learn. We really believe that when our employees succeed, our community wins. ABOUT THE POSITION The individual who excels in this position will have demonstrated experience in multiple information security technologies, including, but not limited to: SIEM, SOAR, email security, vulnerability management, network, and endpoint security controls. The individual will also play a key role in … rating, and maintaining cyber security tools, platforms, and programs within the credit union. The successful candidate will display a passion for developing new skills in the field of information security. The Senior Cyber Security Engineer will actively participate in incident response, security program and control implementation, administration, automation, and documentation. The individual will assist internal teams as well … of all cyber security controls for coverage and effectiveness. Serve as a backup for incident response, ensuring readiness to take immediate action in the event of security breaches or system incidents, providing support in containment, analysis, and remediation efforts. Stay informed of tools, techniques and components utilized in the industry through research and apply this knowledge to systemMore ❯
Position: Integrated Broadcast Service (IBS) Program Manager Location: Fairfax, VA Clerance: TS/SCI Job Description: Mission Essential is a leading provider of InformationManagementsystem engineering, software development, information assurance, system modernization and is the primary provider of technical support for the Integrated Broadcast Service (IBS) Enterprise. IBS is the worldwide … Manager will demonstrate competent writing and oral communication skills and ensure quality products and services are delivered. REQUIREMENTS Minimum Qualifications: • Bachelor's Degree (preferably a STEM degree) • Project Management Professional (PMP) certification or equivalent • Security Clearance: MUST be TS/SCI eligible • Thorough technical understanding of tactical and strategic communications • Good understanding of signals and electronic intelligence • Excellent … of Systems (CMOSS) • Bachelor's Degree or equivalent experience in Engineering (10-15) years' experience • Demonstrated knowledge of Agile project management/concepts using a rapid prototyping system • Proficiency in MS Office (w/emphasis on Project Manager Tool) • 5+ years' experience completing deliverables working across globally distributed teams • 5+ years' experience supporting cross-function capability in More ❯
process documentation and Standard Operating Procedures (SOPs) Ensure all systems are compliant with the necessary STIGs (Security Technical Implementation Guides), implementing them across environments to meet security requirements Perform system administration of Endpoint Security System (ESS)/Host-Based Security System (HBSS) servers Participate in on-call support rotations, handling critical system issues and resolving problems … travel CONUS/OCONUS as required Minimum Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field and 7+ years of experience in windows system administration and management in an enterprise environment, OR Associates degree in Computer Science, information technology, or a related field and 9+ year of relevant experience … OR a High School Diploma and 12+ years of relevant experience CompTIA Security+ Certification Experience with a combination of Windows Servers (2016, 2019, 2022), Active Directory, Domain Name System (DNS), IIS, and Group Policy Experience with a combination of PowerShell scripting, Active Directory, SCCM, HBSS, Windows Update Services (WSUS), and Exchange Servers Ability to implement and enforce security best More ❯
customer facility. What you will do User Support Respond to incoming requests, inquiries, and technical issues from end-users through various channels (i.e. phone calls, instant messaging, Jira ticketing system) Provide clear, friendly and effective communication to assist users to resolve their issues Issue Resolution Troubleshoot end-user issues by diagnosing the root cause and providing an appropriate solution … Escalate issues to higher-level support, if necessary Incident Management Record and track incidents and service requests using the Jira ticketing system Ensure that issues are properly documented, categorized, prioritized and resolved within defined Service Level Agreements (SLAs) Technical Knowledge Maintain a strong understanding of the organization's infrastructure, systems, applications and processes to be able to … knowledge base articles, documentation, and standard operating procedures to facilitate faster issue resolution and sharing best practices with the team Collaboration Work closely with other team members, such as system administrators and application developers, to address complex issues What you need to have Bachelor's degree in relevant field (i.e., InformationSystems, Software Engineering) 4+years of experience More ❯
naval applications. Participate in design and code reviews, fix errors and bugs, optimize applications and designing and implementing algorithms. Provide network architecture engineering support by reviewing, analyzing, model-based system engineering, and developing engineering documents for a network system, informationsystem, and for system assessment and authorization (A&A). Assess and develop a … proposed System of Systems (SoS) Architecture Framework IAW guidelines for the ashore or afloat platform baseline. Review and assess SoS design, identify software vulnerability, and risk management to ensure cybersecurity and UxV Mission requirements are satisfied. Deficiencies and issues shall be identified, and Contractor shall recommend mitigation solutions. Here's what you need: Senior Level: 10+ years … Senior Level: 15+ years of relevant experience and a master's degree in a quantitative field such as engineering or mathematics (e.g. Electrical Engineering, Computer Engineering, Computer Science, Information Technology, or InformationSystems). Mid-Level: 7+ years of relevant experience and master's degree in a quantitative field such as engineering or mathematics (e.g. Electrical More ❯
supervision and evaluation, task coordination, manpower planning, risk mitigation, communications, and status tracking. Be the contract Subject Matter Expert (SME) all matters related to Cybersecurity and the Risk Management Framework (RMF), and cyber compliance/tools (e.g., eMASS/XACTA, Nessus, HBSS, Splunk, etc.). Drive team awareness of newly emerging Department of Defense cyber requirements. Bring forward … of Cyber compliance on all security tools and technology. Ensure team is monitoring, reporting, and assessment of Cyber internal and external policy compliance. Work to mitigate risk across security system's infrastructure. Interface daily with program management, operations, and engineers leads to ensure coordinated performance of program requirements and increase the security posture of the supported environment. … applicable experience with an Associate's Degree Required Progressive Experience: Demonstrated experience leading Cybersecurity Teams. Demonstrated experience with combined Risk Management Framework (RMF) and/or other system authorization and accreditation processes and NIST 800-53 controls. Demonstrated experience accrediting systems using Enterprise Mission Assurance Support Service (eMASS)/Xacta or similar, McAfee Host Based Security SystemMore ❯
Cyber Security Engineering Specialist III - ECDS - Springfield, VA Position ID: RISA-CS081 Number of Positions: 1 Company: Rolston InformationSystems Assurance, LLC (RISA) FSLA Classification: Exempt Location: Springfield, VA (WMA) Remote/Telework Authorized? No remote/telework is authorized. Work is performed 100% on site. Anticipated Start Date: Immediate Job Opening Required Security Clearance: Must already possess … of hire. Description The Cyber Security Operations Specialist III is a Cross Domain Engineer that will lead the design of cross domain solutions; evaluate new technologies and products; calculate system capacity; track system changes; and execute functional testing. Specific Responsibilities Essential Functions Lead the security design and engineering of cross domain solutions. Perform analysis of alternatives for new … Systems, Computer Science) Additional experience may be considered in lieu of a degree. Required Experience/Skills: 6+ years of experience working as a Cyber Engineer working in application, system and network Cyber Security Experience working with Cross Domain Solutions Experience with system accreditation and operational support for CDSs. Experience developing systems, products, and/or processes based More ❯
logical models in order to understand data requirements. Have familiarity with the major varieties of JSON (JSON-LD, GeoJSON, JSON-B, etc.). Have familiarity with Simple Knowledge Organization System (SKOS). Desired: Able to develop, describe & apply complex concepts & processes. Perform multiple tasks at specialist level in a leadership role. Lead and manage multiple Junior/Mid-level … Framework (RDF) and Web Ontology Language (OWL). Have familiarity with the major varieties of JSON (JSON-LD, GeoJSON, JSON-B, etc.). Have familiarity with Simple Knowledge Organization System (SKOS) UML (class diagrams): OCL A plus GML, XML or XSD JSON, JSON-Schema or similar (JSON-LD, GeoJSON) OWL, SKOS, and/or RDF Experienced using data and … system modeling tools such as Sparx Enterprise Architect MySQL MS Access Microsoft Visual Basic (VBA) programming SQL Logical data modeling and/or data architecture experience; experience with ontologies, taxonomies, vocabularies, thesauri a plus Java experience is a plus but not required. Attention to detail & organized. Eager to learn new technologies and skills. Good verbal and written communication Familiar More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Edgesource
in Hyperspectral Imagingto join our dynamic Systems Engineering team supporting mission-critical national security programs. In this role, you will lead the capture, translation, and validation of complex sensor system requirements, ensuring alignment with enterprise objectives and mission needs. You'll bring technical depth in Hyperspectral data integration, traceability, and MBSE best practices to help shape next-generation imaging … Department of Defense (DoD). This position requires that all job duties be performed full-time onsite in the Chantilly, VA area. Job Duties: Capture, decompose, and allocate sensor system requirements from documents such as ECDs, SOCs, ICBDs, CDDs, and Agency CONOPS. Translate mission-level objectives into actionable requirements, with a focus on Hyperspectral imaging system capabilities and … performance metrics. Apply knowledge of Hyperspectral data integration to develop system functionality and ensure optimal sensor performance across enterprise platforms. Conduct requirements traceability analysis using Joint Architecture Reference Models (JARM) and Technical Service Types (TSTs) to identify gaps, overlaps, and opportunities. Manage and maintain Requirements Traceability Verification Matrix (RVTM) to ensure validation and test coverage of Hyperspectral systemMore ❯
Enterprise Infrastructure Solutions (EIS) contract vehicle providing multiple and diverse solutions to streamline, simplify, reuse, rebuild, modernize, or enhance the government's network. This includes professional services, design, engineering, system architecture, installation, monitoring, solutioning, etc. Our customers are widespread agencies in the public sector and intelligence communities. AT&T has an opening for an Independent Accessor to support the … Security Control Assessments (SCA) of all networks under the customers purview inclusive of Unclassified, Secret, & TS/SCI, etc.) The role is inclusive of reviews of all existing security system documentation, system security plans, current Plan of Action & Milestone (POA&M) and Contingency Plan (CP) while utilizing the automated scanning tools to ensure existing applicable policies and standards … of all Department systems. Ensure security is thoroughly incorporated into requirements, design, implementation, deployment, and operations and maintenance (O&M) of the agencies boundary and associated informationsystem components. Provide kick off meetings, using power point, create timelines, define actions being performed and make assignments. Validate security controls to assure compliance Serve as security knowledge expert as More ❯
with DoD and NMCI standards. The QA Specialist will play a pivotal role in verifying the accuracy, completeness, and compliance of deliverables, projects, and processes throughout the software/system lifecycle. This position requires extensive experience with NMCI business processes, as well as advanced proficiency in Microsoft Excel and Microsoft Project. Advanced user of Microsoft Excel (pivot tables, macros … data modeling, dashboarding). Proficient in Microsoft Project, preferably Project Net v6 or higher. Familiarity with NMCI-ACTR systems and processes is highly preferred. Lead QA efforts across IT system development, implementation, and sustainment projects, ensuring compliance with contract requirements, DoD standards, and NMCI policies. Analyze NMCI ACTR documentation to validate alignment with current NMCI provisioning rules, technical baselines … quality assurance, including Configuration Control Boards (CCB), Technical Review Boards (TRB), and Acceptance Reviews. Provide expert-level support in data analysis, performance metric reporting, and documentation of trends impacting system or process quality. Serve as liaison with NMCI representatives, internal engineering teams, and customer stakeholders to ensure timely resolution of QA issues. Prepare formal reports and presentations summarizing quality More ❯
perform various tasks related to the planning, development, implementation, and management of a comprehensive, affordable, and effective systems support strategy. Address Product Support Elements 1. Sustaining/system engineering 2. Design interface 3. Supply support 4. Maintenance planning and management 5. Support equipment/automatic test systems 6. Facilities 7. Packaging, handling, storage, and transportation … 9. Manpower and personnel 10. Training 11. Computer resources 12. Protection of critical information and anti-tamper provision. Perform as key participants in developing long-term weapon system supportability approaches that further the government's acquisition strategy goals and objectives. Provide support to accomplish the generation and review of logistics support documentation that includes the following: Integrated … evaluation and identification of weapon systems logistic requirements and resources, development of logistics support and maintainability programs or plans, systems acquisition requirements analysis and control, Automated InformationSystem (AIS) hardware and software standardization and compatibility, product support/Reliability, Availability, Maintainability and Cost (RAM-C) program test and evaluation planning and execution, and product support/RAM More ❯
data and presenting it to meet customer needs? Join our team as a Reports Developer! You will get to use your systems knowledge to improve our Financial and Acquisitions System that supports our DoD Customer execute their vital mission. How does the opportunity to help improve the visibility of data for a key Government system sound to you … We have been supporting our customer for over 20 years with the implementation of a Commercial-Off-the-Shelf (COTS) Financial and Acquisitions System, Momentum. We continue to develop and implement exciting and complex solutions to support the evolving needs of our customers. We are looking for a Reports Developer with the desire to be a critical member of … business requirements. Design, development and testing of underlying universe or framework to support ad hoc reporting. Defining, documenting, and executing unit test cases to confirm requirements are met. Support system and user acceptance testing activities, including issue resolution. Supporting the functional and technical activities for the customer's financial management and contract writing system reporting tool. More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. • Validates and verifies system security requirements definitions and analysis and establishes system security designs. • Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. • Supports the building of security architectures. • Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. • Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Requirements: • Fourteen (14) years of IA System Architect and Engineer (IASAE) experience, to include recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network More ❯
and end-user support to include some of the following: Systems Requirements, project management and strategic planning, Operational Requirements, Enterprise Strategic Planning and operations, Unix/Linux system software, Test & Evaluation, and Training. Demonstrated experience in advanced system architecture; information assurance; hardware technologies; digital/analog communications technologies. Working knowledge of the following systems … and non-technical personnel translating user requirements into responsive applications. Demonstrated detailed knowledge of IA concepts and requirements. Experience working independently and with multidisciplinary teams. Strong communications, time management, and organization skills to meet deadlines and quality objectives. Qualifications Required Experience: High School Diploma/GED with 10+ years of experience Associate's Degree with 8+ years of … in any direction. Have finger dexterity in order to manipulate objects with fingers rather than whole hands or arms, for example, using a keyboard. Listen to and understand information and ideas presented through spoken words and sentences. Communicate information and ideas in speaking so others will understand. Read and understand information and ideas presented More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
as a Classified Cyber Security Technologist Sr. In this role, the selected individual will collaborate with a team of cybersecurity professionals and work closely with the InformationSystem Security Manager(s) to implement and monitor comprehensive cybersecurity solutions. This will involve identifying, designing, securing, and deploying specialized applications and tools that support the governance and risk management … of 3+ years of related experience in cybersecurity • Plan, implement, test, and monitor classified cybersecurity measures to ensure the security and integrity of our systems. • Assess and mitigate classified system security threats and risks throughout the program life cycle. • Coordinate activities with the InformationSystem Security Manager (ISSM) to ensure systems are secure and technically ready … for inspection. • Validate system security requirements and establish technical system security documentation. • Assist with the implementation of security procedures and verify system security requirements. Technical Requirements • Be well-versed in informationsystem security architectural documentation standards. • Apply information assurance and cybersecurity standards, directives, guidance, and policies to an architectural/risk-based More ❯
communications devices, communications lines, modems, and terminals and is responsible for the overall integration of the enterprise network. is also responsible for planning, modeling, simulation, design, installation, maintenance, management, and coordination of the network. Review and analyze the existing network architecture and provide designs of current/modern WAN/MAN/LAN technologies Recommend best practices such … to cybersecurity. Engineering and upgrading LAN, WAN and VoIP infrastructures, voice and data network systems, and administration of multi-protocol routers, multilayer switches, network security devices and network management systems. Providing support to Application delivery networking, Cloud computing, End Point management, and desktop computing Working with vendors, the Government, carriers, and technical staff on network implementation … unified communications equipment Minimum of 5 years with VMware, experience in virtual and physical internet protocol and Fiber Channel networks and routing protocols Experience with Defense InformationSystem Network (DISN) circuits and Consolidated Afloat Networks and Enterprise Services (CANES) Experience in designing, optimizing, and troubleshooting LAN, WAN and low bandwidth networks protected by network encrypters Experience designing More ❯
ACTIVE SC Clearance is required About the Role A major defence organisation is seeking a Security Architect (Cyber) to play a key role in shaping, developing, and maintaining secure system architectures across mission-critical MOD programmes. You’ll ensure all solutions align with defence and national security standards, working closely with internal engineering teams, MOD stakeholders, and security authorities … such as NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain documentation: Security Architecture Documents, Risk Assessments, and Security Management Plans. Lead and support design reviews and assurance gates. Liaise with MOD, NCSC, and Information Assurance teams to support accreditation and assurance. Collaborate with engineering teams to … STANs). Proven background in Secure by Design and security compliance (ISO 27001, CE/CE+). Experience producing security artefacts for MOD assurance. Working knowledge of risk management frameworks (HMG IS1/IS2, NIST RMF). Excellent communication skills – confident engaging with technical and non-technical stakeholders. Must hold ACTIVE SC Clearance – applicants without current clearance cannot More ❯
ACTIVE SC Clearance is required About the Role A major defence organisation is seeking a Security Architect (Cyber) to play a key role in shaping, developing, and maintaining secure system architectures across mission-critical MOD programmes. You’ll ensure all solutions align with defence and national security standards, working closely with internal engineering teams, MOD stakeholders, and security authorities … such as NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain documentation: Security Architecture Documents, Risk Assessments, and Security Management Plans. Lead and support design reviews and assurance gates. Liaise with MOD, NCSC, and Information Assurance teams to support accreditation and assurance. Collaborate with engineering teams to … STANs). Proven background in Secure by Design and security compliance (ISO 27001, CE/CE+). Experience producing security artefacts for MOD assurance. Working knowledge of risk management frameworks (HMG IS1/IS2, NIST RMF). Excellent communication skills – confident engaging with technical and non-technical stakeholders. Must hold ACTIVE SC Clearance – applicants without current clearance cannot More ❯
extend existing data models and create new data models as required; consume both technical and business requirements that drive data architecture decisions; design databases to support business applications, ensuring system scalability, security, performance and reliability; develop database architectural strategies at the modeling, design and implementation stages to address business or industry requirements; collaborate with system architects, software architects … team to coordinate database development and determine project scope and limitations and write and code logical and physical database descriptions and specify identifiers of database to managementsystem or direct others in coding descriptions. 100% telecommuting permitted from anywhere in the US except HI. Minimum Qualifications: Must have Bachelors degree in Computer Science, Information Technology … all of the following: Designing and developing the following technologies: SQL Server, SSAS, and SSRS; organizing and managing large amounts of detailed information, including production of integration system interface design documents, data models, and architectural diagrams; designing complex data models that contain high levels of abstraction; developing databases using Microsoft SQL Server; developing complex and efficient SQL More ❯
customer and category advocate within AWS, with proven capabilities and business development skills and the ability to prioritize and multi-task. In this role, you will produce and maintain system security packages for our cross domain products in coordination with government counterparts. Automating approval and onboarding processes to ensure faster change management and customer onboarding. Working across … establish and maintain information security documentation, including security questionnaires, SSPs, and SCTMs. Reviewing proposed new systems, networks, and software designs with our security engineer(s) for potential system security risks, and resolving integration issues related to the implementation of new services with the existing cloud infrastructure. Implement higher level system security requirements such as those resulting … recruiter today! Please reach out to Krystan Silva at for inquiries. 10012 Key job responsibilities You will: - Work with senior leaders from government and commercial partners. - Produce and maintain system security packages for our cross domain products in coordination with government counterparts. - Automate approval and onboarding processes to ensure faster change management and customer onboarding. - Work across More ❯
requirements, designing applications, and collaborating seamlessly with diverse development teams. Demonstrate proficiency in analyzing, designing, and enhancing healthcare-related interfaces. Provide technical, managerial, and administrative leadership for complex IT system analysis, development, and implementation. Define problems, analyze requirements, and develop solutions for highly complex systems. Advise on system improvements, optimization, and maintenance in areas including IT architecture, networking … and quantitative data analysis for public health initiatives. Utilize and support tools relevant to federal health missions, such as SAS, Epi Info, and data-driven health analytics. Oversee IT system integration, interoperability, and data-sharing efforts in public health organizations. Ensure compliance with HIPAA, privacy laws, and data security standards. Contribute to national and international IT standards development (HL7 … data formats, and healthcare regulations. Minimum of 10 years of experience in IT systems, public health informatics, or related fields. Proven expertise in government health IT projects, large-scale system integration, and data analysis. Experience in medical and public health informatics, system architecture, and risk management. Hands-on experience with federal health IT tools and data resources (SAS More ❯
application packages in AdminStudio. Ensure compatibility of applications with endpoint systems and manage packaging processes to streamline deployment. Develop, test, and maintain scripts (e.g., PowerShell, Batch, VBScript) to automate systemmanagement tasks such as software deployments, configuration changes, and system updates. Use scripting to improve efficiency in managing endpoint devices, reduce manual intervention, and ensure consistency … Familiarity with Active Directory, Group Policy, and other endpoint management technologies. Expertise in Microsoft Endpoint Configuration Manager (MECM) for software deployment, patch management, and operating system deployment. Proficient in scripting languages such as PowerShell, Batch, or VBScript for task automation and configuration management. Knowledge of AdminStudio for application packaging, deployment, and testing. Experience with endpoint … with SQL queries for reporting and troubleshooting in MECM. Knowledge of Windows Server and Windows OS configurations and management. Strong troubleshooting skills for resolving deployment failures, configuration issues, and system performance problems. Ability to think critically and identify solutions that improve processes and enhance operational efficiency. Strong leadership and mentoring skills to guide junior engineers and cross-functional teams. More ❯
performing comprehensive INFOSEC assessment of management, operational, and technical security controls to determine overall effectiveness of the controls for A&A determination throughout a costumer program's system lifecycle. SCAs provide an assessment of the severity of weakness or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. … assess informationsystems (IS) for compliance with IC, DoD, and ND guidelines Provide IS security advice and guidance to government and industry partners Advise InformationSystem Owners (ISO) on confidentiality, integrity, and availability impact values Offer technical guidance for Authorization and Accreditation (A&A) responses Evaluate IS threats and vulnerabilities, recommending additional safeguards as needed … visits and assessments, prepare written reports for government approval Ensure completion of security control assessments for each IS Support RMF process-related presentations, briefings, and reports Utilize customer RMF system of record for workflow duties and documentation Track and report on RMF process workflow activities and metrics Prepare Security Assessment Reports (SARs) and Authorization Recommendations Collaborate on Plans of More ❯
The Security Engineer III participates in all aspects of informationsystems and network security including intrusion detection, incident response, vulnerability assessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall … in technical risk assessments and security exposure analyses of systems, networks and business applications - Analyze network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness - Oversee the installation, configuration and supportive processes of security technologies - Participate in or lead the Incident Response activities - Interact with internal and external … identifies security process and develops strategies/solutions to security issues - Keep fully abreast of trends and changing technologies as they relate to IT and Network Engineering and Information Security fields - Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders - Security Operations/Administration - Monitor and manage our More ❯