Data Access Object (DAO) Job Vacancies

1 to 25 of 44 Data Access Object (DAO) Jobs

Database Engineer with Security Clearance

San Diego, California, United States
Kaztronix
written communications skills Preferred Education, Experience, & Skills Hold an active Top Secret/SCI with Polygraph clearance Bachelor of Science degree in Computer Science or related field Experience with DAO related programming in C++ or JAVA Experience with Oracle Spatial option Experience with Oracle RAC basic operations Experience with Oracle Label Security (OLS) option Experience with Oracle Identity Management (OIM More ❯
Employment Type: Permanent
Salary: USD 65 Hourly
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Laurel, Maryland, United States
BCT LLC
and validate account and vulnerability management. o Develop and provide updated System Security Plans (SSPs) and supporting documentation (e.g. SECONOPs, diagrams, Privileged User's Guide). • Respond to any data calls. • Provide security design guidance and analysis to the project team throughout the Risk Management Framework (RMF) process. o Collaborate with the Information System Security Engineer (ISSE) in the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Manager (ISSM) with Security Clearance

Fairborn, Ohio, United States
K2 Group, Inc
Information Security Management Act (FISMA) requirement. Coordinate any changes or modifications to hardware, software, or firmware of a system directly with the Authorizing Official (AO)/Delegated Authorizing Official (DAO) prior to the change. Conduct routine maintenance, perform backups, and install upgrades and patches to the systems and networks. Produce artifacts that include but not limited to answers, implementation, documentation More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Java Developer, Mid and Senior with Security Clearance

Falls Church, Virginia, United States
Mindbank Consulting Group
cloud using Docker, AWS ECS, and CodePipeline, with strong emphasis on security, compliance, and scalability. The ideal candidate will be comfortable working across the full stack designing APIs and data models, implementing responsive UI components, optimizing system performance, and ensuring secure deployments. In this role, you will collaborate with DevOps, QA, and Security Compliance teams to deliver reliable solutions … microservices environment • Frontend development expertise with React.js, TypeScript, Redux, HTML5, CSS3, and Bootstrap • Experience building and integrating RESTful APIs and GraphQL services • Knowledge of Spring Batch for high-volume data processing • Proficiency with PostgreSQL (sharding, replication, indexing) and MongoDB for … non-relational data • Familiarity with Redis for caching and performance optimization • Containerization and deployment experience with Docker, AWS ECS, and AWS CodePipeline • Experience applying design patterns (Singleton, Factory, DAO) and AOP for modular codebases • Strong background in security and compliance, including JWT, OAuth 2.0, Spring Security, and familiarity with FISMA/NIST standards • Testing experience, including GraphQL Tester for More ❯
Employment Type: Permanent
Salary: USD 115,000 Annual
Posted:

Smart Contract Developer

City of London, London, United Kingdom
Hybrid / WFH Options
Plexus Resource Solutions Ltd
and DeFi innovation. Our client is building unstoppable tooling for the creation and management of Onchain Organizations. Backed by a strong legacy of innovation, including securing over $40B in DAO assets, theyre now building the next generation of governance infrastructure. This is your chance to help tell that story to the world. Key responsibilities: Design & Deliver: Translate client needs into More ❯
Employment Type: Permanent
Posted:

Business Development Lead

United Kingdom
Windranger Labs
minimal oversight. Bonus Points You've helped grow a DeFi protocol from early traction to scale. You've launched or scaled flywheel-driven revenue initiatives. You've contributed to DAO governance, incentive models, or tokenomics design. You've built or executed cross-chain integration strategies. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Java Full Stack Developer (AWS/Azure) - Lansing, MI (Local Only)

Lansing, Michigan, United States
Digital Technology Solutions
generation, refactoring, documentation, and embedding Copilot APIs into developer tools to boost productivity and collaboration. Position Summary Write well-designed, testable code using spring MVC, Hibernate framework for entity object mapping, JQuery/HTML5, JavaScript, HTML, XML,Angular • Develop business application components using Object Oriented java/JEE technologies, design principles . • Design and develop … RESTful Web Services using Spring Web MVC framework. • Design, Develop and maintain applications using Apache Struts framework. • Ability to implement design patterns like Intercepting Filter, Front Controller, Session Façade, DAO, Singleton, and Service Locator • Proficient in building and maintaining unit test framework with Junit and Spring Boot. • Execute full software development life cycle (SDLC) including experience in gathering requirements and … Router, and component lifecycle • Experience working on large agile projects. • Experience with Java 8, SOAP Web-Services and Java Messaging Service (JMS) API. • Experience with Spring Boot Projects, Spring Data, Spring Batch, Spring Security frameworks. • Good to have knowledge of Apache Kafka, Apache Spark and ActiveMQ broker. • Experience in Database Design in Oracle and SQL server. • Experience or Knowledge More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Intermediate, Cybersecurity Systems Analyst with Security Clearance

Hurlburt Field, Florida, United States
FEDITC, LLC
assessments of IT and IS for authorization; prepare risk assessment reports for submission to the SCA and Authorizing Official/Designated Authorizing Official/Designated Accrediting Authority (AO/DAO/DAA) in accordance with DoD, DIA, USCYBERCOM, USSOCOM, Component Command, TSOC, and deployed forces' policies, procedures, and regulations. Assist with the enforcement of A&A, as well as DoD … and hardware deployment. Identify, implement and validate continued effectiveness of key performance parameters and applied security measures. Perform analytics on cybersecurity posture and provide reports to the AO/DAO and applicable stakeholders as required per ISCM and AO/DAO direction. Experience/Skills: 5+ years of progressive, relevant experience or equivalent combination of education and experience. Experience with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Barksdale Afb, Louisiana, United States
Cyntel Technologies LLC
authorization boundaries. This will include assessing the security impact of those changes and making recommendations to the ISSM. The ISSO will provide "day-to-day" support for Collateral, Special Access Programs (SAPs), and Sensitive Compartmented Information (SCI). • Systems may include Non classified Internet Protocol (IP) Router Network (NIPRNET), Secret Internet Protocol (IP) Router Network (SIPRNET), Top Secret Collateral … network, Strategic Automated Command & Control System Secure Desktop Terminal (SACCS SDT), Joint Worldwide Intelligence Control System (JWICS) network, Video Teleconference (VTC), Special Access Program (SAP) network/video equipment, Audio/Video Matrix, and other systems. Job Responsibilities: • The contractor shall be responsible for all required IT systems technical security certifications and accreditations, such as an Authority to Operate … systems in support of mission planning tests with various requirements; coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media; maintain logs for all media creation, data transfer More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 3 102-183 with Security Clearance

Fort Walton Beach, Florida, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Duties May include: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … Access Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program SecurityOfficer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 1 102-076 with Security Clearance

Roanoke, Texas, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Performance shall include : Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 2 102-045 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Performance shall include : Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 2 102-071 with Security Clearance

Albuquerque, New Mexico, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Performance shall include : Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 2 102-108 with Security Clearance

Arlington, Virginia, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Performance shall include : Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … Program (SAP) Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 1 102-098 with Security Clearance

Washington, Washington DC, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Performance shall include : Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … in accordance with the Joint SAP Implementation Guide (JSIG) Advise the IS Owner (ISO), Information Data Owner, Program Security Officer, and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA 2 102-173 with Security Clearance

Washington, Washington DC, United States
IC-CAP
or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility. Duties May include : Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed … the Joint SAP Implementation Guide (JSIG) Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-085 with Security Clearance

Arlington, Virginia, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-022 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-060 with Security Clearance

Dayton, Ohio, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 1 102-133 with Security Clearance

Colorado Springs, Colorado, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS AUDITOR with Security Clearance

Arlington, Virginia, United States
K2 Group, Inc
upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine … SAR Evaluate security assessment documentation and provide written recommendations for security authorization to the Government Discuss recommendation for authorization and submit the security authorization package to the AO/DAO Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate. Review and concur with all sanitization and clearing procedures in accordance with Government More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-041 with Security Clearance

Hill Afb, Utah, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-025 with Security Clearance

Hampton, Virginia, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 1 102-401 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide "day-to … network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification … investigating and reporting security violations and incidents Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 3 102-182 with Security Clearance

Alexandria, Virginia, United States
IC-CAP
implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense agencies, such as HQ Air Force, Office of the Secretary of Defense and Military Compartments efforts. The position will provide "day-to-day … support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties shall include : Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination … information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible More ❯
Employment Type: Permanent
Salary: USD Annual
Posted: