SCI Employment Type: Full-Time About Echelon Services LLC Echelon Services LLC is a Native Hawaiian-owned SBA 8(a)-certified government contractor specializing in delivering mission-critical IT, cybersecurity, cloud, and intelligence solutions to the Department of Defense and federal agencies. Our teams work on the front lines of national security, providing forward-thinking services that support the evolving … interfacing with senior-level stakeholders, including government program managers and contracting officers Strong understanding of program execution, financial oversight, and compliance Familiarity with Zero Trust security models and emerging cybersecurity technologies Active TS/SCI security clearance required Preferred Qualifications PMP or equivalent program management certification Master's degree in business administration or information management Technical experience with Zero Trust More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
satellite ground systems. • Implement database security, clustering, failover, and backup solutions to ensure continuous uptime, data integrity, and compliance with DoD security standards. • Collaborate daily with System Administrators, DevSecOps, Cybersecurity, Software Engineers, and Integration Engineers on a highly technical team delivering reliable solutions. • Assist the Information Assurance (IA) Team with system vulnerability management, software patching, account management, and license compliance. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
DMS Computer Recruitment
skills Ability to quickly learn new technologies in depth Benefit from: Attractive remuneration Food allowance Intellectually stimulating work environment Continuous personal development and international training opportunities Keywords: Cloud Security, CyberSecurity, AWS SecurityMore ❯
Silver Spring, Maryland, United States Hybrid / WFH Options
Arlo Solutions
foreign influence or unauthorized technology transfer Provide briefings to NOAA personnel on counterintelligence trends and threat indicators Minimum Qualifications Including Certificates: Bachelor's degree in Intelligence Studies, International Relations, Cybersecurity, or related field Minimum 5 years of experience in counterintelligence, preferably in a government or research environment. In-depth knowledge of NSPM-33 requirements and research security frameworks Experience with More ❯
IT Security Technician Position Summary: The Security Technician performs advanced information security work focused on protecting the organization's systems and data. This includes monitoring, investigating, and responding to cybersecurity threats; managing and optimizing security products; and collaborating across departments to ensure a proactive security posture. The position is responsible for threat hunting, handling security tickets through Manage Engine, maintaining … NIST CSF, CMMC, PCI, etc.). - Assist with internal and external audits and assessments. - Participate in the creation and delivery of security awareness training materials. - Stay current on emerging cybersecurity threats, tools, and best practices. - Maintain detailed records of incidents, investigations, and response efforts using ticketing and case management tools. - Develop and recommend security standards, policies, and controls. JOB DUTIES More ❯
VA Clearance Required: TS/SCI Employment Type: Full-Time Company Overview Echelon Services LLC is a Native Hawaiian-Owned 8(a) small business providing secure, mission-driven IT, cybersecurity, cloud, and engineering services to the Department of Defense and federal agencies. We take pride in supporting national security objectives through technical innovation, cultural values, and operational excellence. At Echelon … integrity and security of configuration items in accordance with information assurance best practices. Coordinate configuration audits and verify compliance with government and program standards. Collaborate with development, systems engineering, cybersecurity, and QA teams to support software lifecycle activities. Implement automation tools and scripts to improve traceability, reproducibility, and deployment processes. Support documentation and artifact management in compliance with RMF and More ❯
the effectiveness of implemented security controls. -Assist in the preparation and presentation of RMF package materials for security accreditation and audits. Basic Qualifications: -Bachelor's degree in information technology, Cybersecurity, or a related field or equivalent combination of education and work experience. -5 years of professional experience managing and administering Windows Servers -3 years of professional experience managing and administering More ❯
are maintained and augmented by staff. Required Skills/Experience: • Must be a US citizen. • Top Secret/SCI clearance • Certification: PMP (Project Management Professional) • Bachelor's degree in Cybersecurity, Computer Science, Computer Information Systems, or Information Technology, or 10 years of equivalent experience in verifying stability, interoperability, portability, security, and scalability of system architecture. • Experience with leading IT Operation … of similar size, scope, and complexity as USSS is required. • The Technical PM must be equipped with proven experience and skillsets. Preferred Skills/Experience: • Master's degree in Cybersecurity, Computer Science, Computer Information Systems, or Information Technology • ITIL 4 Foundation certification Required Clearance: • This position requires a Top Secret (TS) clearance based on the possible interaction with classified information. More ❯
ramp/off-ramp of external project activities on behalf of the Program Manager QUALIFICATIONS: • 13 years combined. relevant experience in IT disciplines (e.g. Systems/Network Engineering and Cybersecurity or equivalent combination of education and experience • Knowledge of FISMA and the NIST Risk Management Framework • Experience in delivering and managing technical services to support Systems Engineering and Cybersecurity projects More ❯
Open System Approaches (MOSA). • Conduct rigorous systems analysis to optimize performance, improve operations, and recommend enhancements in workflows, policies, or procedures. • Ensure software security and assurance by applying cybersecurity best practices and aligning deliverables with Public Laws (i.e., PL 111-383, PL 112-933), DISA STIGs, and DoDI 8520.02 requirements. • Incorporate PKI-enabled security features for biometrics, digital signatures … engineering or architecture. • In-depth knowledge of the Software Development Life Cycle (SDLC) and strong experience with a variety of programming languages and software tools. • Expertise in systems design, cybersecurity integration, and developing secure applications. • Strong analytical and problem-solving skills with keen attention to detail. • Ability to work with infrastructure and networking teams to ensure seamless application integration. • Excellent More ❯
requirements, including U.S. Citizenship, for access to classified information; ACTIVE SECRET Clearance is REQUIRED Education: 2+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity preferred 6+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, Cybersecurity preferred 8+ Years of Experience with a High School Diploma Required Progressive Experience: Requires More ❯
and support unified communications platforms (e.g., Teams, Skype for Business) Manage shared security services and endpoint infrastructure Implement and manage infrastructure as code (IaC) tools and templates Collaborate with cybersecurity teams to ensure compliance with NIST and DoD standards Qualifications: U.S. Citizen with Active TS/SCI Polygraph clearance 5+ years supporting cloud and enterprise infrastructure in federal or DoD More ❯
Systems Installation Records (CSIRs). Coordinate with internal teams, leadership, and external agencies to integrate new capabilities and ensure interoperability. Support accreditation activities by ensuring system designs meet all cybersecurity and risk management framework (RMF) requirements. Advise leadership on emerging technologies, architecture enhancements, and cost-effective integration strategies. Facilitate system upgrades, ensuring minimal operational impact while meeting mission timelines and … stakeholders on system design concepts, operational capabilities, and security considerations. Maintain IT security vigilance throughout the system design and implementation lifecycle, ensuring alignment with DoD 8570.01-M and AF cybersecurity directives. Operate with a high degree of autonomy, proactively addressing engineering challenges and adapting designs to meet evolving mission priorities. Develop applications and dashboards using PowerBI, PowerAPP, and PowerAutomate Maintain More ❯
environments. Maintain accurate system and technical documentation. Ensure compliance with operational, security, and organizational processes. Plan, design, and implement software services. Perform OS patching utilizing RedHat Satellite servers. Analyze cybersecurity vulnerability scan reports and remediate vulnerabilities. Develop and analyze highly complex system standards, thresholds, and recommendations to maximize system performance. Serves as an extension of Tier 3 when resolving More ❯
comprehensive and high-quality IT support to WAPA in the areas of; Software maintenance and development, Network, Database, and Operations Support/Management, Supervisory Control and Data Acquisition (SCADA), Cyber-Security, Solution Architecture, and Project Management. An average day: The Desktop Support Specialist I is responsible for providing essential support for desktop and laptop PCs, ensuring compliance with licensing and … issues and managing equipment. Assist in coordinating with Mobile Device Manager for mobile device issuance and replacement. Assist with automated software deployments and maintaining hardware/software inventories. Support CyberSecurity Specialists during response activities. Assist in maintaining accurate records of hardware and software inventory. Assist in installing and configuring stand-alone and network printers. Provide basic support for Microsoft More ❯
of shaping the future! SRG4 Government Services is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies in the intelligence, defense, homeland security, cybersecurity, and federal civilian markets. SRG4 utilizes an innovative approach to identify and qualify talent that is unique to the federal contracting industry, featuring a cutting-edge platform that allows More ❯
critical initiative focused on enhancing digital governance, data control, and secure system access across the enterprise. Our goal is to ensure seamless user experiences while maintaining strong compliance and cybersecurity standards. We're looking for a dedicated Project RightClick Administrator to help manage platform operations and ensure continued system efficiency and user satisfaction. The Project RightClick Administrator will support the More ❯
maintaining complex software systems that support Computer Network Operations (CNO). As a member of our team, you will work on mission-critical projects, providing innovative solutions to emerging cybersecurity challenges. Responsibilities: o Software Development: • Design, develop, test, and maintain low-level software in a CNO environment. • Work with assembly, C/C++, Python, or other relevant programming languages to More ❯
Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Customer Service Specialists, Database Engineers, Information Systems Security Officers, Information Systems Security Engineers, Sharepoint Developers, Systems Engineers, Network More ❯
ready equipment. Coordinate and perform hardware and peripheral upgrades in compliance with lifecycle, accreditation, and security requirements. Manage system patching, configuration control, and vulnerability mitigation processes in coordination with cybersecurity teams. Oversee user account management, permissions, and access controls to ensure system security and operational integrity. Maintain system documentation, configuration baselines, HOSP maintenance logs, and accreditation records in compliance with More ❯
DoD environments Understanding of Agile or DevSecOps frameworks Experience participating in governance boards or technical review committees CLEARANCE LEVEL SECRET Clearance EDUCATION REQUIRMENTS Bachelor's degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science from an ABET-accredited or CAE-designated institution. Will consider an additional four (4) years of related experience in lieu of a degree. More ❯
NetOps, Splunk, ACAS). Develop and enforce operational procedures, incident response workflows, and escalation protocols. Act as the senior technical point of contact for major outages, network events, or cybersecurity incidents. Interface with mission partners, DISA, Joint Forces, and Combatant Commands on network status, issues, and operational impacts. Ensure all network changes follow configuration management (CM) and DoD Change Advisory More ❯
and CI/CD best practices to ensure secure, scalable, and resilient data platforms. Your contributions will enable advanced analytics, improve pipeline performance, and deliver the foundation for future cybersecurity capabilities. Key Responsibilities • Support migration of services, applications, and platforms from legacy back-end systems to Databricks. • Identify optimal migration paths, build detailed plans, and execute migration strategies. • Migrate legacy More ❯
engineering design artifacts such as Use Cases and SysML diagrams Experience in command-and-control system application development Experience with Software Integration and formal testing Knowledge and experience implementing CyberSecurity/RMF requirements Ability to present advanced concepts to non-software engineers, including senior program and military leaders Proven ability/experience to mentor and teach junior engineers Experience More ❯