Mc Lean, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Linux System Engineer/Admin Location: Mclean Work Type: Onsite Remote Work: NO Job Description Gridiron IT is seeking a highly motivated Linux System Engineer and Administrator with hands on experience with the full lifecycle development and maintenance of physical and virtual servers. The qualified candidate will have demonstrated experience with multiple cloud platforms, automation technologies, and with … Linux system administration. The successful candidate will ensure the smooth operation of existing enterprise systems by patching and updating the system regularly; while automating repetitive tasks to improve efficiency, performance, and the security profile of the systems under management. The system engineer must also act as a subject matter expert consulting with security analysts and tenant mission … system owners to resolve incidents and ensure the troubleshooting problems encountered to minimize service interruptions. Responsibilities Design and Implementation Develop and implement solutions, end-to-end integrating a mix of cloud, platform, and application components. Define system architectures that meet organizational needs, ensuring all components work together effectively. Advance new capabilities to lower total cost of ownership, increased More ❯
under the guidance of the lead architect. Scope of Role The organization has approximately 500 employees and an additional 100 contract staff. The workforce comprises skilled tradespeople and management and central corporate functions in a 70/… split. There are around 400 IT users. The IT Team supports all UK, Palma, and US IT users. Key Job Responsibilities Assist in the development and documentation of system architecture designs and best business practices. Support integration efforts between platforms and services. Conduct research and analysis on emerging technologies and tools. Collaborate with analysts, finance, and infrastructure teams to … company with manufacturing operations. Skills Strong analytical and problem-solving skills. Good communication and documentation abilities. Microsoft 365 Microsoft Teams Customer service Experience A background in Computer Science, InformationSystems, or a related field, or equivalent experience. Hardware support experience including Dell, HP, and Apple. IT Project support, delivering on time and within budget. Qualifications A Level or More ❯
Test and Evaluation (OPNAV N94), Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Test and Evaluation (T&E) Director, PMW/A 170, Fleet user/System of Systems (SoS) representatives (i.e. Naval Computer and Telecommunications Area Master Station Pacific, PMW-770, PMW 160, etc.), and Contractor Vendors, as required Coordinate with Fleet schedulers, laboratories, and … innovative and willing to tackle challenging situations to meet the customer's specific requirements Experience and Skills Required Experience: 2-4+ years of T&E experience Experience with system developmental type test events Knowledge of the DoD and Navy T&E and acquisition processes in the Defense Acquisition life cycle management, including Joint Capabilities Integration and … Development System (JCIDS) process Intermediate knowledge of experience with MS Office suite, specifically MS Word, PowerPoint, and Excel. Strong oral and written communication skills Ability to work autonomously Analytical, organized, and a self-motivated learner Ability to communicate and coordinate effectively within Navy chain of command Ability to collaborate/work well with others and thrive in fast-paced More ❯
USmax Corporation is seeking a dynamic and detail-oriented Mid ServiceNow ITSM Process Systems Engineer to lead an effort to review and update IT Service Management (ITSM) processes on the ServiceNow platform. This role bridges the gap between business requirements and technical implementation by documenting and optimizing ITSM processes such as Incident, Problem, Change, as well as service … documentation, and transition to support. Participate in upgrades, patching, and roadmap planning for ITSM capabilities. Required Qualifications: Active TS/SCI Clearance ITIL Foundation or Intermediate certification. ServiceNow Certified System Administrator (CSA) Strong knowledge of ITIL concepts and experience designing ITSM workflows. Ability to gather and analyze complex requirements from technical and non-technical stakeholders. Experience with ServiceNow Flow … and 2), and incorporating fixes in a quick and timely manner 3+ years of hands-on experience with ServiceNow ITSM modules Required Education: Bachelor's degree in InformationSystems, Computer Science, or a related field and 4+ years' experience OR Associate degree and 6+ years' experience OR High school diploma or GED and 8+ years' experience in a More ❯
Engineer to work on an AWS systems team. The qualified candidate must have an active TS security clearance, and will work hand-in-hand with technical and program management leadership to implement the next generation desktop and web based production and dissemination system. This position will require experience standing up and maintaining Windows Servers in a cloud environments … can be required (approx. 2 times a month but can vary by mission requirements). When required, schedule changes will be arranged. Core Qualifications: Requires a BS in InformationSystems, Information Technology, Computer Science or closely related discipline and 4+ years of prior relevant experience or Masters with 2+ years of prior relevant experience; OR … Security Clearance with ability to obtain SCI post hire DoD 8570 compliance Experience with cloud/Amazon Web services (AWS) Experience with Microsoft Windows Server and Desktop Operating SystemsSystem (hardware, software and networking) Design and Architecture. Understanding of custom code development/reviews Understanding of DevSecOps methodologies and workflow Experience developing and managing CI/CD pipelines Experience More ❯
the Joint Regional Security Stack (JRSS) divestiture mandate. A phased systematic approach is required to provide individual sites with standardized, updated technology systems to ensure the Army's Information Technology (IT) infrastructure is equipped to provide soldiers with cutting-edge technology to ensure applications, data, and enterprise services are accessible, trusted, and interoperable across the globe. Possesses and … a liaison between the AGUN program and customer, coordinating with the Program Management Office (PMO) for engineering and design solutions. Implements industry best practices, including Model Based System Engineering (MBSE), Network Security Development Operations (NetSecDevOps) Digital Twin, and Security Development Operations (SecDevOps) methodologies, to enhance insight, decision-making, and process automation. Manages data and information … in the Lab environment. Surveys and tests existing infrastructure for potential re-use in designing enterprise capabilities. Develops, maintains, and updates technical documentation such as enterprise architecture, application/system design, and network architecture and design. Basic Qualifications: US Citizen with a Secret security clearance. DoD 8570 certifications. IAT II, OS. Bachelor's degree and 12+ years of related More ❯
I am currently working with a Charity who are seeking a Head of Information Security and Compliance. You will join an ambitious, focused and dynamic team who are passionate about how technology can enable our staff to deliver incredible support to the armed forces community. Role Purpose: The Information Security and Compliance Manager is responsible for … developing, implementing, and maintaining security policies, procedures, and controls to protect the data and systems. They will play a pivotal role in the management and containment of security incidents, ensuring continuous improvement in their security posture while raising awareness for staff, volunteer and member communities. The post holder will lead on activities that assess, report and mitigate risk … associated with third parties with the focus being to protect the confidentiality, integrity, and availability of information assets. Key Responsibilities: Information Protection Take responsibility for their information and data protection policies, practices and settings to include sensitivity labels, data retention policies and data loss protection policies Collaborate with the Head of Risk, DPO and More ❯
I am currently working with a Charity who are seeking a Head of Information Security and Compliance. You will join an ambitious, focused and dynamic team who are passionate about how technology can enable our staff to deliver incredible support to the armed forces community. Role Purpose: The Information Security and Compliance Manager is responsible for … developing, implementing, and maintaining security policies, procedures, and controls to protect the data and systems. They will play a pivotal role in the management and containment of security incidents, ensuring continuous improvement in their security posture while raising awareness for staff, volunteer and member communities. The post holder will lead on activities that assess, report and mitigate risk … associated with third parties with the focus being to protect the confidentiality, integrity, and availability of information assets. Key Responsibilities: Information Protection Take responsibility for their information and data protection policies, practices and settings to include sensitivity labels, data retention policies and data loss protection policies Collaborate with the Head of Risk, DPO and More ❯
System Administrator We have an immediate need for a System Administrator to maintain critical IT systems and orchestrating novel and efficient baseline configuration management. Typical duties will include health and status monitoring of hardware and software components, automated deployments of baselines, patches, services, and configuration. Defect and problem resolution, communication with stakeholders, and scheduling system events for … inventory of client/server/storage/network/mobile/support devices. What you will be doing: The Senior System Administrator is responsible for all operational aspects of the development & test environment(s) associated with an exciting and important capability contributing to our national defense. He/she will manage all aspects of the relative Information Technology (IT) system(s) accounts, baselines, compliance, availability, and performance. Specific and specialized tasks include proficiency in Linux commands and navigation, virtualized/containerized hosting designs and implementations, to include but not limited to VMware/ESXi , Docker, etc., and automated deployment and baseline configuration tools such as Ansible. Additional tasks as required include Windows/Active More ❯
Senior IT Systems Solution Architect - Metadata Management/Data Quality Location: Redstone Arsenal, Huntsville, AL Job Title: Senior Information Technology (IT) Systems Solution Architect (Metadata Management/Data Quality) Duty Location: Logistics Data Analysis Center (LDAC), Redstone Arsenal, Huntsville AL Clearance Level (Must Have): Active DoD - Secret Required Certifications (Must Have): None Salary … Job Description: The Senior IT Systems Solution Architect (Metadata Management/Data Quality) serves as the senior subject matter expert associated with content, processes and procedures associated with ERP systems. Defines the detailed requirements, analyzes the business needs, and validates solutions with the client. Details requirements through the product development and other functions to support the project team. … needs. Performs detailed job analysis of business processes and provides an interface between traditional logistical support organizations and functional requirement definitions. The Senior IT Systems Solution Architect (Metadata Management/Data Quality) must demonstrate the following: • Excellent organizational, analytical, written and oral communication skills. • The ability to prioritize and multi-task in a fast-paced environment. • The ability More ❯
Heritage Bank has an exciting opportunity to join our organization! We are seeking a Information/Cyber Security Risk Officer to join our Compliance team. The information/cyber security risk officer is responsible for executing the tactical and operational elements of the bank's information and cyber risk management program. This … position leads day-to-day risk oversight activities across cybersecurity, information security, third-party/vendor risk, data governance, and business continuity planning (BCP). Geographical location for this position is Tacoma, Washington at the Southern Operations Center. Depending on experience and qualifications, other locations within Heritage Bank's footprint (WA, OR, ID) may be considered. Base Salary … all lines of business, to include IT, operations, and compliance, to actively foster a risk-aware culture. Assists with the identification, assessment, mitigation, and monitoring of cybersecurity and information security risks across the enterprise and contributes to risk registers and incident trend analyses. Oversees IT control assessments, gap analyses, and control testing, ensuring appropriate documentation and remediation planning. More ❯
and more. Essential Functions, Responsibilities & Duties may include, but are not limited to: Provides senior-level leadership and strategic direction for the Defense Health Agency's IT Knowledge Management initiatives across its global network of military hospitals, medical clinics, and dental clinics. Serves as a top-tier expert responsible for shaping and overseeing the implementation of DHA's … comprehensive IT knowledge management strategy, with a strong focus on leveraging SharePoint and other advanced collaborative technologies. Leads the development and continuous refinement of DHA's overarching IT knowledge management architecture, ensuring alignment with DoD IT strategies, organizational objectives, and industry best practices. Directs the integration of knowledge management principles into all aspects of … spanning approximately 250,000 end-user devices and 3,000 physical and virtual servers across 250 sites worldwide. Provides high-level strategic guidance to DHA leadership on knowledge management matters, including long-term planning, resource allocation, and measuring the impact of knowledge management initiatives on organizational performance. Collaborates with executive stakeholders to secure buy-in and More ❯
Job Description: The selected candidate will work as a Financial Management Senior Manager to lead audit remediation, internal controls assessment, and enterprise-level financial improvement initiatives in support of the U.S. Army ' s Financial Improvement and Audit Readiness (FIAR) objectives. This leadership role is responsible for supervising multidisciplinary teams, engaging directly with senior Army financial stakeholders, and overseeing … supporting Army financial improvement initiatives. Support project planning and execution in collaboration with engagement managers and client points of contact. Position Requirements: Master's Degree in Accounting, Finance, InformationSystems, Business Management/Administration, Mathematics, Statistics, Computer Science, Data Science or field directly related to the position; and one of the following active and current certifications … issued by appropriate licensing authority: Certified Public Accountant (CPA), Certified Internal Auditor (CIA), Certified InformationSystems Auditor (CISA), Certified Government Financial Manager (CGFM), Certified Defense Financial Manager (CDFM), Project Management Professional (PMP), Scaled Agile Framework (SAFe), Information Technology Infrastructure Library (ITIL). Ten (10) years of experience with Federal financial management; including More ❯
POSITION IS ONSITE IN VA BEACH Job Summary VSolvit is looking for a Mid-level Program/Project Management Analyst to join our Range Systems Engineering team in support of Naval Surface Warfare Center (NSWC), Corona Division. As a Management Analyst on this project, you will be part of a team supporting an enterprise application. The … data to identify trends, potential risks, and areas for improvement, utilizing Power BI's analytical capabilities to uncover insights that drive informed decision-making Support Data-Driven Program Management: Provide government with timely and accurate data to support program monitoring, resource allocation, and risk mitigation strategies, contributing to proactive program management Collaborate on Data Management and Reporting: Work with data management teams to ensure data integrity and accessibility, contributing to the development of standardized reporting processes and documentation within the SharePoint environment for efficient information sharing Provide data reports, presentations of performance and operations metrics, and coordination between Command staff departments Coordinate with engineers, project managers, technical personnel, and More ❯
Overview Join Barclays as a Cryptography and Key Management Analyst , where you'll lead the evolution of our digital landscape, driving innovation and operational excellence. In this role, you will be part of the Cryptography team within the Chief Information Security Office, Global Information Security. This team provides critical cryptographic services, including Secure Key … Management, Hardware Security, Application Cryptography, Strong Authentication, and PKI & Certificate services to Barclays Group. Your primary responsibility will be to act as a liaison between business, technology, and security functions to ensure information confidentiality, integrity, and availability while supporting security risk mitigation. Please note that while you will work standard UK hours (9 AM-5 PM … certifications. Background in operational environments, including incident response and change management. Strong documentation skills for operational procedures. Familiarity with SharePoint, Confluence, and JIRA. Unix/Windows operating system knowledge. Expertise in privacy, compliance, and data protection services. Bachelor's degree in Computer Science. You may be assessed on the key critical skills relevant for success in role More ❯
Network Knowledge Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: We are seeking an experienced ITIL Network Knowledge Management Quality Assurance Analyst to join … our IT service management team. The ideal candidate will ensure the quality, accuracy, and effectiveness of our network knowledge management processes in alignment with ITIL best practices . Responsibilities: Assist in developing, implementing, and maintaining ITIL-based knowledge management processes for network … operations Develop and enforce quality standards for network knowledge articles and documentation Monitor, manage, and maintain knowledge articles within ServiceNow Conduct regular audits of the knowledge managementsystem to ensure compliance with customer's policies, procedures, governance and ITIL guidelines Collaborate with network teams to capture, validate, and organize knowledge effectively Analyze and report on knowledge usage More ❯
Configuration Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity : We are seeking a detail-oriented Configuration Management Quality Assurance Analyst to join our team. … The successful candidate will be responsible for ensuring the quality and integrity of our configuration management processes and systems. This role involves analyzing, testing, and verifying configuration management processes, practices across the program to maintain consistency and reliability of information. Responsibilities: Identifies and tracks program risks and action items to closure, and assess risk and cost … recommend solutions Manages end-to-end projects that follow procedures, work instructions, and templates to support process execution Supports the development and maintenance of relevant and appropriate project management documentation and artifacts (i.e. project schedules, briefings, reports, etc.) Support the Lead in efforts ensuring high performance and quality are consistent Support the development and maintenance of customer required More ❯
assurance of the internal control structure within the firm's technology infrastructure and business systems. Leverage knowledge and experience in technology infrastructure, application development, cybersecurity, electronic trading, risk management and anti-financial crime systems. Requires: Master's degree (U.S. or foreign equivalent) in Computer Science, Operations Research, Data Analytics, Industrial Engineering, InformationSystems or a related … programming languages including Java and C++, scripting languages such as Python, and IDE environments such as IntelliJ, Eclipse and NetBeans; utilizing concepts related to informationsystems, networks, system architecture, design, information security, technology resiliency, risk and control governance and metrics, incident management, SDLC, vulnerability management and data protection in audits; working … IT controls, including data integrity, exception-based controls, change management, entitlement management, data backup and retention, performance and capacity management, technology SOX, and system monitoring; and identifying, assessing and relating technology risks to business risks in integrated audits to determine financial, regulatory or reputational impact to business. Job Code: QUALIFIED APPLICANTS: Apply at More ❯
Systems and Data. OCS seeks an expert Senior ISSO to oversee (and actively participate in) the day-to-day security and compliance requirements of complex informationsystem operating environments. A successful Senior ISSO will lead the establishment, implementation and/or enhancement of InformationSystems Security and Compliance efforts based on State/Agency … Management Framework (RMF) compliant programs is strongly desired and will be given the highest weight. Experience should include well documented success in the development and maintenance of System Security Plans (SSPs), Privacy Impact Assessments (PIAs), Interconnection Security Agreements (ISAs), Computer Matching Agreements (CMAs), and related interviews and audit/assessment activities to complete and verify these and … development and integration of RMF/A&A tasks and artifacts in RMF type roles such as; ISSO, Information Security Architect, Security Control Assessor, etc., into the System Development Life Cycle (SDLC) is ideal. Experience in security as related to Cloud services and vendor management is considered desirable for this position. Technical Knowledge: Hands on More ❯
solutions to meet MLS and information assurance requirements. Security Audits & Compliance: Conduct security audits, perform risk assessments, and recommend strategies for risk mitigation. Security Documentation & SOPs: Generate system-level security documentation and support the development of System Operation Procedure (SOP) documents. IT Governance & Risk Management: Apply knowledge of IT governance requirements, encryption and decryption … capabilities, and risk mitigation strategies to establish secure solutions. Threat & Vulnerability Analysis: Perform vulnerability and risk assessments across computer systems and applications throughout the system development life cycle (SDLC). Security Architecture Development: Design, analyze, and implement security features for system architectures, ensuring robust information assurance. System Security Integration: Provide expert-level integration and implementation … s degree in Cybersecurity, Computer Science, Information Technology, Engineering, or a related field ( Master's degree preferred). Experience: Minimum 8 years of experience in cybersecurity engineering, system security, or information assurance, preferably within a DoD or federal agency environment (DISA experience highly preferred). Certifications (Preferred): Certified InformationSystems Security Professional (CISSP More ❯
involved in the planning and execution of internal audit procedures and the creation of internal audit reports. An auditor must work within a team to create a solid information technology infrastructure, and collaborate with clients to devise and put in place policies and procedures regarding network security issues. Responsibilities: Interact with key functional and technical client personnel and … on the annual risk assessment and plan development Identify control weaknesses, help assess their impact, and discuss practical solutions with management Collect supporting client artifacts (such as system security plans, vulnerability assessment reports, etc. Map current IT controls and supporting artifacts to a predetermined IT Controls Set Develop and execute IT controls test plans in order to … Produce and maintain detailed work papers of control test activities and results, and Identify and document IT internal control deficiencies and provide clear and concise recommendations to client management regarding the elimination or mitigation of control deficiencies. Execute audits by analyzing, testing and evaluating the entity s control environment by using a blend of traditional sampling and automation. More ❯
events and potential threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Develop procedures to ensure system users are aware of their CS responsibilities before granting access to DoD information Systems. Process and review DD-2875s. Support Risk Management Framework (RMF) system categorization process and memorandum for Confidentiality, Integrity, and Availability impact level determinations Ensure that CS requirements are integrated into the Continuity of Operations Plan (COOP) for that system or DoD Component. Ensure that CS security requirements are appropriately identified in computer environment operation procedures. Develop security requirements and maintain list of hardware, software, and services acquisitions specific to … CS security programs. Ensure that IA and IA enabled software, hardware, and firmware comply with appropriate security configuration guidelines, policies, and procedures. Create and review System Security Plans (SSP), as required Prepare for Assess and Authorize (A&A) and Security Control Assessor (SCA) validations and/or inspections and ensure that CS inspections, tests, and reviews are coordinated. Qualifications More ❯
Cloud Engineer to support the Missile Defense Agency InformationManagement and Software Services (AIMSS) effort. The mission is to design and implement a Missile Defense System with multiple layers of protection. The Cloud Engineer performs administration of cloud and on-site technologies and provides end-to-end solutions for IT Systems. Creates and configures virtual … and physical machines in a multi-platform environment. Monitors system performance and addresses any issues through an effective support process. This position is located at Redstone Arsenal in Huntsville, AL. Responsibilities Provide technical expertise supporting informationsystem components, infrastructure integration and maintenance to satisfy system security requirements for several stakeholders. Support and facilitate the MDA … Certifications Required: CompTIA Security+ CE, Certifications Desired: AWS Certified Solutions Architect, AWS Certified Developer, CCSP, GCSA, Azure Security Engineer Knowledge of VMware, Windows, and Linux. Azure Group Policy administration, system security and AD integration. Microsoft Azure SQL Database and Azure Blob storage experience. Active Secret clearance required. Must be able to maintain the security clearance required for this position. More ❯
support Data Center Operations - AI & Application Platform for Excellence (APEX), hub and spoke, cloud infrastructure on public cloud providers Azure and AWS. This position will focus on project management efforts related to APEX cloud infrastructure, working closely with the client's APEX cloud technical team, APEX customers, and 3rd party vendors. Requirements: Minimum 6+ years of experience • Experience … and skill in overseeing, coordinating, and analyzing the development and documentation of informationsystems and technical requirements. • Has experience with project initiation, project planning and discovery, project execution, project monitoring and project closure. • Skill in project management risk mitigation … by identifying roadblocks, bottle necks and potential risks before they occur. • Experience with coordinating and working with highly advanced IT team members. • Has managed projects for solution architects, engineers, system analysts/administrators and/or database administrators. • Leverages an understanding of Software Development Life Cycle (SDLC) models, Agile principles and Information Technology Service ManagementMore ❯
ACAS System Operator Position Description The AFINC II contract supporting the 26th Network Operations Squadron (26NOS) is searching for qualified candidates for a position of Junior or Mid-Level ACAS Systems Operator I or II (depends upon experience). Seeking an individual for vulnerability assessment analysis and administration role with cybersecurity oriented principles to protect and defend information … enclave or local policy • Work in concert with other Tenable operators, integrator and IA personnel responsible for operating and maintaining the ACAS program in multiple enclaves • Candidate will coordinate system activities such as deploying, configuring, monitoring, tuning, upgrading, and troubleshooting Tenable components spanning local, remote and complex environments • Must have experience setting up and executing Tenable Nessus scans, review … Responsible for acquiring, configuring and ensuring external deliverables: DISA/Continuous Monitoring and Risk Scoring (CMRS), importing vulnerability and security audit plug-ins, DoD Patch Repository Defense Asset Distribution System (DADS), build/maintain vulnerability and audit repositories • Assist mapping scan zones, scanners, subnets to include leveraging enterprise network application tools such as Forescout, SolarWinds Orion, McAfee Endpoint Security More ❯