interim secret required All work to be performed on-site, may transition to hybrid after initial onboarding. Required IAT Level II Three (3) years of professional experience in IT configurationmanagement, inventory control, help desk support, and workflow implementation having demonstrated knowledge of policies and regulations governing those subject areas and maintaining processes to ensure compliance with those More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements Security (SC Clearance) or able to achieve. Proven experience in a 2nd line support mobile endpoint engineering role Workspace ONE Unified Endpoint Manager Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
SiloSmashers, Inc. is a strategy, technology, and management consulting firm, founded in 1992, and located in Reston, Virginia. SiloSmashers delivers superior services and solutions to the public sector in the areas of project/program management, performance management, and IT security. The company provides innovative, collaborative business approaches, and proven methodologies that enable customers to break down … The Program Manager serves as the single point of contact for the contracting officer and the contracting officer's representative. The ideal candidate has experience managing a security program management office (PMO), positively affecting change and improving operations in a federal cybersecurity environment. The position entails managing a team of up to 50 individuals. General Responsibilities Collect requirements from … customer on production and delivery of documentation providing operational guidance and processes around cybersecurity capability services, cybersecurity management, and other topics as needed. Translate technical cybersecurity capability requirements into stakeholder needs and solutions statements. Manages overall contract financials. Maintains a budget and seeks efficiencies to save costs. Produces financial reports as required by the contract and by management. Primary More ❯
rapid responses to changes within the existing infrastructure and adjust services according to need. • Standardization: Service delivery strategies must support existing services on standardized platforms for DISA infrastructure. Program Management Higher level tasks, stand ups, regular briefings, to include in progress reviews. Deployment, Configuration, Change Control • Provide asset management status updates, configuration control, and change management … for IFR, Moves, Adds, and Changes (MACs) and decommissions. • Build, install, provide test and acceptance services to include any life-cycle upgrades/technology that impact of program. IFR Management • Key focal point for DISA customers and support agencies, systems administrators, telecom companies, and contractors requiring on premises footprint, power, and telecom services. Operational Engineering • Support the definition of … requirements for upgrades and lifecycle replacements (Continual Service Improvement) Project Engineering • Support the definition of requirements for upgrades and lifecycle replacements (Continual Service • Project management and execution for deployment efforts in accordance with (IAW) enterprise engineering standards • Support customer migrations Performance Requirements • The contractor shall provide support for overall operations, maintenance, change and configurationmanagement, and deployment More ❯
rapid responses to changes within the existing infrastructure and adjust services according to need. • Standardization: Service delivery strategies must support existing services on standardized platforms for DISA infrastructure. Program Management Higher level tasks, stand ups, regular briefings, to include in progress reviews. Deployment, Configuration, Change Control • Provide asset management status updates, configuration control, and change management … for IFR, Moves, Adds, and Changes (MACs) and decommissions. • Build, install, provide test and acceptance services to include any life-cycle upgrades/technology that impact of program. IFR Management • Key focal point for DISA customers and support agencies, systems administrators, telecom companies, and contractors requiring on premises footprint, power, and telecom services. Operational Engineering • Support the definition of … requirements for upgrades and lifecycle replacements (Continual Service Improvement) Project Engineering • Support the definition of requirements for upgrades and lifecycle replacements (Continual Service • Project management and execution for deployment efforts in accordance with (IAW) enterprise engineering standards • Support customer migrations Performance Requirements • The contractor shall provide support for overall operations, maintenance, change and configurationmanagement, and deployment More ❯
Administrator Location:Arlington, VA Clearance:Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. Description: Perform system management, configurationmanagement, deep troubleshooting, preventative and corrective maintenance, performance monitoring, and enhancement. Define, plane, and execute tests of new hardware and software. Evaluate perform the requirements for … off-hour systems maintenance work. Oversee change management activities on the supported systems. Define, implement, monitor, and support security controls and capabilities in operating systems, layered products, and specialty software to achieve security goals. Develop operations procedures, such as backups, recovery processes, and queue management. Install and configure systems. Assist business users and systems engineers with the setup, installation More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Education and Experience: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related experience More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Required Education and Experience : Bachelor's degree -or- 4 years of relevant additional experience in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience : Bachelor's degree - or - 4 years of additional experience in lieu of degree. 2-5 years related experience, especially More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Education and Experience Required: Bachelor's degree -or- 4 years of additional experience in lieu of degree 2-5 years related experience More ❯
We are seeking a highly experienced Senior Submarine CM & Logistics Analyst to lead ConfigurationManagement (CM) and Integrated Logistics Support (ILS) activities for a high-priority Navy submarine program. This critical role supports strategic initiatives focused on improving lifecycle sustainment, engineering change processes, and logistics readiness across complex undersea warfare systems. The ideal candidate will bring deep expertise … processes, hands-on experience with submarine platforms, and a proactive leadership style that drives compliance, efficiency, and technical excellence. Key Responsibilities: Lead the development, implementation, and continuous improvement of ConfigurationManagement processes and ILS strategies. Oversee the preparation and execution of Engineering Change Documents (ECDs), including ECIs, TECIs, CPs, and ECPs. Ensure compliance with Navy CM policies and More ❯
Looking for a role that will have a meaningful impact on project management? We are looking for an individual to support the delivery of a strategic priority, Best of Markel (BoM) and other growth initiatives. What part will you play? If you're looking for a place where you can make a meaningful difference, you've found it. The … of MINT's strategic programmes and operational change priorities in collaboration with business teams and IT. The team currently comprises of three main capabilities - business analysis, programme/project management and portfolio management office. Best of Markel is about using existing products and capabilities to capitalise on market opportunities in different business lines and countries. You will work … programme risks, including the development of contingency plans Monitoring and reporting overall progress, resourcing and budget, initiating corrective action where necessary Maintaining project and programme governance, change control and configurationmanagement Continuously driving lessons learned and scanning for opportunities at the portfolio and team level Working with IT stakeholders to ensure products are delivered to technical standards Working More ❯
/SCI Required RPI Group, Inc. is seeking an Intel COMSEC Specialist to join our team in support of a critical national security mission. This role ensures the proper configuration, management, and operational readiness of communications security (COMSEC) systems. The ideal candidate will have hands-on experience with TACLANE systems, GemOne workstations, and secure communications practices in alignment … be able to demonstrate the following knowledge and/or experience: • Collaborating with key personnel to verify appropriate storage requirements for classified communication equipment • Coordinating monthly and annual COMSEC management activities • Tracking Controlled Cryptographic Item (CCI) equipment and rekey status across the program • Maintaining and operating primary GemOne workstations, including coordinating updates and security controls with system administrators • Managing … TACLANE network configurations, including lifecycle support, troubleshooting, hands-on configurationmanagement, and secure network integration. • Delivering technical troubleshooting support across all assigned COMSEC systems Qualifications: • Bachelor of Science in Information Systems, Information Technology, Computer Science, Computer Engineering • A combined total of ten (10) years of full-time professional experience covering all required disciplines listed above • Active Top Secret More ❯
and deliver high value, complex projects across its Surface Ship domain, managing programmes in excess of £10M from inception through to completion, demonstrating strong leadership, strategic thinking and stakeholder management skills. Knowledge and experience of the Project Manager: Experience of successfully delivering complex technical products from initial design definition through to final test and acceptance into service. Excellent organisational … will lead the project delivery. Clear definition and placement of work packages including key subcontracts required to deliver the project. Ensuring appropriate risk, opportunity, security, trade controls, quality and configurationmanagement for the project. Planning, monitoring, control and update of the project including management of project Life Cycle. Management gate reviews. Ensuring that the contract remains … up to date and consistent with the project goals and business objectives. Ensuring that contract milestones are met and that cash flow is optimised. Bid Management -PMs are also key contributors to bids and are required to apply the fundamental project management principles and methodology to bids including: Stakeholder management WBS, OBS and programme definition (external and More ❯
and deliver high value, complex projects across its Surface Ship domain, managing programmes in excess of £10M from inception through to completion, demonstrating strong leadership, strategic thinking and stakeholder management skills. Knowledge and experience of the Project Manager: Experience of successfully delivering complex technical products from initial design definition through to final test and acceptance into service. Excellent organisational … will lead the project delivery. Clear definition and placement of work packages including key subcontracts required to deliver the project. Ensuring appropriate risk, opportunity, security, trade controls, quality and configurationmanagement for the project. Planning, monitoring, control and update of the project including management of project Life Cycle. Management gate reviews. Ensuring that the contract remains … up to date and consistent with the project goals and business objectives. Ensuring that contract milestones are met and that cash flow is optimised. Bid Management -PMs are also key contributors to bids and are required to apply the fundamental project management principles and methodology to bids including: Stakeholder management WBS, OBS and programme definition (external and More ❯
and deliver high value, complex projects across its Surface Ship domain, managing programmes in excess of £10M from inception through to completion, demonstrating strong leadership, strategic thinking and stakeholder management skills. Knowledge and experience of the Project Manager: Experience of successfully delivering complex technical products from initial design definition through to final test and acceptance into service. Excellent organisational … will lead the project delivery. Clear definition and placement of work packages including key subcontracts required to deliver the project. Ensuring appropriate risk, opportunity, security, trade controls, quality and configurationmanagement for the project. Planning, monitoring, control and update of the project including management of project Life Cycle. Management gate reviews. Ensuring that the contract remains … up to date and consistent with the project goals and business objectives. Ensuring that contract milestones are met and that cash flow is optimised. Bid Management -PMs are also key contributors to bids and are required to apply the fundamental project management principles and methodology to bids including: Stakeholder management WBS, OBS and programme definition (external and More ❯