Software configurationmanagement tools (e.g. GIT, ClearQuest, Trac, or Subversion), Python, Eclipse IDE, Google Protocol Buffer, model-based design (e.g. MATLAB, Simulink), service-oriented architecture, and Linux OS. Software defined radio architecture (SCA, REDHAWK, or GNU), Commercial wireless standards geolocation techniques. Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and … from system level to individual software components. These Qualifications Would be Nice to Have: Software defined radio architecture (e.g. SCA, REDHAWK, or GNU), commercial wireless standards geolocation techniques, software configurationmanagement tools (e.g. GIT, ClearQuest, Trac, or Subversion), Python, Eclipse IDE, Google Protocol Buffer, model-based design (e.g. MATLAB, Simulink), service-oriented architecture, and Linux OS. More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, and Insider Threat Analysis, by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to … ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configurationMore ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, and Insider Threat Analysis, by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to … ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configurationMore ❯
ensure compliance with that program on a routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configurationmanagement for security-relevant changes to software, hardware, and firmware. • Perform and deliver security impact analyses of changes to the system or its environment of operation. • Assess the … system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configurationmanagement for security-relevant information system software, hardware, and firmware. " Education and Experience: • 10 years of related work experience in the field of security authorization. • A Bachelor's … tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance. • Experience creating and presenting documentation and managementMore ❯
standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified … information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configurationmanagement (CM) for information systems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability … Matrices (SRTMs). Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). The Level 2 Information Systems Security Officer shall possess the following capabilities: • Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies. • Assist with preparation and maintenance of documentation. • Assist in More ❯
use of UC systems. - Provide support for implementation, troubleshooting and maintenance of UC systems. - Provide tier 1 problem identification, diagnosis, and resolution of problems. - Manage the daily activities of configuration and operation of UC systems. - Provide assistance to users in accessing and using UC systems. - Document hardware and software configurationmanagement processes and procedures. - Coordinate hardware installations … across multiple sites. - Maintain and develop the environment for hardware and software build, staging, testing and integration. - Apply concepts and define and implement hardware and software configurationmanagement processes and procedures, such as creating product build scripts and procedures and integrate the scripts with the hardware and software build process. - Analyze complex hardware system, hardware design, architecture, network … remedial. - Deploy, install and implement US at CONUS and OCONUS locations. - Conduct site surveys. - Interpret drawings, specifications and other related documents. - Acts as equipment custodian and performs inventory asset management and accountability functions - Design a wide variety of UC solutions including multi-level security systems, enterprise level collaboration systems, conference rooms, classrooms, command centers, auditoriums, digital signage and streaming. More ❯
based applications using WinAPI , external libraries, and networking fundamentals Utilize C++ , LabWindows CVI , and NI TestStand for test automation Interface with databases such as MS SQL Server for data management Collaborate with electrical and hydraulic engineers to interpret schematics and system layouts Implement sensor calibration and signal conditioning techniques Follow standard software development life cycles and configurationmanagement … test equipment Strong understanding of electrical and hydraulic schematics Hands-on experience with sensor calibration and signal processing Basic knowledge of electrical engineering and PLC programming Knowledge of software configurationmanagement and version control Excellent communication and teamwork skills U.S. citizenship or U.S. green card holder required Ready to code the future of aerospace innovation? If you're More ❯
interim secret required All work to be performed on-site, may transition to hybrid after initial onboarding. Required IAT Level II Three (3) years of professional experience in IT configurationmanagement, inventory control, help desk support, and workflow implementation having demonstrated knowledge of policies and regulations governing those subject areas and maintaining processes to ensure compliance with those More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements Security (SC Clearance) or able to achieve. Proven experience in a 2nd line support mobile endpoint engineering role Workspace ONE Unified Endpoint Manager Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
SiloSmashers, Inc. is a strategy, technology, and management consulting firm, founded in 1992, and located in Reston, Virginia. SiloSmashers delivers superior services and solutions to the public sector in the areas of project/program management, performance management, and IT security. The company provides innovative, collaborative business approaches, and proven methodologies that enable customers to break down … The Program Manager serves as the single point of contact for the contracting officer and the contracting officer's representative. The ideal candidate has experience managing a security program management office (PMO), positively affecting change and improving operations in a federal cybersecurity environment. The position entails managing a team of up to 50 individuals. General Responsibilities Collect requirements from … customer on production and delivery of documentation providing operational guidance and processes around cybersecurity capability services, cybersecurity management, and other topics as needed. Translate technical cybersecurity capability requirements into stakeholder needs and solutions statements. Manages overall contract financials. Maintains a budget and seeks efficiencies to save costs. Produces financial reports as required by the contract and by management. Primary More ❯
rapid responses to changes within the existing infrastructure and adjust services according to need. • Standardization: Service delivery strategies must support existing services on standardized platforms for DISA infrastructure. Program Management Higher level tasks, stand ups, regular briefings, to include in progress reviews. Deployment, Configuration, Change Control • Provide asset management status updates, configuration control, and change management … for IFR, Moves, Adds, and Changes (MACs) and decommissions. • Build, install, provide test and acceptance services to include any life-cycle upgrades/technology that impact of program. IFR Management • Key focal point for DISA customers and support agencies, systems administrators, telecom companies, and contractors requiring on premises footprint, power, and telecom services. Operational Engineering • Support the definition of … requirements for upgrades and lifecycle replacements (Continual Service Improvement) Project Engineering • Support the definition of requirements for upgrades and lifecycle replacements (Continual Service • Project management and execution for deployment efforts in accordance with (IAW) enterprise engineering standards • Support customer migrations Performance Requirements • The contractor shall provide support for overall operations, maintenance, change and configurationmanagement, and deployment More ❯
rapid responses to changes within the existing infrastructure and adjust services according to need. • Standardization: Service delivery strategies must support existing services on standardized platforms for DISA infrastructure. Program Management Higher level tasks, stand ups, regular briefings, to include in progress reviews. Deployment, Configuration, Change Control • Provide asset management status updates, configuration control, and change management … for IFR, Moves, Adds, and Changes (MACs) and decommissions. • Build, install, provide test and acceptance services to include any life-cycle upgrades/technology that impact of program. IFR Management • Key focal point for DISA customers and support agencies, systems administrators, telecom companies, and contractors requiring on premises footprint, power, and telecom services. Operational Engineering • Support the definition of … requirements for upgrades and lifecycle replacements (Continual Service Improvement) Project Engineering • Support the definition of requirements for upgrades and lifecycle replacements (Continual Service • Project management and execution for deployment efforts in accordance with (IAW) enterprise engineering standards • Support customer migrations Performance Requirements • The contractor shall provide support for overall operations, maintenance, change and configurationmanagement, and deployment More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯