Permanent Management Information System Job Vacancies

601 to 625 of 4,806 Permanent Management Information System Jobs

Network Problem Management Quality Assurance Lead

Sterling, Virginia, United States
CACI International Inc
Network Problem Management Quality Assurance Lead Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity : We are seeking an experienced ITIL Network Problem Management Quality Assurance Lead to ensure … the effectiveness and efficiency of our network problem management processes. The successful candidate will be responsible for implementing quality assurance measures, conducting audits, and driving continuous improvement in alignment with ITIL best … practices. Responsibilities: Lead the development and implementation of ITIL-based problem management strategies and processes for network operations Oversee regular audits of the problem management system to ensure compliance to customer policies, directives and governance and identify areas for improvement Develop and implement quality assurance processes for network problem management Analyze problem management More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Supply Chain Risk Management Analyst with Security Clearance

Washington, Washington DC, United States
Serco Inc
We are a new and growing organization looking to implement processes that will grow with us and our customers' evolving demands. We are seeking a Supply Chain Risk Management Specialist. This role is a data-driven subject matter expert that provides matrixed support to operational organizations within the MIB. You will provide day-to-day analytic support to … insights, align on standards, and improve processes. Maintain awareness of DoD supply-chain and acquisition priorities to ensure analytic work supports mission outcomes. Provide program, analytical, and acquisition management support to senior level MIB executives as required. Work with the MIB team, which is spread across the United States focused on workforce development/marketing, supply chain/… sustainment, and technology developments. Assist in drafting information papers in response to Congressional inquiries. Provide input to Report to Congress regarding MIB spend goals and associated return on investment. Travel as required to carry out the duties above. Qualifications To be successful in this roll, you will have: Ability to obtain a SECRET DoD clearance. Must be a More ❯
Employment Type: Permanent
Salary: USD 99,232 Annual
Posted:

Knowledge Management & Data Analyst (0043) with Security Clearance

Washington, Washington DC, United States
OCT Consulting
Description: Knowledge Management & Data Analyst (0043) OCT Consulting is a business management and technology consulting firm that provides support to Federal Government clients. We provide consulting services in the areas of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology. Responsibilities and Duties OCT … currently has an opening for a Knowledge Management (KM) & Data Analyst to work with a technology division within the office of a federal client. This role will require strong interpersonal skills and attention to detail. The contractor shall support various administrative functions for the Section Chief and Assistant Section Chief, as described below. Day to day responsibilities include … interactive dashboards and reports using Power BI. • Streamlining business processes through automation and developing user-friendly applications to support various departments using MS Power Platform tools. • Offer timely information dissemination to personnel (government and contractor); be prepared to provide expert advice and recommendations regarding website development. • Work towards and promote a strategy of centralization, standardization, and "best practice More ❯
Employment Type: Permanent
Salary: USD 125,000 Annual
Posted:

Network Incident Management Quality Assurance Analyst

Sterling, Virginia, United States
CACI International Inc
Network Incident Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity : We are seeking a detail-oriented ITIL Network Incident Management Quality Assurance Analyst … to support the continuous improvement of our IT network incident management processes. The ideal candidate will work closely with the QA Lead to ensure network incident management practices align with ITIL standards and contribute to the overall quality of IT service delivery. Responsibilities: Assist in developing and maintaining quality assurance standards and procedures for IT network … incident management, aligned with ITIL framework. Conduct regular audits of incident records, documentation, and resolutions to ensure compliance with ITIL standards and internal procedures. Analyze incident data, metrics, and trends to identify areas for improvement in the incident management process. Support the training of IT staff on ITIL network incident management practices and quality More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Assessment & Authorization (A&A) Analyst with Security Clearance

Ashburn, Virginia, United States
Base One Technologies
Are interested in this opportunity. Please forward a copy of your most update resume in word format to The candidate will be responsible for evaluating key points in the System Lifecycle, such as before its deployment or during major updates. Responsibilities may include creating security documentation (e.g., System Security Plan, Security Assessment Report) and obtaining the final authorization … controls, access controls, provisioning and deprovisioning, transfers, separation of duties, configuration management, contingency planning, application security, business process controls, interface controls, and data management system controls. The candidate will be responsible for: • Conducting formal assessments and deciding whether the system is authorized to operate • Conducting a formal assessment of the system's … security posture • Evaluating whether security controls meet established standards and are functioning effectively • Documenting results and making recommendations for improving security • Recommending whether the system should be authorized to operate based on assessment outcomes • Ensuring that the system has the necessary security controls to minimize risks Basic Qualifications CANDIDATE MUST BE LOCAL TO ASHBURN, VA - SCHEDULE TBD - EXACT More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ConMon Validator with Security Clearance

Chantilly, Virginia, United States
RDR, Inc
position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management … with developing ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve fidelity … supervision Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation Experience as an ISSO, Information System Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR)Strong attention to detail Ability to work in a team environment Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ConMon Validator Lead with Security Clearance

Chantilly, Virginia, United States
RDR, Inc
position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management … program. Develop ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve fidelity … supervision Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation Experience as an ISSO, Information System Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR)Strong attention to detail Ability to work in a team environment Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ServiceNow Architect II-IM Application Development

Irving, Texas, United States
CHRISTUS Health
Description Summary: The IT Architect II is responsible for design of IT systems including system infrastructure, system security, application architecture, software and data life cycle management. Provides enterprise architectural framework for the design, development, and deployment of information/business systems. Proactively drives the prioritization of key technology enablers for achieving enterprise level system objectives … solutions that exceed expectations. This role requires excellent collaboration and communication skills to translate complex requirements into functional architecture. Responsibilities: • Assists in the development of the information system vision and strategy of the organization; assists in the development, implementation, communication, and promotion of strategic and tactical plans • Researches and participates in beta testing of new systems and … technologies in order to better evaluate their suitability to the CHRISTUS environment • Evaluates proposed system acquisitions and provides critical input to the decision-making process relative to compatibility, cost, resource requirements, operations, and maintenance; develops plans and recommendations to improve the performance and efficiency of assigned systems; addresses all aspects of assigned systems, including hardware, software, outside services, etc. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

HBSS/MDE Administrator SME with Security Clearance

Fort Belvoir, Virginia, United States
Global Enterprise Services, LLC
integrity of IT systems by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate … consideration Key Responsibilities: Responsible for migration from Trellix to Microsoft Defender Cloud experience since InTune, which will manage MDE Continuous upkeep, monitoring, analysis, and response to Information System, network and security events using Endpoint Security tools such as Trellix and Microsoft Defender. STIG Application and Compliance: Implement and maintain Security Technical Implementation Guides (STIGs) on Endpoint Security … Tools. Conduct regular STIG compliance checks using tools like SCAP Compliance Checker and STIG Viewer. Document STIG configurations and remediation actions to ensure audit readiness. Patching and System Updates: Manage and deploy operating systems and application patches in accordance with federal patch management policies. Coordinate patch schedules to minimize operational impact while meeting compliance deadlines. Verify patch More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE 3 102-090 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
Information System Security Engineer (ISSE) 3 is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems … the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE 2 102-163 with Security Clearance

Macon, Georgia, United States
IC-CAP
Information System Security Engineer (ISSE) 2 is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into information systems … the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Integration Engineer with Security Clearance

Chantilly, Virginia, United States
TRIAEM LLC
strategists across the NGA enterprise. Tools of the Trade: Gain hands-on experience with best-in-class tools like Jira, Confluence, Cameo, DOORS Next Gen, Baseline Management System, and ServiceNow. Skills and Experience: Required: Bachelor's degree or higher in Engineering, Computer Science, Information Technology, Management Information Systems, or related STEM … degree. 6 years of working experience in government or industry in database management or Big Data analysis. Familiarity with Architecture Artifacts (e.g., DoDAF Architecture Views - Service and System) Use of Cameo Systems Modeler tool to develop Architecture artifacts such as System and Service views. TS/SCI clearance adjudication or ability to obtain SCI and pass … e.g., Requirements, Use Case, CONOPS, and/or Epic development; Risk, Configuration, and/or Schedule Management) Familiarity with Architecture Artifacts (e.g., DoDAF Architecture Views - Service and System) Hands-on experience with the NGA RFC process Knowledge of Government Financial Management systems and workflows Hands-on experience with Jira and Confluence Training, certification, and hands More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Herndon, Virginia, United States
Peraton
Responsibilities: Perform tasks delegated by the ISSM in support of information assurance programs, including security authorization activities in compliance with RMF policies and procedures. Develop and maintain System Security Plans (SSPs), Risk Assessment Reports, A&A packages, and Security Controls Traceability Matrix (SCTM). Ensure that operational security posture is maintained by establishing and enforcing security policies … standards, and procedures. Conduct vulnerability/risk assessments to support the Assessment & Authorization (A&A) process. Analyze system audit logs to identify anomalous activities and potential threats to network resources. Perform vulnerability scans and identify weaknesses in security systems, recommending necessary actions. Ensure that cybersecurity-enabled products or other compensating security controls mitigate identified risks to acceptable levels. Apply … reviews and identify gaps in security architecture, offering recommendations to mitigate risks. Collaborate with government customers to respond to computer security incidents and ensure vulnerability compliance. Input and maintain system documentation into government record-keeping systems such as Xacta. Provide Configuration Management for security-relevant information system software, hardware, and firmware. Perform risk analysis More ❯
Employment Type: Permanent
Salary: USD 179,000 Annual
Posted:

Software Engineer with Security Clearance

Maryland, United States
i3, LLC dba Iris Intelligence
of intricate software systems and analytics. This includes interaction with extensive data sets and business management information systems while creating relevant algorithms. Navigate complex projects, system problems and organization with familiarity of IT systems under governing guidelines. Provide solutions to technical problems within workflows established with a team of system engineers. Responsibilities - Direct software … Preferred Qualifications - Software engineering foundation- Digital Logic, Circuit Analysis and Embedded Systems programming - Cloud (e.g. AWS) & Infrastructure as Code (e.g. Terraform) - Relational databases (e.g. SQL, Oracle) - IT asset management principles - Knowledge of LANs, VPNs routers, network protocols, data encryption - Agile development - Security+ CE certification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Navy Qualified Validator with Security Clearance

Wallops Island, Virginia, United States
T-Solutions, Inc
Steps 1 through 6) with in-depth familiarity and understanding of Navy Information Technology (IT) sites, systems, and infrastructure. • Recommend cybersecurity protection capabilities, and, in collaboration with system owners, advising implementation strategies as guidance and threats change. • Consult with System ISSEs and/or System Owners regarding incorporation of cybersecurity best practices into system … RMF for assigned programs, organizations, and systems. • Conduct comprehensive assessments of the management, operational, and technical security controls employed within or inherited by an information system to determine the overall effectiveness of the controls. • Perform annual security reviews, annual testing of Information Assurance (IA) controls. Travel • This position includes a low level of … experience. • Experience: • Minimum of seven years of directly related experience in securing and validating DoD systems. • At least five years of relevant experience in the following areas: • RMF process • System analysis and audits • CISCO IOS • Microsoft Windows/Server • Linux • Network and system monitoring tools • IA compliance models and tools • IA control validation • Risk management and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer User Support Specialist with Security Clearance

Huntsville, Alabama, United States
Galapagos, LLC
support to end users, diagnosing and resolving hardware, software, and network issues efficiently while maintaining exceptional customer service standards. You will utilize remote support tools and an automated ticketing system to track, manage, and document all service requests. When necessary, you will conduct on-site visits to perform hands-on troubleshooting, system maintenance, and user training. The ideal … to delivering high-quality, customer-focused IT support. Key Responsibilities The Computer User Support Specialist will: Provide technical support and troubleshooting for computer systems, software, and hardware, including operating system configuration, user account management, and system backup/recovery Configure, install, and manage end-user devices such as computers, laptops, printers, and scanners Perform hands-on … Maintain clear and effective communication with customers to ensure issues are resolved efficiently and relationships are maintained Ensure all work adheres to established Service Level Agreements (SLAs) Apply information security principles and follow established security protocols and standards Required Skills and Experience The Computer User Support Specialist must have: Active Secret clearance Minimum of 5 years of professional More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Analyst / ISSO with Security Clearance

Washington, Washington DC, United States
Scientific Research Corporation
be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, and alignment with market data. Description The Cyber Security Analyst/Information System Security Officer (ISSO) will be a member of a small team focusing on developing services and applications in a DevSecOps based environment in support of the Defense Intelligence Agency … DIA). Engineering will be performed on Joint Worldwide Intelligence Communications System (JWICS) and National Security Agency Network (NSANet) connected systems. As a Cyber Security Analyst/ISSO, this position is responsible for supporting the Information System Owner to complete security assessment, continuous monitoring, and configuration management responsibilities. Responsibilities include, but are not limited … events, data transfers, etc. Performing security assessments of DoD Family of Systems in accordance with National Institute of Standards and Technology (NIST), Navy, and NAVINTEL IA guidance, working with system engineers to take corrective action to resolve identified problems Becoming a NAVINTEL IA ICOP Trusted Agent within 6-months Performing Site Based Security Assessments (SBSAs) of systems and recommending More ❯
Employment Type: Permanent
Salary: USD 157,400 Annual
Posted:

Senior Cybersecurity Analyst with Security Clearance

Alexandria, Virginia, United States
Mayvin, Inc
Operate (ATOs) and other Risk Management Framework (RMF) functions, reviewing, analyzing, and interpreting cybersecurity policies, while also guiding and tracking the integration of cybersecurity engineering principles throughout system lifecycles. The incumbent will act as a trusted consultant to leadership, bridging the gap between compliance requirements, operational readiness, and technical solutions. Clearance Required: Active SECRET clearance. Responsibilities : Review … series, Clinger Cohen Act, and various Defense Acquisition polices. Advise program leadership on emerging cybersecurity directives, regulatory and statutory changes, and policy impacts to mission systems. Monitor and track system authorization (ATO) efforts under the NAVSEA Risk Management Framework and provide early warnings of issues or when progress may be off track. Monitor and track various data … calls for compliance in accordance with specific directives (OPORD, TASKORD, etc.). Conduct and review system and program risk assessments to identify cybersecurity risks and provide strategies for remediation and mitigation. Lead strategic initiatives to strengthen cybersecurity posture across programs, balancing operational effectiveness with security imperatives. Represent the program office in high-level working groups, interagency forums, and technical More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer Lead with Security Clearance

Springfield, Virginia, United States
MANTECH
monitoring, and continuous improvement of cybersecurity technologies and processes. Responsibilities include but are not limited to: Threat Detection & Response: Identify, assess, and report potential cyber-attacks, intrusions, and abnormal system behaviors. Participate actively in incident response and recovery activities. Technology Administration: Administer and maintain systems supporting Identity Management, Privileged User Access, Access Control (firewall), End Point Protection … Internet Protection, Vulnerability Scanning, and Security Information and Event Management (SIEM) tools. … Mitigation & Remediation: Develop and implement enterprise-level mitigation strategies to address complex vulnerabilities. Operational Support: Ensure proper installation, testing, patching, upgrading, and performance of cybersecurity tools and applications. Maintain system resiliency and availability across all managed technologies. Policy Enforcement & Compliance: Enforce cybersecurity policies, standards, and best practices in alignment with ManTech's security framework and regulatory requirements. Leadership & Collaboration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Defense Incident Responder - Senior with Security Clearance

Washington, Washington DC, United States
ECS
remediation and capabilities enhancement. Leverage multi-source Cyber Intelligence to bolster cybersecurity posture. Effectively lead and advise Security Operations and Infrastructure teams regarding threats and vulnerabilities mitigation procedures and system(s) enhancement(s). Meet/exceed/expand customer mission requirements, goals, and vision. Coordinate and communicate with multi-partner teams/services regarding 24/7 security … collected by network tools (e.g., Microsoft Defender, FireEye, Akamai and packet capture). Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), bandwidth/utilization management and directory services. Measure, analyze and tune network performance, confidentiality, integrity, and availability. Experience with network data structures and models (e.g., Open … System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ). Certifications/Licenses: Bachelor's degree or higher 7+ years' experience in network management and experience directly performing configurations and security implementation on LAN and WAN equipment. Certifications addressing system security, network infrastructure, access control, cryptography, assessments and audits, and organizational security. More ❯
Employment Type: Permanent
Salary: USD 136,000 Annual
Posted:

Senior Project Analyst with Security Clearance

Washington, Washington DC, United States
Falconwood
coordination with EII subject matter experts (SMEs) to accuracy verification and validation of all application information in Department of the Navy Application and Database Management System (DADMS). Support N2N6 in organizing and executing routine FAM Lead and EII Working Group meetings/teleconferences to continue to enhance the lines of communication and to execute … FAM PfM at the enterprise, functional and EII levels. Support the Navy Information Technology Approval System (NAV-ITAS) process by assisting N2N6 in reviewing Information Technology Procurement Requests (ITPR) including and Server Hardware requests and all IT requests greater than $500K. Ensure the executive summary meets all applicable requirements for request submission, all data is … required to evaluate the fiscal, technical, capability gaps, redundancies, and business efficiencies by researching existing data and interfaces that would facilitate data sharing between Planning Budget Information System - Information Technology (PBIS-IT), DADMS, DITPR-DON, and ITPR processes. Support N2N6 in managing the Enterprise Services (ES), Command and Control (C2), Weapons Planning and Control (WPC More ❯
Employment Type: Permanent
Salary: USD 500,000 Annual
Posted:

Data Modeling & Business Intelligence Analyst with Security Clearance

Norfolk, Virginia, United States
SPA
and data pipelines to verify accuracy and functionality. Ensure compliance with organizational, NATO, industry, and regulatory standards for data storage, reporting, and access control. Collaborate with business analysts, developers, system administrators, and end users to capture requirements and translate them into technical specifications. Identify opportunities for automating repetitive data preparation, reporting, and integration tasks to improve efficiency and reduce … modelling, database administration, and BI development. 2+ years of experience performing these tasks in IBM-ELM and the IBM database environment (Db2), including the relational database management system (RDBMS). Demonstrated expertise with Enterprise Data and Analytics and Publishing tools: IBM-ELM, IBM Rational Publishing Engine (RPE), Oracle, MS SQL Server, and BI tools such as Power … BI and Oracle BI. Bachelor's degree in Computer Science, Information Systems, or a related field. Demonstrated experience with data integration, ETL processes, and system interoperability in enterprise environments such as Open Services for Lifecycle Collaboration (OSLC) (API development and management), and experience with Requirements Interchange Format (ReqIF) for information exchange across the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Engineer Lead with Security Clearance

Springfield, Virginia, United States
MANTECH
through the administration, monitoring, and continuous improvement of cybersecurity technologies and processes. Responsibilities include but are not limited to: This position serves as the Lead IT Security/Information Assurance Officer and must demonstrate possession of strong information technology security … skills, troubleshooting skills, and a strong understanding of the JSIG to include associated policies and regulations. Threat Detection & Response: Identify, assess, and report potential cyber-attacks, intrusions, and abnormal system behaviors. Participate actively in incident response and recovery activities; Mitigation & Remediation: Develop and implement enterprise-level mitigation strategies to address complex vulnerabilities. Technology Administration: Administer and maintain systems supporting … Scanning, and Security Information and Event Management (SIEM) tools. Operational Support: Ensure proper installation, testing, patching, upgrading, and performance of cybersecurity tools and applications. Maintain system resiliency and availability across all managed technologies. Policy Enforcement & Compliance: Enforce cybersecurity policies, standards, and best practices in alignment with ManTech's security framework and regulatory requirements. Leadership & Collaboration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

(J-6 IO Domain) Senior Identity and Endpoint Engineer, Tier-3/4 with Security Clearance

San Antonio, Texas, United States
ASRC Federal
deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments New and emerging information technology (IT) and cybersecurity technologies System life cycle management principles, including software security and usability Application vulnerabilities Cryptography and cryptographic key management concepts Penetration testing principles, tools, and techniques Industry technologies … and how differences affect exploitation/vulnerabilities Information technology (IT) supply chain security and risk management policies, requirements, and procedures Local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology IT ) for safety, performance, and reliability) Relevant laws, policies, procedures, or governance related to critical infrastructure … engineering process; applying and incorporating information technologies into proposed solutions; and using scientific rules and methods to solve problems Researching current technology to understand capabilities of required system or network Researching and evaluating available technologies and standards to meet customer requirements Identifying cyber capabilities strategies for custom hardware and software development based on mission requirements Collaborating with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Subject Matter Expert IV&V (onsite, DMV area) with Security Clearance

Washington, Washington DC, United States
ICF
ensure compliance with industry standards. The successful candidate will have relevant experience and a documented record of working in IV&V. They will demonstrate a strong understanding of Agile System Methodologies, preparing and reviewing workplan progress, and developing standard operating procedures for testing. Additionally, the candidate will possess knowledge of federal and state compliance requirements for child support enforcement … the quality of requirements for building test cases and scenarios. Execute acceptance tests for maintaining changes to all federal systems and document test results in detailed test reports. Maintain system test beds and develop additional test beds as new systems are developed, ensuring they are in sync with software releases. Conduct ad hoc testing, regression testing, and vulnerability testing … and systems operations staff to assess testing impact and provide required input to the release management process. Identify risks and coordinate across teams, represent IV&V at system workgroup meetings, and assess testing impact of system changes for Release Management. Coordinate vulnerability testing with the security team, collaborate with Program Support, Systems development, and Systems Operations More ❯
Employment Type: Permanent
Salary: USD 166,088 Annual
Posted:
Management Information System
10th Percentile
£26,250
25th Percentile
£32,758
Median
£48,924
75th Percentile
£73,307
90th Percentile
£92,500