and as a member of an agile team. The software engineer will actively participate in program increment planning and related team activities. The individual will analyze and study complex system requirements, use design software tools, provide support using formal specifications, data flow diagrams, and other accepted design techniques with the use of Computer Aided Software Engineering (CASE) tools and … will use sound software engineering principles to ensure that developed code is modifiable, efficient, reliable, understandable, fault tolerant, and reusable. The individual will provide software process management and control throughout the coding portion of the software development process. Additionally, the individual will promote code reuse and cross-program collaboration while reducing maintenance costs by creating common functions and … related discipline. Experience with the following: JEE (EJB, JPA, JTA, JAX-B, JAX-RS, JAX-WS), SQL, application servers (Tomcat, WebLogic, JBoss), scripting. Experience with high level requirements management including requirements decomposition, secure systems engineering and development, trade-off analysis, interface control, and testing and continuous integration. Experience in software development on Agile teams using Agile Developer practices More ❯
to assure actual expenditures do not exceed authorized amounts. Prepare studies and/or analysis for further identification of funding requirements or for presentation of funds status. Perform management studies and reviews pertaining to issues involving mission, organization, functions, and productivity management. Interpret findings for studies having significant impacts and for development of constructive recommendations for solving management … Issue Sheets/Impact Statements/Reclamas/Information Papers Coordinate and develop Acquisition Strategy Reports, Budget Exhibits, Budget Execution and Planning, Integrated Master Schedule (IMS), Weapon System Reviews, and Programmatic Risk Reviews. Coordinate with all internal and external stakeholders to ensure all actions are occur timely, accurately, and in line with the plan. Develop budget implementation … Requirements Active DoD TS/SCI Clearance BA or BS degree or equivalent is preferred Must have 4+ years of experience Must have experience with General Fund Enterprise Business System (GFEBS) Must have experience using Microsoft Office, including Word, Excel, and PowerPoint Must have excellent interpersonal skills, proven verbal and written communications, and the ability to work on multi More ❯
Participate in the complete software development lifecycle: user story creation, design, development, automated testing, and operational support. Create intuitive user interfaces that enable efficient data management and system oversight. Design and develop new visualization features to meet evolving end-user requirements. Work with complex algorithms to deliver optimized solutions for the end user. Determine software maintainability and … and tooling recommendations. Mentor team members by sharing innovative ideas and industry best practices. Qualifications Secret Security Clearance Required Experience and Education: BS degree in Computer Science or InformationSystems; other degrees will be considered with relevant work experience. Must have min. 5 years of experience. 7 years of software development, including architecture, object-oriented design, coding, and More ❯
including senior management. Implement infrastructure and cyber security controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas ; leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Join us. The world can't wait. You Have … 3+ years of experience supporting the Information Technology ( IT ) systems for a DoD or government agency 3+ years of experience supporting Navy Risk Management Framework ( RMF ) , including Assessment and Authorization ( A & A ) activities, direct development of RMF artifacts, and deliverables across all Steps 3+ years of experience performing cybersecurity compliance testing using industry standard tools, including … Secret clearance Master's degree OS certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; Secret clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life More ❯
for the Global Solution Management - Operations II (GSM-O II) contract. This contract includes the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense InformationSystem Network (DISN) within the DOD Information Network (DODIN) in support of the Defense InformationSystems Agency (DISA). It also includes support to other key More ❯
API, and Flow Designer. Design and implement integrations between ServiceNow and external systems using REST/SOAP APIs. Support and enhance existing ServiceNow applications (e.g., ITSM, CMDB, Change Management, Incident/Problem/Request). Collaborate with project leaders, business analysts, and stakeholders to gather requirements and propose technical solutions. Troubleshoot technical issues and provide timely resolutions. Implement … Systems, or related field OR High school diploma or GED equivalent with 7+ years of relevant experience 3+ years of experience with ServiceNow development and administration. Required - ServiceNow Certified System Administrator (CSA) or higher (e.g., Application Developer, Implementation Specialist). Proficient in JavaScript, HTML, CSS, and working with ServiceNow's Glide API. Experience with ServiceNow modules such as ITSM … CMDB, and custom application development. ServiceNow platform best practices and system performance tuning. Strong understanding of SDLC, Agile methodologies, and DevSecOps pipelines. Active TS/SCI clearance (required upon start). Knowledge, Skills, and Abilities: Excellent problem-solving and communication skills. Preferred - Implementation Specialist, Certified Application Developer. Experience with platform security configurations (e.g., ACLs, roles, encryption). Preferred - Experience More ❯
We are seeking a Risk Management Framework (RMF) specialist to support the Assessment and Authorization process for the Military Health System's Planning, Programming, Budgeting and Execution (PPBE) Tool (MP2BET). MP2BET facilitates data standardization, transparency and information sharing between PPBE throughout the Defense Health Program (DHP) enterprise. Key Responsibilities: Demonstrate proficiency in the PPBE … Action and Milestones; Risk Determination; Risk Response; Authorization Decision and Authorization Reporting. Work with the cybersecurity team to develop and maintain comprehensive security documentation required for ATO packages, including System Security Plans (SSP), Security Assessment Reports (SAR), and Plans of Action and Milestones (POA&M) Qualifications: Three (3) to five (5) years of relevant experience in RMF Active secret … security clearance Bachelor's degree in Computer Science, Information Security, or related field. Certification required: CompTIA Security+ Strong technical background in network and operating system security. Experience in security documentation and vulnerability remediation. Experience with NIST 800-53. Excellent analytical, problem-solving, and communication skills. Additional Requirements: Proven track record of meeting deadlines and efficiently managing More ❯
leadership and external government stakeholders • Work closely with other team members to design, implement, and optimize UC solutions • Collaborate with cross-functional teams, including network engineers, security specialists, and system architects • Assess client needs, recommend architecture improvements, and ensure seamless communication across domains • Specialize in UC technologies such as Cisco Unified Communications Manager (CUCM), Cisco Meeting Server (CMS), Cisco … Unified Border Element (CUBE), and other UC technologies such as Cisco Expressways • Design and manage VQ Conference Manager or other conference management tools • Advise the UC, Network, and Systems engineering teams, and cyber security experts on voice and video communications solutions • Ensure communication tools are integrated seamlessly and meet security requirements • Address challenges related to data flow, security … policies, and interoperability Qualifications - External Required Qualifications: • Subject Matter Expert in UC design, Edge services, Endpoints and user management, Configuration, Troubleshooting, and Integration with other systems • Expert with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint. • Bachelor's or Master's degree in Electrical Engineering, Computer Engineering, InformationSystems, or related technical field. • Minimum More ❯
Establish IT policies, standards, and procedures in line with best practices and regulatory requirements. Lead efforts to ensure compliance with data protection laws (e.g., GDPR). Oversee risk management, disaster recovery planning and assist in business continuity planning Responsibility for day to day management of health, safety and environment as pertaining to the IS department, adhering … their needs and develop priorities for new initiatives and manage a programme of projects to deliver them. Profile Qualifications & Experience: Essential Bachelor's or master's degree in information technology, Computer Science, Business InformationSystems, or a related field. Progressive experience in IT leadership roles, including at least 5 years at a senior/executive level … with overall budgetary responsibility, including managing external providers. Proven experience in enterprise IT management, systems integration, cybersecurity, and digital transformation. Strong knowledge of IT governance frameworks (e.g., ITIL) and compliance standards. Experience managing IT operations across multiple sites or business units is highly desirable. Desirable Knowledge of the heavy building materials, logistics and construction industry Experience of the More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thales Group
Location: Reading, United KingdomThales people architect identity management and data protection solutions at the heart of digital security. Business and governments rely on us to bring trust to the billons of digital interactions they have with people. Our technologies and services help banks exchange funds, people cross borders, energy become smarter and much more. More than … computer science (or Information Technology related field) Experience of software development (server-side development) Experience with deployment and maintaining of highly available solutions on AWS Experience in system integration and deployment of cloud-based technology (IaaS, Docker, Kubernetes, OpenStack, monitoring system, authentication system, repository) Experience of writing infrastructure as a code (IaC) using Terraform Experience … in various database repository model (SQL, NoSQL, S3, NAS) as a designer or administrator Experience in a large and complex distributed system with high availability and high scalability (using an application server, message-broker service, streaming, load-balancing) Experience in the network protocol (SOAP/REST, HTTP, TCP/IP, DNS, VPN, WAF, RTCP) Strong experience in Infrastructure as More ❯
position will conduct security event monitoring, advanced analytics and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, this candidate must be familiar with intrusion detection systems, intrusion analysis, security information event … management platforms, endpoint threat detection tools, and security operations ticket management. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information … Must have strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis Experience and ability to with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. More ❯
Koniag Management Solutions, a Koniag Government Services company, is seeking an IT program Manager with a Top-Secret clearance with the ability to obtain a SCI to support KMS and our government customer in Washington, DC. This position is for a Future New Business Opportunity. We offer competitive compensation and an extraordinary benefits package including health, dental and … vision insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more. Koniag Management Solutions, a Koniag Government Services company, is seeking an experienced IT Program Manager to oversee critical national security programs and lead technical teams supporting our government client. This senior-level position requires an active Top-Secret clearance with … eligibility to obtain SCI access. The role demands excellence in program management, technical leadership, and stakeholder engagement. This position is based in Washington, DC. Essential Functions, Responsibilities & Duties may include but are not limited to: The IT Program Manager will serve as the primary liaison between the government customer and contractor staff, ensuring delivery excellence across multiple concurrent More ❯
including a competitive salary; medical, dental, vision, life and disability insurance; paid-time off; and retirement benefits. MEG is a leading provider of InformationManagementsystem engineering, software development, information assurance, system sustainment and is the primary provider of technical support for the Integrated Broadcast Service (IBS) Enterprise. IBS is the worldwide … scripts to validate functional and non-functional requirements. • Perform manual and automated testing of web-based and desktop applications in both development and operational environments. • Collaborate closely with developers, system engineers, and other stakeholders to identify test requirements and uncover root causes of defects. • Execute regression, integration, system, and performance testing across multiple platforms and configurations. • Analyze test … as Python, Bash, or JavaScript for test automation. • Hands-on experience with test automation software and frameworks (e.g., TestComplete, Selenium, Cypress, Robot Framework). • Understanding of network protocols and system-level troubleshooting. • Exposure to DevOps practices and CI/CD toolchains (e.g., Jenkins, GitLab CI). • Top Secret/SCI (TS/SCI) security clearance More ❯
holidays, three weeks paid time off, and more. Essential Functions, Responsibilities & Duties may include, but are not limited to: Provides advanced expertise and leadership in identity engineering and management services for the Defense Health Agency's extensive and complex IT infrastructure. Serves as a key specialist responsible for designing, implementing, and optimizing identity and access management … s global network of military hospitals, medical clinics, and dental clinics. Leads the development and implementation of comprehensive identity engineering strategies that align with DoD cybersecurity requirements, Risk Management Framework (RMF), NIST guidelines, and various DoD strategies including Zero Trust, ICAM (Identity, Credential, and Access Management), and Digital Modernization. Ensures these strategies are effectively implemented across … physical and virtual servers, and 250 sites worldwide. Designs and oversees the implementation of advanced IAM architectures, including single sign-on (SSO), multi-factor authentication (MFA), privileged access management (PAM), and identity governance and administration (IGA) solutions. Ensures seamless integration of these systems with DHA's existing IT infrastructure and security controls. Develops and implements identity lifecycle managementMore ❯
s vital interests. Requisition #: DEPUT003854 Job Title: Deputy Program Manager Location: 471 East C Street Norfolk, Virginia 23511 Clearance Level: Active DoD - Secret Required Certification(s): Project Management Professional (PMP) Certification. SUMMARY Provide the Military Sealift Command (MSC) Business Systems Branch with program management, systems engineering, software development and integration, advanced data services, and customer … JOB DUTIES AND RESPONSIBILITIES Responsible for establishing guidelines for all programmatic aspects of contract performance under the leadership of the PMO, including but not limited to: IMS, Risk Management, Requirements Management, Cybersecurity, Enterprise Assurance and process measurement and control. Establish standards required for performance, establish policies and procedures required by the PMO, and support the PMO … in communicating with all levels of management across the Business Systems stakeholder community. QUALIFICATIONS Required Certifications Project Management Professional (PMP) Certification. Education, Background, and Years of Experience Bachelor's Degree in Engineering, Computer Science, Mathematics, ManagementInformationSystems, Project Management, or related field. 10+ years of demonstrated programmatic and managerial More ❯
Azure data services. Managing Dedicated SQL Pools: Efficiently manage and optimize Dedicated SQL Pools in Synapse to handle large-scale data warehousing and analytics workloads. Database Design and Management: Design, implement, and manage databases using Azure SQL and Azure Managed Instance, ensuring high performance, availability, and security. Data Integration and ETL Processes: Develop and manage ETL (Extract, Transform … they are scalable and optimized for performance. Ensuring Data Security and Compliance: Implement and oversee data security measures, ensuring compliance with legal and regulatory standards. Maintain procedures manuals and system documentation. Research software solutions to support recommendations, analyzing current and future technology trends These positions are to provide technical guidance and expertise in supporting the department in developing, architecting … and efficient data architectures. 11. Ability to provide excellent customer support; meticulous quality of work and work product Education: Bachelor s or Master's Degree in Computer Science, InformationSystems, or other related field. Or equivalent work experience. (Required) Certifications: Microsoft Dynamics 365 Certification (Desired) and MS Dynamics Power Platform Certifications (Desired More ❯
Onsite Data Management Specialist - Norco, CA Job Summary: We are seeking a highly skilled and detail-oriented Data Manager with an activeSecret Clearanceto oversee the management, protection, and analysis of sensitive data. The ideal candidate will have strong experience in data management, ensuring data integrity, and supporting data-driven decision-making processes in a … company policies as outlined by the Employee Handbook, communicating regularly with assigned supervisor(s), staying focused on the assigned tasks, and completing other tasks as assigned. Responsibilities: Data Management & Governance:Develop and maintain data management strategies to ensure accurate, secure, and compliant data storage and usage. Oversee data architecture, design, and flow within the organization. Define … data needs Provide training and support to junior data professionals and other team members Mentor and guide staff to ensure adherence to best practices and standards in data management Documentation & Reporting:Maintain accurate documentation of data management procedures, policies, and protocols Prepare regular reports on data performance, security, and compliance for senior management and More ❯
mission-critical environments. A passion for building reliable, maintainable, and user-focused software tools. Knowledge/Skills Knowledge of office administration and procedures. Exceptional judgment capabilities and relationship management skills. Excellent communication, teamwork, and client service skills; ability to clearly communicate in discussions and written documents, and to deliver feedback clearly and tactfully. Interact with a diverse array … and exceptionally detail oriented. Work well both independently and in a team environment. Be energized by a fast-paced work environment. Communicate well: listening, verbal, and written. Analyze information and respond appropriately. Manage time wisely and prioritize tasks. Provide superior customer service. Multi-task in a pleasant manner. Work well under pressure. Physical Demands The physical demands described … a technically diverse, 100% team member owned business, headquartered in Huntsville, Alabama specializing in missile and aviation systems engineering and logistic services, electronic warfare and electromagnetic effects analysis, UAS system integration and flight operations, full lifecycle C5ISR engineering services, cybersecurity and IT/IA innovative solutions and virtual training, simulation & serious game development and implementation. We have established a More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
features • Integrate existing software into new or modified systems or operating environments • Develop simple data queries for existing or proposed databases or data repositories • Write or review software and system documentation Knowledge or experience in the following; • DevOps, Automated testing and CI/CD pipelines in Git • Container and Container Management i.e. Ansible, Docker, Kubernetes and Rancher … and message queues • AI experience with regards to Human-Language Translation tools and techniques • RF algorithm development Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills … 880. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills as well More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
features • Integrate existing software into new or modified systems or operating environments • Develop simple data queries for existing or proposed databases or data repositories • Write or review software and system documentation Knowledge or experience in the following; • DevOps, Automated testing and CI/CD pipelines in Git • Container and Container Management i.e. Ansible, Docker, Kubernetes and Rancher … and message queues • AI experience with regards to Human-Language Translation tools and techniques • RF algorithm development Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills … 030. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/training, key skills as well More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ICF
an acquisition and implementation approach and roadmap for automating and integrating physical security systems and processes into the FDIC enterprise environment, to meet Federal Identity, Credential, and Access Management (FICAM) requirements and posture for the PACES project. Assist with research and analysis of alternatives for the FDIC Physical Access Control Systems (PACS). Support/lead group facilitation … sessions, workshops, interviews, and other activities to elicit information from stakeholders. Create and maintain a Requirements Traceability Matrix (RTM). Develop current- and future-state business process models. Capture and distribute meeting minutes and prepare PowerPoint presentations. Support the team in developing a PACES Roadmap. Identify best practices, document and assess performance measurements, and identify business process and … transfer of scope, and other analyses to ensure successful delivery of artifacts to client areas. Required Qualifications: Hold a Bachelor's degree in Accounting, Finance, Business Administration, Marketing, InformationSystemsManagement, Computer Science or related field, or an equivalent combination of education and/or experience. Bring at least three (3) years of relevant experience. US More ❯
our governmental client, this position requires being a U.S. citizen. The Senior Security Engineer is a vital role within an organization's cybersecurity team, responsible for safeguarding sensitive information and ensuring the integrity, confidentiality, and availability of digital assets. With an extensive understanding of evolving cyber threats and risk mitigation strategies, the Senior Security Engineer collaborates across departments … and tools. Performs other job-related duties as assigned. SR Security Engineer Experience, Education, Skills, Abilities requested: A bachelor's degree in the field of computer science or managementinformationsystems or a related field (or 5 years equivalent work experience), is required. 5-7 Years working in an IT Security role responsible for information security, network administration, and systems administration. Experience with vulnerability, patch management and configuration management. Experience with Microsoft Azure administration/security. Experience with Tenable administration Experience with mobile device management Familiarity with BigFix, BitLocker is preferred but not required. Understanding of penetration testing and vulnerability assessments. Understanding of enterprise networking concepts. Experience working in More ❯
Charlotte, North Carolina, United States Hybrid / WFH Options
City National Bank
simplify code, existing or new architectures and vendor dependencies Recommend rationalization opportunities throughout the portfolio of applications and systems Design and develop APIs for Omni-channel, experience, process and system APIs Prepare design, development and architecture specifications based on NFRs Develop conceptual and physical solution design artifacts Prepare and deliver artifacts supporting the SDLC Analyze and develop data models … design of modern web, mobile, and integration (cloud/on-premises) platforms Experience with Agile development methodology including Scrum, XP, FDD, TDD, and SAFe. Enterprise experience with API management toolsets, DevOps, server infrastructure, network infrastructure, caching methodologies, information security, and database technologies Ability to document solution designs using a variety of approaches (e.g. using UML) Experience More ❯
This position is contingent on contract award Description: Serve as a Subject Matter Expert providing testing expertise of the Risk Management Framework. Direct and/or participate in the testing phase of security controls assessments using specialized knowledge of network protocols, operating systems, architectures, equipment, services, and standards. Perform vulnerability and penetration testing using a wide variety of … tools Research and evaluate emerging technologies relevant to informationsystems security; interpret agency specific and federal security regulations Perform both network and application-level testing using established testing protocols and methods Qualifications: Eight (8) experience of related work experience as a Penetration Tester performing both network and application-level testing using established test protocols and methods. A Bachelor … s degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and InformationSystems). In lieu of a Bachelor's degree, four (4) additional years of Penetration Testing experience maybe substituted. Requirements: U.S. Citizenship More ❯
collaboratively to resolve complex issues within DoD cloud environments. Escalate risks, constraints, and critical issues to appropriate stakeholders for resolution. Qualifications Bachelor's degree in computer science, IT, informationsystems, or related field. Certified in one of the following: CISM; CISSO; FITSP-M; GCIA; GCSA; GCIH; GSLC; GICSP; CISSP-ISSMP; or CISSP. Eight (8+) years managing cloud-based … alone or as part of a team. Desired Experience Eight (8+) years in vulnerability management & penetration-testing corrective actions. Eight (8+) years supporting DoD defensive cyber operations: system protection, incident handling, reporting, recovery. Physical Demands Must be able to lift 25 pounds on occasion. Must be able to stand and walk for prolonged period amounts of time. More ❯