determine, recommend, and plan computer specifications and layouts, and peripheral equipment modifications. Review existing programs and assist in making refinements, reducing operating time, and improve current techniques. Confer with systems analysts, engineers, programmers and others to design system and to obtain information on project limitations and capabilities, performance requirements and interfaces. Obtain and evaluate information … yrs experience Bachelor's degree or higher in Computer Science, Engineering, Remote Sensing, Photogrammetry, Image Science, Data Science, Information Technology, ManagementInformationSystems, Geographic InformationSystems, Geography, or other related degree program, or related equivalent additional experience. Demonstrated experience providing guidance and direction in high technology programs. Senior-level or … Desired Skills & Experiences: Master's degree or higher in Remote Sensing, Photogrammetry, Image Science, Computer Science, Data Science, Engineering, Information Technology, ManagementInformationSystems, Geographic InformationSystems, Geography, or other related degree program. Senior-level or higher experience in engineering, design and analysis of IT or related systems experience More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
InformationSystem Security Manager (ISSM) 1's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
analyzing, designing and executing the requirements of the Linux Solution to include Red Hat and Rocky Linux in the development of enterprise-wide or large-scale informationsystems Analytically and systematically evaluates problems of workflows, organization, and planning and develops appropriate corrective action Responsible for the system requirements, interface definitions (internal as well as external) Manages team … and requirements management Experience overseeing technical reviews Level 1: Minimum of seven 7 years of relevant SE experience. BS in System Engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management or related discipline from an accredited college or university. Five (5) years of additional SE experience may be substituted for a bachelor's … degree. Level 2: Minimum of 14 years of relevant SE experience. BS in System Engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management or related discipline from an accredited college or university. Five (5) years of additional SE experience may be substituted for a bachelor's degree. Level 3: Minimum of 20 years of relevant More ❯
of relevant experience, or • Master's degree and 2+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • Practical experience performing informationsystems assessment and authorization (A&A) as defined in applicable ICDs and guidance • Practical experience performing the processes involved in developing and implementing security related directives and guidance for Information … within Government system and network environments • Knowledge of information technology concepts used in the evaluation of security performance and integrity of state-of-the-art applications, communications systems, hardware, software, satellite control systems, and information processing systems • Technical understanding of information technology systems, software, and networks • Ability to effectively coordinate … A&A activities of industry and Government informationsystems to meet acquisition milestone requirements • Effective technical report and general correspondence writing ability Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through knowledgeable and experienced subject matter experts who recommend innovative solutions to solve complex problems. Please More ❯
Cyber Security Engineers capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and informationsystems through purposeful security architecting, design, development, and configuration. Location: Chantilly, VA/Patriot Ridge (Springfield, VA) Duties: Assists with leading development teams working to design and develop informationsystems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation) into system security designs and … Junior-level contractor Cyber Security Engineers. Required Skills & Experience: 18+ yrs experience Master's degree in Engineering, Computer Science, Information Technology, ManagementInformationSystems, or related STEM degree program, or equivalent Expert level experience as a Cyber Security Engineer. Expert working experience in government or industry within Cyber Security Engineering. DoD 8570 Level More ❯
of relevant experience, or • Master's degree and 10+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • Practical experience performing informationsystems assessment and authorization (A&A) as defined in applicable ICDs and guidance • Practical experience utilizing risk management strategies for information technology solutions • Technical understanding of … within Government system and network environments • Knowledge of information technology concepts used in the evaluation of security performance and integrity of state-of-the-art applications, communications systems, hardware, software, satellite control systems, and information processing systems • In-Depth Technical understanding of information technology systems, software, and networks • Ability to … effectively coordinate A&A activities of industry and Government informationsystems to meet acquisition milestone requirements • Effective technical report and general correspondence writing ability • Ability to simultaneously manage and track multiple large scale systems or programs involved in the A&A process • Experience developing and implementing security related directives and guidance for Information Assurance More ❯
modeling, training, and consulting. Directing the gathering of user requirements and translating them into workable automated solutions. In-depth knowledge of artificial intelligence database architectures, object-oriented design, and systems implementation. Capability to assess products and procedures for compliance with government standards, and information assurance. Must be able to lead all stages of a project's life … cycle, including the creation and monitoring of schedules, requirements documentation, systems design and specifications, and project status reporting. Possessing knowledge of the DoD Risk Management Framework (RMF) which, describes the DoD process for identifying, implementing, assessing, and managing cybersecurity capabilities and services, expressed as security controls, and authorizing the operation of InformationSystems (IS … replaces the DoD Information Assurance Certification and Accreditation Process (DIACAP). Familiarity with the National Institute of Standards and Technology (NIST) for DoD information assurance systems accreditation is helpful. Basic Minimum Requirements for Skills, Experience, Education and Credentials include: US citizenship with an active Department of Defense (DoD) Top Secret (TS) security clearance and a More ❯
InformationSystem Security Manager (ISSM) 2 primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
future. We are currently building our pipeline. The ISSMs primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint SAP Implementation Guide (JSIG) authorization process Advise customer … government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal InformationSystems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and More ❯
motivated individual to be the Senior InformationSystem Security Officer, supporting the Joint Activities Integration Division with maintaining compliance and strengthening the security posture of critical mission systems and their System Security Plans (SSPs) via the Risk Management Framework. Responsibilities include, but are not limited to: -Ensure the appropriate operational security posture is maintained for … information systems. -Support continuous monitoring … of networks to detect and correct areas of security non-compliance, unmitigated vulnerabilities, and other risks. -Follow consistent security processes and play a role in the informationsystems continuous monitoring program. -Perform regular audits of information systems. -Assist the InformationSystems Security Manager in preparing the informationsystem for periodic More ❯
life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration. Why Join Us? Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values-agility, expertise, and trust-we foster … we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking an Engineer 1 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security services inclusive of … intrusion detection, access control, biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities The Engineer provides system programming and management support for large scale networking infrastructures. The responsibilities include the administration and maintenance of high performance computer configurations as More ❯
life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration. Why Join Us? Our people are passionate about engineering innovation that improves lives and drives impactful change. Guided by our core values-agility, expertise, and trust-we foster … we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking an Engineer 2 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security services inclusive of … intrusion detection, access control, biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities The Engineer provides system programming and management support for large scale networking infrastructures. The responsibilities include the administration and maintenance of high performance computer configurations as More ❯
Systems Engineer II-III - IT & Cybersecurity Specialist Req Number: 016-25 GBL Systems Corporation is a leading systems engineering and software development firm with a 35+ year history of providing technical support to the U.S. Government in the areas of Weapon Systems, Electronic Warfare and Network Centric Warfare. GBL is based in Camarillo, CA and currently … marketplace, AWS GovCloud, and Office GCC enclaves or similar solutions Design, setup and configure complex networking environments that support secured access Configuring, installing and maintaining virtual managementsystems IT-level duties to include domain management, server management, remediation of user workstation issues, access control, cabling, patch panel management, IAVA remediation, IP … as Ansible playbooks and pertinent markup languages such as YAML Providing technical support across the company Job Qualifications: Between three to five years of experience in Cybersecurity and IT Systems Administration Bachelor's degree in Engineering, Computer Science, Mathematics or related technical field Hands on experience with IDS/IPS products, network protocol and packet analysis tools, penetration testing More ❯
audits to ensure appropriate implementation and continuous compliance of the security posture of the system. Assessing and monitoring system compliance, auditing, security plan development and delivering informationsystems security education and awareness. Integrating new cybersecurity processes, procedures, and tools. Support the creation, review and update of cybersecurity documentation and other technical writing. Stay up to date with … Compliant Certification (e.g. Security+, CISSP, or equivalent). Experience in Risk Management Framework, IA certification, accreditation, IA controls and developing and maintaining associated documentation Experience with security systems engineering involving various computer hardware and software S/W operating system and application solutions in both a stand-alone and in LAN/WAN configurations. Relevant Experience any …/all of the following security disciplines: Cybersecurity, systems security or hardening Information Technology Compliance-based auditing using the Risk Management Framework (RMF) Working with and/or supporting computer technologies (such as databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics) Project or program management, office managementMore ❯
OPS Consulting is seeking an HPC Engineer Level 2 to work in Laurel, MD. As a Senior Systems Engineer at OPS consulting, you will provide portfolio level advisory support to the customer, facilitating the development, acquisition and support of complex systems. You will liaise with various technical and non-technical stakeholders in support of system requirements. You will contribute … contract documentation (Contract Strategy Competition in Contracting Act (CICA) Contract Data Requirements List (CDRLs) and Data Item Description (DIDs). Additional Experience: • Contribute to the development of sections of systems engineering documentation such as system Engineering Plans, Initial Capabilities Documents, Requirements specifications, and Interface Control Documents • Manage system requirements and derived requirements to ensure the delivery of production systems … Documents • Participate in interface definition design, and changes to the configuration between affected groups and individuals throughout the life cycle • Allocate real-time process budgets and error budgets to systems and subsystem components • Derive from the system requirements an understanding of stakeholder needs functions that may be logically inferred and implied as essential to system effectiveness • Derive lower-level More ❯
administration background and current TS/SCI clearance to support the US Army Intelligence Center of Excellence (USAICoE) on Ft. Huachuca, AZ. The candidate will join our CIO G6 Systems Operations Team - a team of skilled IT professionals who strive for successful user and mission support while providing positive customer experience. Responsibilities: • Active Directory and user account management • Install, secure, and maintain Windows Server systems and Active Directory environments • Ensure security compliance for all Windows server based systems to include Security Technical Implementation Guide (STIG) and Information Assurance Vulnerability Management (IAVM) compliance • Troubleshoot and resolve Active Directory, GPO, Active Directory Federated Services, and password/identity managementsystems … years of applicable experience with in-depth knowledge of Active Directory environment to include Group Policy, Security Groups, Delegations, and permissions to OUs and objects • Experience with Windows Server, Systems Center, and Active Directory, for Windows Server 2019/2022 technologies as well as industry best practice with regard to the implementation, deployment, compliance and maintenance of Active Directory More ❯
Contribute to technical studies, analyses, and evaluations of technical mission needs and make recommendations to support decision-makers. Must have an in-depth understanding of modern/digital telecommunication systems and equipment; the US SIGINT System; export issues; and SIGINT Systems collection and processing facilities. Must be capable of maintaining extensive interaction/working relationships among various representatives … The Level 3 Telecommunication Technical Analyst shall be able to perform the following indicated tasks: Conduct Mission Management of collection operations at Government direction. Configure customer collection systems to execute tasking. Optimize collection activities in accordance with standard operating procedures and government guidance. Ensure assigned collection resources have been used efficiently. Provide operational assistance to users during … the communications used by targets of interest. Provide technical direction and technical support for the development of training. Provide expertise in the acquisition cycle to support integration of SIGINT systems for USCS customers. Provide expertise and perform technical analysis of prototyping activities. Provide support to the deployment of new systems to include operational effectiveness assessments. Requirements Top Secret More ❯
Maintenance, Repair, and Defense of the Defense InformationSystem Network (DISN) within the DOD Information Network (DODIN) in support of the Defense InformationSystems Agency (DISA). It also includes support to other key tasks for DISA, including the transformation of DISA's operational mission through innovation, and support to DISA's mission … minimum, a Secret clearance is required upon the start of employment and within 14 days following the start date the employee must obtain their Security + certification. The ServiceNow Systems Administrator will manage servers, networks, storage systems, and containers while monitoring system performance and performing routine updates, patches and security configurations. The candidate filling this role will also … in unstructured and semi-structured customer data that can be used to create a more positive customer experience and increase overall network performance Interact with the customer to address Systems Engineering technical considerations and associated problems, issues or conflicts Ensure the infrastructure is properly setup with the right nodes, storage, and security parameters to host ServiceNow Basic Qualifications Bachelor More ❯
CA, and since that time has seen tremendous growth and success. Currently IDS has offices supporting customers nationwide. By providing customers with fast, efficient and reliable informationsystems and support services, IDS has become a preferred provider of financial and programmatic systems, services, and solutions across a wide variety of government agencies. Position Description: IDS is … currently searching for a Business Analyst with experience in Department of Defense (DoD) financial management processes, government financial and accounting systems, acquisition and budgeting processes, and relational databases to provide support and training on-site to a government customer. Responsibilities include, but are not limited to, the following: Act as a financial and technical consultant for a … DoD program management and financial managementsystem Provide expertise in government finance Assist customers in properly structuring financial data Perform reconciliation between several systems Perform daily review of forecasts and accounting data Otherwise support a government financial office Knowledge and Skills: This position requires a minimum of three (3) years of government acquisition, finance or More ❯
CA, and since that time has seen tremendous growth and success. Currently IDS has offices supporting customers nationwide. By providing customers with fast, efficient and reliable informationsystems and support services, IDS has become a preferred provider of financial and programmatic systems, services, and solutions across a wide variety of government agencies. Position Description: IDS is … currently searching for a Business Analyst with experience in Department of Defense (DoD) financial management processes, government financial and accounting systems, acquisition and budgeting processes, and relational databases to provide support and training on-site to a government customer. Responsibilities include, but are not limited to, the following: Act as a financial and technical consultant for a … DoD program management and financial managementsystem Provide expertise in government finance Assist customers in properly structuring financial data Perform reconciliation between several systems Perform daily review of forecasts and accounting data Otherwise support a government financial office Knowledge and Skills: This position requires a minimum of three (3) years of government acquisition, finance or More ❯
CA, and since that time has seen tremendous growth and success. Currently, IDS has offices supporting customers nationwide. By providing customers with fast, efficient and reliable informationsystems and support services, IDS has become a preferred provider of financial and programmatic systems, services and solutions across a wide variety of government agencies. Position Description: IDS is … currently searching for a Business Analyst with experience in Department of Defense (DoD) financial management processes, government financial and accounting systems, acquisition and budgeting processes, and relational databases to provide support and training on-site to a government customer. Responsibilities include, but are not limited to, the following: Act as a financial and technical consultant for a … DoD program management and financial managementsystem Provide expertise in government finance Assist customers in properly structuring financial data Perform reconciliation between several systems Perform daily review of forecasts and accounting data Otherwise support a government financial office Knowledge and Skills: This position requires a minimum of seven (7) years of government acquisition, finance or More ❯