U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone's Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as … human intelligence, and critical missions and networks. DevOps Systems Engineer Job Description DevOps Systems Engineer Herndon, VA Work directly with the DevOps team and Senior DevOps manager to understand system deployment and installation processes. Manage all computer systems and oversee the daily performance, keeping an eye out for issues and inefficiencies. Respond to user issues, answering inquiries and resolving … more complicated issues firsthand. Maintain records of system performance, combining raw information into a useful and beneficial performance report for monthly board meetings. Create training material whenever new recruits are hired to explain the correct and most efficient way to operate the implemented systems. Other duties as assigned. Required Experience: Must hold an Active TS/SCI More ❯
Arlington, Virginia, United States Hybrid / WFH Options
UICGS and Bowhead Family of Companies
security standards. Cloud Platform Architecture: Design and oversee end-to-end cloud architecture strategies across AWS GovCloud, Azure Government, and other FedRAMP-authorized cloud platforms for complex DoD legacy system migrations. Security Integration & Compliance: Implement and maintain security controls compliant with NIST, FISMA, DoD Directive 8140, and DoD security frameworks while ensuring operational continuity throughout migration processes. Legacy System Assessment: Conduct comprehensive assessments of existing DoD applications and J6 IT processes to determine optimal migration pathways and identify corrective actions for hardware, software, and business management procedures. Cross-Functional Collaboration: Interface with the customer and external stakeholders in working groups, technical exchange meetings, and other forums while providing technical guidance to development teams and junior architects. … Create and maintain detailed architectural documentation, migration plans, security compliance reports, and prepare contingency plans while identifying/recommending GOTS/COTS software applications for program tracking. Project Management & Oversight: Chair/co-chair meetings and working groups on behalf of government representatives, resolve problems, allocate resources, manage personnel, and monitor performance to meet contract requirements. Infrastructure ManagementMore ❯
information on SMS, visit . Submit your resume today! Responsibilities A Subject Matter Expert that has experience in providing knowledge, techniques and/or capabilities related to system IA, certification and accreditation (C&A), documentation, security testing and vulnerability remediation. Candidate will support the Certification and accreditation process for administering DoD (Department of Defense) Risk Management … DITSCAP, RMF, Air Force Best Business Practices (BBP) and information assurance and auditing. Performance of C&A workflow in accordance with RMF requirements, preparation of system-related RMF artifacts, system security engineering, preparation of security test plans and their execution, remediation of system vulnerabilities, and preparation of IA documentation including PPS matrix, POA&M and … system security plans. Writing Standard Operation Procedures (SOP), COOP, Configurations, and other documentation in support of RMF as required. Provide technical evaluation of proposed system(s) and application approaches. Validation of Information Assurance (IA) Controls. Qualifications Five to eight years of progressively responsible IT security consulting experience including recent experience with RMF. Candidates should have technical More ❯
with regulations and security and standards. The end goal is to ensure the integrity of customer systems by identifying and mitigating potential shortcomings and vulnerabilities. Advise on network and system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment … tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network and system administrators to correct identified deficiencies. The Cybersecurity Systems Analyst will also scan (or review scans) for new systems and applications being introduced into the SOF environment, identify issues, and …/Skills: 8+ years of progressive, relevant experience or equivalent combination of education and experience. Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired. Technical background with system administration experience, architecture and engineering preferred Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility Working knowledge of the RMF. Knowledge of More ❯
include, but are not limited to: Provides advanced technical support and expertise for the Defense Health Agency's enterprise managementsystems, focusing on complex problem-solving and system optimization. Serves as a top-tier escalation point for issues that cannot be resolved at lower support levels, addressing critical incidents that impact the DHA's global IT infrastructure … reliability, and security across the DHA's extensive network of physical and virtual servers, multiple sites, and numerous end-user devices. Leads efforts in automation and scripting to improve system efficiency and reduce manual interventions. Provides expert-level support for enterprise user data/profile management and associated resources. Develops and implements standardized designs and solutions for … and access management systems. Plays a key role in the preparation and deployment of policies, applications, and operating systems, including applicable upgrades. Manages and optimizes the common system and monitoring framework for centrally deploying, supporting, and monitoring applications and systems. Ensures all solutions align with DoD cybersecurity requirements, Risk Management Framework (RMF), and various DoD More ❯
goal is to ensure the integrity of customer systems by identifying and mitigating potential shortcomings and vulnerabilities. Advise USSOCOM, its Component Commands, TSOCs, and deployed forces on network and system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment … tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network and system administrators to correct identified deficiencies. The Cybersecurity Systems Analyst will also scan (or review scans) for new systems and applications being introduced into the SOF environment, identify issues, and … factors, including job-related skills, experience, and relevant education or training. Knowledge, Skills and Abilities: • Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired. • Technical background with system administration experience, architecture and engineering preferred • Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility • Working knowledge of the RMF. • Knowledge of More ❯
goal is to ensure the integrity of customer systems by identifying and mitigating potential shortcomings and vulnerabilities. Advise USSOCOM, its Component Commands, TSOCs, and deployed forces on network and system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment … tool and Security Content Automation Protocol tool. Identify applicable STIGs and perform assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network and system administrators to correct identified deficiencies. The Cybersecurity Systems Analyst will also scan (or review scans) for new systems and applications being introduced into the SOF environment, identify issues, and … factors, including job-related skills, experience, and relevant education or training. Knowledge, Skills and Abilities: • Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired. • Technical background with system administration experience, architecture and engineering preferred • Technical background in networking, identity management, Microsoft and Linux operating systems, database, and mobility • Working knowledge of the RMF. • Knowledge of More ❯
Test and Evaluation (OPNAV N94), Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Test and Evaluation (T&E) Director, PMW/A 170, Fleet user/System of Systems (SoS) representatives (i.e. Naval Computer and Telecommunications Area Master Station Pacific, PMW-770, PMW 160, etc.), and Contractor Vendors, as required Coordinate with Fleet schedulers, laboratories, and … Must be innovative and willing to tackle challenging situations to meet the customer's specific requirements Experience and Skills Required Experience: 15 years of T&E experience Experience with system developmental type test events Knowledge of the DoD and Navy T&E and acquisition processes in the Defense Acquisition life cycle management, including Joint Capabilities Integration and … Development System (JCIDS) process Intermediate knowledge of experience with MS Office suite, specifically MS Word, PowerPoint, and Excel. Strong oral and written communication skills Ability to work autonomously Analytical, organized, and a self-motivated learner Ability to communicate and coordinate effectively within Navy chain of command Ability to collaborate/work well with others and thrive in fast-paced More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Edera L3C
Management Consulting Senior Associate Management Consulting Manager Edera L3C is a fast-growing health information technology (IT) consultancy that addresses today's issues and helps create tomorrow's solutions by connecting the brightest minds in healthcare to large, impactful problems. Our L3C designation means we are a "purpose before profit" social enterprise venture that … concentrates on a socially beneficial mission to transform organizations rather than being driven to maximize income. Our team of management, technology, and creative services consultants work collaboratively with industry experts who bring deep experience and expertise to create transformational business solutions. We believe complex challenges and multi-faceted opportunities call for multi-disciplinary approaches and that is how … federal business development efforts Willingness to travel Preferred Skills/Qualifications: Master's degree preferred Military health command experience desired Extensive understanding of federal healthcare systems, especially Military Health System operations and digital transformation initiatives Expertise in project management principles, tools, and methodologies. Strong understanding of defense healthcare systems and operational readiness. Excellent leadership, communication, and stakeholder More ❯
Koniag Data Solutions, LLC, a Koniag Government Services company, is seeking a Senior Level IT Knowledge Management Support to support KDS and our government customer at Joint Base San Antonio, TX. This position requires the candidate to be able to obtain a Public Trust. This position is for a Future New Business Opportunity. We offer competitive compensation and … and more. Essential Functions, Responsibilities & Duties may include, but are not limited to: Provides senior-level leadership and strategic direction for the Defense Health Agency's IT Knowledge Management initiatives across its global network of military hospitals, medical clinics, and dental clinics. Serves as a top-tier expert responsible for shaping and overseeing the implementation of DHA's … comprehensive IT knowledge management strategy, with a strong focus on leveraging SharePoint and other advanced collaborative technologies. Leads the development and continuous refinement of DHA's overarching IT knowledge management architecture, ensuring alignment with DoD IT strategies, organizational objectives, and industry best practices. Directs the integration of knowledge management principles into all aspects of More ❯
R- Description The Antarctic Support Contract Enterprise (ASC) Asset Management Specialist is responsible for the management of the ASC Accountable Property and Information Technology & Communications (IT&C) Enterprise Inventory and performance of related tasks within the United States Antarctic Program (USAP) as well as appropriately responding to the time-sensitive needs of Leidos/… partner agency staff. This position will manage the ASC Accountable Property Inventory ensuring annual audits and updated data are collected. This individual will also manage the IT&C Information Technology Asset Management (ITAM) process and tools, data management and reporting in compliance with program directives. Responsibilities include conducting physical inventories of Accountable Property, Information … Asset Management in organizations with remote, austere locations. Experience with Manage Engine Asset Explorer and Desktop Central. Experience with automated reporting from Microsoft Configuration Manager and network system scans. Experience with Microsoft Power BI. Process development and integration with Enterprise applications such as SharePoint and SQL Database Applications. Experience in interpreting and complying with FAR Part More ❯
policies and Government Accountability Office (GAO) audit standards. (4) Determine inefficiencies in IT systems and associated management. Solid understanding of Risk Management Framework, Federal InformationSystemManagement Act of 2002 (FISMA) and Federal InformationSystem Controls Audit Manual (FISCAM) to assess IT operational systems. Duties & Responsibilities: The It Audit Lead … applicable. Performing rigorous audits/assessments of IT controls using industry-standard guidance and leading practices Performing walkthrough interviews and maintaining communication with a variety of client stakeholders, including system personnel such as system and database administrators Requesting, obtaining, reviewing, and analyzing a variety of artifacts to assist in executing IT controls testing such as security plans, SOPs … system screenshots, and system configuration settings Evaluating the design and operating effectiveness of IT controls using provided artifacts, industry-standard guidance, leading practices, and professional judgement Professionally documenting the results of IT controls test work in a consistent and high-quality manner that would allow a reviewer to repeat the test and reach the same conclusion Summarizing and More ❯
Paid Leave, and much more. Join us and make a difference in National Security! Experience with classified IC dissemination platforms, information sharing rules, and Intelligence Community Markings System Register and Manual Standards. You must have an active TS/SCI Polygraph up front. No exceptions and no sponsorship available, unfortunately. Come join a high performing agile team … to support a fast-paced, complex program! Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain … capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. You will become part of a team of Security Engineers working on providing improvements to our operational, test, integration, and development systems and solving challenging issues on a More ❯
Paid Leave, and much more. Join us and make a difference in National Security! Experience with classified IC dissemination platforms, information sharing rules, and Intelligence Community Markings System Register and Manual Standards. You must have an active TS/SCI Polygraph up front. No exceptions and no sponsorship available, unfortunately. Come join a high performing agile team … to support a fast-paced, complex program! Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain … capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. You will become part of a team of Security Engineers working on providing improvements to our operational, test, integration, and development systems and solving challenging issues on a More ❯
day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. Responsibilities include, but are not limited to: Perform ongoing system maintenance, patching, and upgrades in coordination with change management procedures. Manage user access controls, including provisioning, de-provisioning, and access reviews. Monitor system health and performance … and proactively remediate issues. Respond to and resolve incidents and service requests in line with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data … protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and system improvements. Maintain and improve environment documentation, runbooks, and support knowledge base articles. Track and report on improvement KPIs (e.g., ticket trends, patching success rates). Identify inefficiencies and propose automation or process changes. Monitor application performance and assist with capacity planning More ❯
day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. Responsibilities include, but are not limited to: Perform ongoing system maintenance, patching, and upgrades in coordination with change management procedures. Manage user access controls, including provisioning, de-provisioning, and access reviews. Monitor system health and performance … and proactively remediate issues. Respond to and resolve incidents and service requests in line with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data … protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and system improvements. Maintain and improve environment documentation, runbooks, and support knowledge base articles. Track and report on improvement KPIs (e.g., ticket trends, patching success rates). Identify inefficiencies and propose automation or process changes. Monitor application performance and assist with capacity planning More ❯
day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. Responsibilities include, but are not limited to: Perform ongoing system maintenance, patching, and upgrades in coordination with change management procedures. Manage user access controls, including provisioning, de-provisioning, and access reviews. Monitor system health and performance … and proactively remediate issues. Respond to and resolve incidents and service requests in line with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data … protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and system improvements. Maintain and improve environment documentation, runbooks, and support knowledge base articles. Track and report on improvement KPIs (e.g., ticket trends, patching success rates). Identify inefficiencies and propose automation or process changes. Monitor application performance and assist with capacity planning More ❯
day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. Responsibilities include, but are not limited to: Perform ongoing system maintenance, patching, and upgrades in coordination with change management procedures. Manage user access controls, including provisioning, de-provisioning, and access reviews. Monitor system health and performance … and proactively remediate issues. Respond to and resolve incidents and service requests in line with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data … protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and system improvements. Maintain and improve environment documentation, runbooks, and support knowledge base articles. Track and report on improvement KPIs (e.g., ticket trends, patching success rates). Identify inefficiencies and propose automation or process changes. Monitor application performance and assist with capacity planning More ❯
london (city of london), south east england, united kingdom
Proskauer Rose LLP
day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. Responsibilities include, but are not limited to: Perform ongoing system maintenance, patching, and upgrades in coordination with change management procedures. Manage user access controls, including provisioning, de-provisioning, and access reviews. Monitor system health and performance … and proactively remediate issues. Respond to and resolve incidents and service requests in line with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data … protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and system improvements. Maintain and improve environment documentation, runbooks, and support knowledge base articles. Track and report on improvement KPIs (e.g., ticket trends, patching success rates). Identify inefficiencies and propose automation or process changes. Monitor application performance and assist with capacity planning More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … contributing to the overall efficiency, reliability, and scalability of the customer's technology infrastructure. Working with third-party tools to manage scripts and automate and monitor deployment workflows, enhancing system reliability and scalability. Proactively monitoring the health of deployments, identifying and resolving issues, and redeploying after remediation. Working with system architects and lead engineer to maintain and improve … management. Planning, evaluating, and executing capacity optimization, updates, upgrades and other lifecycle activities associated with the solution; troubleshooting of functional and performance problems. Creating and maintaining detailed and accurate system documentation, including design and configuration plans, design diagrams, task-oriented procedures, operations and maintenance plans, etc. Designing, developing, deploying, and maintaining data flow pipelines to integrate applications and federate More ❯
candidate will possess expertise in implementing and managing security controls across diverse environments, ensuring compliance with NIST SP 800-171, DFARS, and CMMC 2.0 requirements, as well as classified system security standards (NIST SP 800-53). This position requires supporting informationsystems and networks in a classified space in addition to the corporate enterprise network. Responsibilities … CP) for enterprise systems. Collaborate with cross-functional teams to enhance security architecture, enforce security baselines, and conduct enterprise risk assessments. Classified Environment Serve as the InformationSystem Security Officer (ISSO) for classified systems operating in a secure space. Enforce physical, technical, and administrative security controls required by applicable DoD security policies. Coordinate with the InformationSystem Security Manager (ISSM), Facility Security Officer (FSO), and government security representatives to maintain Authorization to Operate (ATO) and ensure compliance. Conduct security control assessments, media handling, audit log reviews, user training, and incident response within the classified environment. Support classified system configuration management, account management, and change control processes. Other duties More ❯
any surveys, inspections, tours, etc. of client sites, as required Design: Install, configure, and maintain network services, equipment, and devices. Work closely with the field engineers to simulate expected system level performance and provide quick feedback on potential improvement Assist senior network engineers to identify and resolve network security issues. Develop network designs for each SLA classification. Originates design … testing/commissioning procedures Preparation of test reports Commissioning of deployed systems Development of test fixtures and simulation devices Generates standard PITCO plans and procedures. Design and perform complete system integration test Service & Maintenance: Troubleshoot and debugging complex network problems and recommending operational efficiency improvements Preventative maintenance (software/hardware/firmware upgrades) including security updates, performance upgrades and … and submit maintenance plan and provide role back plan. Serves as backup for team members during paid time off. Perform hardware/software upgrades and replacements on existing systemsSystem Analysis and Reporting: Documents the crucial working procedures and troubleshooting of network operations. Employs moderate understanding of network administration as related to business operations. Assists team members in identifying More ❯
any surveys, inspections, tours, etc. of client sites, as required Design: Install, configure, and maintain network services, equipment, and devices. Work closely with the field engineers to simulate expected system level performance and provide quick feedback on potential improvement Assist senior network engineers to identify and resolve network security issues. Develop network designs for each SLA classification. Originates design … testing/commissioning procedures Preparation of test reports Commissioning of deployed systems Development of test fixtures and simulation devices Generates standard PITCO plans and procedures. Design and perform complete system integration test Service & Maintenance: Troubleshoot and debugging complex network problems and recommending operational efficiency improvements Preventative maintenance (software/hardware/firmware upgrades) including security updates, performance upgrades and … and submit maintenance plan and provide role back plan. Serves as backup for team members during paid time off. Perform hardware/software upgrades and replacements on existing systemsSystem Analysis and Reporting: Documents the crucial working procedures and troubleshooting of network operations. Employs moderate understanding of network administration as related to business operations. Assists team members in identifying More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
M.C. Dean
employs more than 5,800 professionals who engineer and deploy automated, secure, and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Why join M.C. Dean? Our people are inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world for the better. We are … Citizenship; Applicant selected must have the ability to obtain and maintain a Secret Clearance Responsibilities The DCIM Manager is responsible for overseeing the Data Center Infrastructure Managementsystem to ensure the efficient operation, monitoring, and optimization of multiple, geographically separated data center and the installed assets, power, cooling, and space utilization. This role requires a strong understanding … and remove floor plans within DCIM Add, update, and remove mission partner organizational information within DCIM as requested by the government. DCIM User Management Process System Authorization Access Requests for user accounts in DCIM Reviewing access requests for completeness Validating requested access level Creating or removing user accounts as required per the SAAR. Managing user More ❯
Need Sr. Business Analysis with Utility background Sr. Business Analyst - SAP GIS and Spatial Asset Management Location: Los Angeles, CA (Local Candidate or within 75 miles only) Duration: long term. Visa: Open Must have: SAP GIS, SAM & Utility Background Goal: PMO Manager for the Opus Program, which aims to transform work management across Energy Infrastructure. This … program will create a unified view of work for Transmission, Storage, Distribution, and Customer Service, delivering an intuitive, agile, and modern work management solution. Our goal is to enhance efficiency, safety, and data-driven decision-making in alignment with the client goals. Requirement: Live within a 75-mile radius of Los Angeles Work in a hybrid model … the Gas Company Tower (minimum) Have the following qualifications: A bachelor's degree in Computer Science, InformationSystems, or a related discipline (e.g., Geographical InformationSystem) 5 years of senior-level experience in business application design, development, installation, and modification in an online environment Experience with structured design, development, and implementation of new computing architectures More ❯