DirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS provides innovative information technology solutions to government clients through the knowledge and expertise of our dedicated employees. DVS is an employee-centric employer that provides competitive compensation, comprehensive medical plans, 401k match, PTO accrual, professional development … Lead Incident Responder to manage and maintain critical security documentation and ensure compliance with government standards for various systems. The ideal candidate will have extensive experience in risk management, incident response, and vulnerability assessment within a government contract setting. This role involves creating, updating, and overseeing security documentation, policies, and processes for about 63 systems, conducting annual Security … Department of Labor's Computer Security Incident Response Capability (CSIRC). Key Responsibilities: Security Documentation Management: Develop, maintain, and update critical security documentation, including privacy assessments and system security plans, ensuring full compliance with government standards. Security Policy Oversight: Manage security policies and procedures, conduct risk assessments, and ensure training compliance for all InformationSystemMore ❯
across business units (e.g., sales, finance, security, compliance) to develop analyses and documentation, ensuring effective and efficient communication with production, managerial, and executive teams. Continuously evaluate, analyze, and communicate system requirements, maintaining processes and providing monthly status reports to all relevant parties. Write and update both internal and external documentation, formally initiating and delivering requirements and documentation. Conduct daily … system analysis to optimize effectiveness and resolve issues. Foster strong, long-term relationships with partners to enhance systems integration, addressing questions and concerns from managers and executives with well-researched insights and recommendations. Promote awareness of requirements across business units and identify inefficiencies in system processes by analyzing real-time data. Act as a thought leader for technical … business processes, designing system prototypes that enhance efficiency and productivity across multiple levels. Develop and execute detailed management plans for each project, ensuring clear communication at all levels. Conduct thorough quality assurance at every stage of system development, evaluating and communicating results. Identify and define user requirements for systems in production to ensure optimal usability. Required More ❯
integration. Assist the Government team with annual budget loads, Continuing Resolution (CR) adjustments, and special budget requirements. Troubleshoot, resolve, and mitigate reported technical issues. Design and maintain the overall system architecture, including back-end database structures. Develop and optimize application functions and procedures. Build dynamic, data-driven web applications using Oracle APEX. Conduct development-level testing and support system demonstrations and training activities. Administer the production database, monitor system errors, and address bug reports. Design and develop prototype applications to demonstrate new features and enhanced functionality. Collaborate with subject matter experts (SMEs) to enhance system capabilities and develop policies and procedures that improve financial management for the client. Requirements: Qualifications/Requirements Must be … development methodology. Demonstrated understanding of application development, testing, and troubleshooting. Experience designing and implementing data-driven web applications. Experience conducting development-level testing, debugging, and validation. Ability to support system demonstrations, user training, and documentation. Strong problem-solving skills with the ability to troubleshoot and resolve issues efficiently. Ability to work with client SMEs, stakeholders, and technical teams to More ❯
analyze, and document both functional and technical requirements, ensuring new enterprise systems meet core mission and user needs. You will translate complex legacy documentation, perform gap analysis, and validate system solutions to deliver the next generation of DoD technology. Key Responsibilities: • Elicit and document requirements via interviews, document analysis, site visits, use cases, and workflow analysis • Analyze, interpret, and … translate customer business needs, including reading and understanding dense legacy system documentation (e.g., COBOL) • Decompose high-level information into actionable detail, develop user stories and process flows using BPMN standards • Communicate and collaborate with internal/external teams to ensure Agile requirements are implemented, and technical information is clear to all audiences • Support validation and … and requirements efforts Qualifications: • BA/BS/MS in a relevant field (e.g., engineering, computer science, business) • Minimum 3 years' experience as a requirements analyst for software/system implementations • Analytical, project management, and collaborative skills; experience supporting Agile or Scrum teams • Highly skilled in stakeholder communication, documentation, and translating technical concepts • Familiarity with BPMN, Agile More ❯
Position Title: InformationSystems Security Officer (Junior to Mid-Level) Job Category: Corporate Security Work Location: Fairfax, VA Minimum Clearance: TS SCI w/CI Poly Zeta Associates, Inc. (a Lockheed Martin Company) is looking for a highly motivated individual to serve as an InformationSystems Security Officer (ISSO) in our Fairfax location. The individual will … from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). Develops documentation in support of Risk Management Framework (RMF) processes; operating procedures, and policies; Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Operating within cleared environments performing Information Assurance … coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits; Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed; Perform Media management activities, handle and have familiarity with controlling, labeling, virus scanning solutions-software and More ❯
Street Norfolk, Virginia 23511 Clearance Level: Active DoD - Secret Required Certification(s): DoD IAM Level II Certification. Certified Authorization Professional (CAP), CompTIA Advanced Security Practitioner (CASP+) CE, Certified Information Security Manager (CISM), Certified InformationSystems Security Professional (CISSP) or Associate, GIAC Security Leadership Certification (GSLC) or Higher-level certification. SUMMARY Provide the Military Sealift Command (MSC … is being collected, processed, transmitted, stored, or disseminated. JOB DUTIES AND RESPONSIBILITIES The ISSO Team Lead support includes: Managing the security of all IT through the complete system development life cycle, that is acquired, developed, or used. Managing the security of all informationsystems in a cost-effective manner, guided by the application of sound … risk management processes that ensure a level of confidentiality, integrity, and availability of information in each phase of the system development life cycle. Conducting periodic assessments and reviews to verify compliance with applicable DoD, DoN and MSC policies that process, store, or transmit MSC Business Systems data. Investigating information security incidents through incident More ❯
enterprise data systems and reporting solutions to support strategic decision-making, operational efficiency, and compliance with organizational and regulatory standards. This role combines deep technical expertise in data modeling, system interoperability, and business intelligence with strong analytical, communication, and stakeholder engagement skills JOB RESPONSIBILITIES: Data Modeling and Repository Architecture: Design, implement, and maintain logical and physical data models, database … and functionality. Data Governance and Compliance: Ensure compliance with organizational, NATO, industry, and regulatory standards for data storage, reporting, and access control. Stakeholder Engagement: Collaborate with business analysts, developers, system administrators, and end users to capture requirements and translate them into technical specifications. Process Automation: Identify opportunities for automating repetitive data preparation, reporting, and integration tasks to improve efficiency … and reduce manual effort. Cross-System Reporting: Integrate data across multiple systems to deliver unified, cross-domain analytics and reporting solutions. User Training: Deliver training sessions, documentation, and user guides to ensure effective adoption and utilization of BI tools, database systems, and reporting solutions. Technical Support: Provide ongoing technical support and troubleshooting for data systems, BI tools, and associated More ❯
Navy, Norfolk, Virginia. Experience Requirements: Must have experience in a Quality Assurance role. Ten (10) or more years of experience in a managerial role in work involving Quality Management and Quality Audits. Must have some managing experience. Must have requirements analysis and software programming experience. Must establish and maintain a process for evaluating software and associated documentation. Must … Digital Program Office (DPO) SDLC tools like Service Now, Azure Dev Ops, Mendix, UIPath, Katalon and Database Programming - schema design, architecture, performance tuning, SQL scripting, database consolidation, database migration, system backups and database admin. Application Test and Evaluation, particularly unit testing and integration testing. Asset Management: government documents, hardware, software (to include license agreements) Modification/maintenance … integration of an interfaced enterprise solution of GOTS software products Information Assurance - DoD/DoN IA requirements and industry best practices. IT Infrastructure Support - hosted environment operations. System Administration - sys admin, help desk support, trouble ticket resolution. Scaled Agile Framework (SAFe) certifications Project Management Professional (PMP) certification Educational Requirements: Master's Degree preferred in an More ❯
This position is contingent on contract award Description: Responsible for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide … level corporate officers to assist in defining and achieving required risk management objectives for the organization Qualifications: Eight (8) years of experience as an IT Risk Assessor, System Security Engineer, InformationSystems Security Manager or DAO in programs and contracts of similar scope, type and complexity is required. A Bachelor's Degree in Computer Science … Engineering. In lieu of a Bachelor's degree, an additional four (4) years of experience for a total of twelve (12) years. Working knowledge of the following is required: system security design process, defense-indepth/breadth, engineering life cycle, information domains, cross-domain solutions, controlled interfaces, identification, authentication and authorization, system integration, ICD 503 (formerly More ❯
One of our premier clients is is looking for a highly motivated individual to serve as an InformationSystems Security Officer (ISSO) for a Full-Time role in their Fairfax, VA. headquarters. The individual will be responsible for assisting the ISSM/ISSO within Zeta's facilities to ensure compliance with Intelligence Community (IC) and Department of Defense … from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). • Develops documentation in support of Risk Management Framework (RMF) processes; operating procedures, and policies; • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Operating within cleared environments performing Information Assurance … coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits; • Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed; • Perform Media management activities, handle and have familiarity with controlling, labeling, virus scanning solutions-software and More ❯
PACS) Install, configure, and maintain PACS hardware, controllers, readers, and associated devices. Deploy PACS software platforms and integrate with enterprise systems (e.g., identity managementsystems). Conduct system testing, troubleshooting, and validation of access control deployments. On-Premises Infrastructure Design, build, and manage virtualized server environments (VMware, Hyper-V, or equivalent). Configure networking, storage, and compute … resources for lab and test environments. Maintain system documentation, including as-built configurations and architecture diagrams. Cloud Environments Deploy, configure, and administer test and development workloads in Microsoft Azure and Amazon Web Services (AWS). Implement cloud-native tools for automation, monitoring, and scaling. Support hybrid integration between on-prem and cloud-based systems. General Lab Support Maintain a … vSphere, Hyper-V, or similar). Cloud platforms: Microsoft Azure and AWS (certifications preferred). Strong understanding of networking fundamentals (TCP/IP, VLANs, firewalls, VPNs). Experience with system integration, troubleshooting, and technical documentation. Preferred: Experience working with PACS vendors (e.g., Lenel, CCURE 9000, Identiv, HID). Familiarity with enterprise identity and access management (IAM/ More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
provides functional and strategic support for Watermark Faculty Success and associated systems and processes. This position plays a critical role in supporting faculty data management, reporting, and system administration for Academic Affairs. Reporting to the Associate Provost of Analytics and Assessment, the Analyst works collaboratively with University Information Technology, Academic Human Resources, the Office of … of Watermark Faculty Success and associated faculty activity systems to support institutional needs, data integrity, and reporting capabilities. Gathers, analyzes, and documents business requirements, current and future workflows, and system specifications. Partners with stakeholders to recommend and implement process improvements. Coordinates and executes testing of new features, data elements, and system upgrades to ensure alignment with UMass Amherst … quality assurance, and documentation of outcomes. Collaborates with technical leads and developers to design and maintain scalable, supportable technical solutions aligned with university IT standards. Develops and maintains comprehensive system documentation, including setup specifications, interface definitions, business logic, and training materials to ensure continuity and effective onboarding. Serves as the primary support contact for users of Watermark Faculty Success More ❯
experience with ITIL framework and ITIL-based processes, to include continual service improvement, change management, and problem investigation. Have previous work experience as a Windows/Linux System Administrator supporting a large Enterprise with knowledge of Microsoft Active Directory, Windows 2008/2012, Linux/UNIX Operating Systems, EMC Storage, Symantec NetBackup and SCCM Patch Management … cryptographic devices. Have experience with Cyber-defense or information assurance, including experience with DISA mandated security tools to include Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), analyze results and create reports Have Network Operations experience in a network operations center or other 24x7x365 IT Operations environment. Have knowledge of IT Network Operations and connectivity … devices that inter-relate with Public Key Infrastructure authentication and Information Security practices. Have knowledge of Cybersecurity principles and how to execute system/network security analysis. Have a working knowledge of Tier III Information Assurance practices, IT security governance, security administration, project management, logistics, and Cybersecurity compliance requirements. This position is expected More ❯
This position is contingent on contract award Description: Identify overall security requirements for the protection of data to ensure the implementation of appropriate information security controls. Provide analysis of customer mission needs to determine functional testing requirements. Work with security control assessors on systems … testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for InformationSystems or programs to ensure InformationSystem Security policies, standards, and procedures are followed. Enable System Security Planning and collaborate with engineers on system integration. Perform functional analysis to identify critical Cybersecurity tasks required … and their interrelationships. Analyze customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of System Security Plans (SSPs) in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation that affect Cybersecurity requirements Collaborate with Security Control Assessors to identify and execute systemMore ❯
leveraging the latest technologies to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in multiple disciplines including program management, system integration, system design, system development, cybersecurity, infrastructure, and data analytics. LTS is committed to offering eligible employee's comprehensive benefits that will provide them with options intended … artifacts and services are delivered as they were designed. • Provides and delivers ad-hoc presentations and briefings, including development of agendas and capturing minutes for these events. • Provide monthly system performance metrics, such as: o Remedy tickets aging report with the following status: resolved, pending, and open. o Response time (best, worst, average) o Peak concurrent number of end … users o Total number of end-user population at the end of the month o System availability (uptime hours, scheduled outage, unscheduled outage, and percent availability) Required Skills & Qualifications: • Eight (8) or more years of relevant experience in an Enterprise IT environment. • Certified Scrum Master (CSM) or Professional Scrum Master I (PSM I) certification with 3+ years of experience More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Columbia Technology Partners
requirements and documents test results. Resolves software problem reports. Utilizes software development and software design methodologies appropriate to the development environment. Provides specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development, and … requirements analysis and synthesis from system level to individual software components. Analyze user requirements to derive software design and performance requirements Debug existing software and correct defects Provide recommendations for improving documentation and software development process standards Design and code new software or modify existing software to add new features Integrate existing software into new or modified systems or … operating environments Develop simple data queries for existing or proposed databases or data repositories Write or review software and system documentation Serve as team lead at the level appropriate to the software development process being used on any particular project Design or implement complex database or data repository interfaces/queries Develop or implement algorithms to meet or exceed More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Koniag Government Services
Koniag Professional Services is seeking an experienced Data Architect/Data Analyst to support our client, the Department of Health and Human Services (DHHS), Office of the Chief Information Officer (OCIO) in developing a secure, scalable, and integrated Human Capital Management solution built on PeopleSoft or other identified technologies that consolidates core HR functions into a … Employee/Manager/HR Self-Service, and Enterprise Business Intelligence capability. The solution will be compliant with federal cybersecurity, records management, and accessibility standards, to improve system performance, user satisfaction, and long-term sustainability of HR services. This role is critical for maintaining, enhancing, and optimizing HCM applications that support essential administrative and operational functions across … solutions to support business intelligence and operational insights. Create and maintain technical documentation for all configurations, customizations, and integrations. Collaborate with functional analysts, DBAs, and infrastructure teams to optimize system performance and reliability. Support upgrades, patches, and maintenance activities with minimal operational disruption. Apply federal compliance best practices, including security (NIST), accessibility (Section 508), and records management. Provide mentorship More ❯
Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None The Opportunity: We are seeking a highly skilled and motivated IT System Engineer (SE) to join our technical team. As an IT System Engineer, you will be responsible for designing, implementing, and maintaining the infrastructure that powers our operations. Your … expertise will ensure the stability, security, and efficiency of our IT systems. This role requires a proactive problem-solver with a deep understanding of system architecture, network management requirement management processes. The ideal candidate will have prior experience with capturing customer requirements, designing and implementing enterprise level system such as ServiceNow. Responsibilities: • Design and … develop ServiceNow system architecture, including hardware and software components, to meet functional requirements. • Collaborate with cross-functional teams to gather, analyze, and manage system requirements, ensuring alignment with business objectives. • Document system requirements, configurations, procedures, and best practices. • Install, configure, and deploy server resources provided by third-party cloud services. and software updates. • Create technical documentation for More ❯
monitoring and analysis of security events, directing incident response efforts to mitigate threats. Coordinate with the InformationSystems Security Manager (ISSM) for comprehensive reporting and remediation strategies. System and Network Security: Ensure continuous assessment of network and system security postures, evaluating new technologies and system configurations for potential risks. Champion the implementation and management … Vulnerability Management (IAVM) and DISA VDP, prioritizing proactive risk management. Architecture and Policy Development: Advise on and refine cybersecurity architectures, tool configurations, and detection signatures to enhance system defenses. Develop and enforce security policies and protocols that ensure comprehensive protection against breaches and cybersecurity attacks. Qualifications Required: Minimum 5+ years of experience in Security Operations, with at … role. Proven experience managing systems in accordance with FISMA/NIST or similar regulatory frameworks, to include DoD mandates and guidance. Proficient understanding of TCP/IP, networking protocols, system administration, OSI model, Zero Trust, defense-in-depth strategies, and common security elements. Hands-on experience with Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network More ❯
experience in and/or with: Cyber security or related IT field. Cyber penetration testing. Leveraging adversarial tactics to conduct hands-on security testing. Applying computer attack methods and system exploitation techniques. Working knowledge of cyber security principles for Linux, Windows, and virtual platforms. Designing, testing, or implementing IT security architecture. Performing network security analysis. Analyzing network architectures. Using … network management tools. Developing risk management methodologies. Analyzing test results to develop risk and threat mitigation plans. Testing or reviewing system configuration, development, and design specifically around enterprise systems and hypervisors. Designing, testing, or implementing complex Windows installations. OTHER RESPONSIBILITIES shall include: Document all identified system risks, planned test procedures, and results. Perform analyses … of vulnerabilities identified during testing. Review program-level documentation such as requirements specification, system architecture, design documents, test plans, and security plans. Create and document penetration testing plans and procedures. Conduct hands-on penetration testing by leveraging approved testing plans and procedures. Analyze penetration test results, document risks, and recommend countermeasures to uncovered risks. Participate or lead technical exchange More ❯
overall; consisting of several complex on premises compute environments that form the backbone for the operational deployment of a critical, strategic national asset; communicate any risks or issues involving system performance, availability, or security. In addition, these Infrastructure Engineers will be process oriented such that they work with the team on fixes while ensuring that any changes follow the … Technology Engineering Math (STEM) in Computer Science, Computer Engineering, Information Technology or Physics and 2+ years of related work experience. • Experience with Windows and/or Linux System Administration. • Experience in COTS product installation for Hardware and Software products. • Experience with software installation and configuration and O/S builds. • Scripting skills (i.e. PowerShell, Python, Ruby, bash … networks, storage, and virtualization (VMware). • Experience with MS Visio for documentation. • Current existing Security Plus Certification. • Experience with Agile Development Methodologies (E.g. scrum, SAFe). • Proficiency in matching system requirements (specific user or VM requirements) to compute capabilities (RAM, single-threaded speed, total throughput) and the knowledge and ability to select specific types of compute servers to meet More ❯
InformationSystems Security Officer (Junior-Level) Location: Fairfax, VA. Required Clearance: Top Secret/SCI with CI Poly Since 1999, ITEC has been a powerhouse in supporting mission-critical programs for the DoD and Intelligence community, building a solid reputation along the way. At ITEC, we don't just care for our employees-we champion them with competitive … to be a US Citizen and will be subject to a background investigation. Job Description: ITEC is looking for a highly motivated individual to serve as a Junior InformationSystems Security Officer (ISSO) in our Fairfax location. The individual should have 1-2 years of experience and will be responsible for assisting the ISSM/ISSO within the … coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits. Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. Perform Media management activities, handle and have familiarity with controlling, labeling, virus scanning solutions-software and More ❯
of various enabling technologies. The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk … assessor's judgement. The Contractor shall apply consistent and systematic investigative practices to comprehensively assess risks, identify and characterize threats and vulnerabilities. The Contractor shall evaluate system or network operations using network management platforms, network scanning tools, auditing functions, PCAP captures, and log reviews. The Contractor shall analyze system, network, or cloud configurations for mis-configured … settings, configurations not required for deployment, removal of test scripts to minimize the configuration to fulfill the specific deployment. The Contractor shall analyze hardware and software used in a system or network for origin of manufacturer, known vulnerabilities, outdated hardware or software. The Contractor shall remain current with existing and future technologies to assist the Sponsor with identifying associated More ❯
growth markets. Responsibilities The Network Engineer 5 is responsible for designing, implementing, monitoring and managing the network solutions for the customers to ensure maximum uptime. The role includes designing system configurations, documenting and managing the pre-installation and testing of a new network, and performs upgrades to hardware and software as required. Technical Responsibilities: Survey Reports measurement results in … any surveys, inspections, tours, etc. of client sites, as required Design: Install, configure, and maintain network services, equipment, and devices. Work closely with the field engineers to simulate expected system level performance and provide quick feedback on potential improvement Assist senior network engineers to identify and resolve network security issues. Develop network designs for each SLA classification. Originates design … testing/commissioning procedures Preparation of test reports Commissioning of deployed systems Development of test fixtures and simulation devices Generates standard PITCO plans and procedures. Design and perform complete system integration test Service & Maintenance: Troubleshoot and debugging complex network problems and recommending operational efficiency improvements Preventative maintenance (software/hardware/firmware upgrades) including security updates, performance upgrades and More ❯
the Government. The Developer will develop applications of large and complex software (and systems) and web-based query and reporting systems. The day-to-day responsibilities include: Contribute to system-level design and partitioning in order to optimize overall system performance and reliability Translate detailed design into computer software Test, debug, and refine computer software to produce the … Foundation (WPF) HTML JavaScript Microservices Architecture Capable of identifying technical strategies to interpret disparate software applications by authoring original software programs Can lead all phases of software development, including system design, analysis, architecture, and engineering; programing, designing, analyzing, coding, impletemention, documentation, and testing. Have experience on an agile team and adhere to agaile methodologies; Creating project work estimates. Implementing … management, and user interface development Utilizing available Commercial Off The Shelf (COTS) software to the maximum extent practicable in designing software applications, avoiding implementation of a proprietary system Knowledge of current Federal Information Security Management Act of 2002 (FISMA) Strong interpersonal attributes required: The ability to effectively communicate verbally and written ideas and More ❯