by 2022 SBOM mandates approaching renewal cycles.
Q1 2028 (~250 contracts, ~$7.2B): Secondary peak. 5-year cohort from FY2023 IT modernization push begins recompete cycle, with significant cloud migration contract turnover.
Q2 2028 (~240 contracts, ~$7.4B): Sustained activity. Cloud-native and AI/ML-focused contracts begin to recompete after their first 5-year period.
The Vulnerability Distribution
Not every recompete is winnable. Of the ~1,840 expected recompetes, the data suggests:
Roughly 69% will likely retain the incumbent (low vulnerability — score below 40). These are well-performing incumbents with solid CPARS proxies, no significant protest history, competitive pricing, stable key personnel, and healthy modification patterns. Targeting these as a challenger is high-effort, low-yield — better invested elsewhere.
Roughly 22% are 'watch' incumbents (vulnerability 40-69) — some weakness signals, but mixed. These contracts are worth monitoring for additional signals; a single quarter of declining performance or key personnel turnover can flip them into the addressable bucket.
Roughly 9% (about 165 contracts representing approximately $5B) are addressable challenger opportunities (vulnerability 70+). These show 4+ visible weakness signals — declining CPARS, protest history, pricing competitiveness issues, key personnel attrition, or scope creep. For a mid-market IT firm, this is the focused target pool.
How to Use This Calendar
Sequencing capture investment: build a 24-month capture pipeline aligned to the expected calendar. Capture work for Q1 2028 recompetes should be initiated now (Q2 2026). Customer relationship building, capability statement updates, teaming discussions, and pricing analysis all benefit from 18+ months of lead time.
Defensive recompete planning: if you are an incumbent on a contract expiring in this window, the same vulnerability model is visible to your competitors. The defensive playbook is to monitor your own signals (CPARS, modification health, key personnel retention, pricing competitiveness), fix what is fixable, and over-invest in customer relationships during the 18 months before recompete. Aliff's platform runs the vulnerability model on your portfolio quarterly.
Teaming and partner strategy: the 9% addressable bucket (vulnerable incumbents) is the focus for challenger primes. For sub-prime opportunities, the broader pool — including 'watch' contracts — represents potential teaming targets where you can position as a value-adding sub before the recompete.
Pricing strategy: historical labor rates, wrap rates, and modification patterns reveal the government's price ceiling on each contract. Pre-RFP triangulation via GSA CALC, USASpending, and similar sources lets you build a defensible price-to-win model before the solicitation drops.
Data Sources
- FPDS-NG (Federal Procurement Data System)
- USASpending.gov
- SAM.gov Contract Opportunities and Awards
- GAO Bid Protest Decisions
- Aliff Solutions proprietary capture engagement data (aggregated, anonymized)
Want this analysis applied to your pipeline?
Aliff's platform runs the same six-factor vulnerability model on every opportunity in your pipeline — quarterly, with alerts when an incumbent crosses the vulnerability threshold.
Schedule a Pipeline Review