the most out of your career. You'd like to do this Assist security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to … procedures are established and followed. Manage changes to system and assesses the security impact of those changes. Perform vulnerability/risk assessment analysis to support certification and accreditation. Provide configurationmanagement (CM) for information system security software, hardware, and firmware. Prepare and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A More ❯
/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking a highly skilled and experienced professional to provide comprehensive management support for an organization's Information Assurance (IA) program. The ideal candidate will play a key role in ensuring the security of information systems by overseeing the proposal, coordination … activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. The successful candidate will oversee configurationmanagement (CM) processes, ensuring that security software, hardware, and firmware are up-to-date and secure. Additionally, they will be responsible for assessing the security impact of system … changes and providing support in line with the Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP). This position offers a unique opportunity to make a significant impact on the overall security of critical information systems and ensure compliance with all regulatory and security requirements. Qualifications: Required: Current Active TS/SCI with POLY More ❯
/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking a highly skilled and experienced professional to provide comprehensive management support for an organization's Information Assurance (IA) program. The ideal candidate will play a key role in ensuring the security of information systems by overseeing the proposal, coordination … activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. The successful candidate will oversee configurationmanagement (CM) processes, ensuring that security software, hardware, and firmware are up-to-date and secure. Additionally, they will be responsible for assessing the security impact of system … changes and providing support in line with the Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP). This position offers a unique opportunity to make a significant impact on the overall security of critical information systems and ensure compliance with all regulatory and security requirements. Qualifications: Required: Current Active TS/SCI with POLY More ❯
implementation activities that result in new or improved I&O capabilities, and it brings skills and expertise to such areas as automating tasks (e.g., cloud, network, etc.), provisioning and configurationmanagement; and other aspects involved in preparing and optimising I&O solutions. You will collaborate closely with Platform Architects, product/platform teams, security, and network specialists, as … role is fundamental for ensuring stable, performant, and secure I&O Platforms which form easyJet's technological backbone. Job Accountabilities Designing solutions based on stakeholder requirements Platform engineering and configuration Overseeing version and patch release and deployment Provide technical expertise as part of the Platform maintenance, support and troubleshooting activities. Security & Compliance By Design - Resolving any potential security threats … with SD-WAN technologies, such as Cisco Meraki Familiarity with zero trust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across multiple environments Exposure to multi-vendor firewall environments with a focus on secure policy design and integration What you'll get in return Competitive base More ❯
plan development and delivering information systems security education and awareness. Investigating information system security violations and help prepare reports specifying corrective and preventative actions. Reviewing and approving (within authority) configurationmanagement requests. Conducting technical and administrative assessments. Integrating new cybersecurity processes, procedures, and tools. Support the creation, review and update of cybersecurity documentation and other technical writing. Qualifications … experience. Current IAM Level I certification (Security+ or other). Relevant Experience Considered in any combination: Cybersecurity, systems security or hardening Information Technology Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as … FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics) Physical security/security, policework/criminal justice, investigations, or Border Patrol Project or program management, office management, senior administration, or account More ❯
Ann Arbor, Michigan, United States Hybrid / WFH Options
XPO
TypeScript Knowledge of Android app development Preferred qualifications: Bachelor's degree in software engineering or related technical field Experience with the industry standard IDEs - Visual Studio Experience in software configurationmanagement using GIT and Enterprise Git Hub Experience consuming REST APIs Experience using Jira or other project management software Experience with SQL and relational databases (DB2/… progress to ensure development projects remain on schedule, manage issues and risks Be available for testing/support on scheduled deployment dates that are designated by the standardized change management process. Evaluate and select process and logic patterns, programming language constructs, data storage methods, and operating environment interfaces that effectively satisfy business requirements and quantifiable measures; develop appropriate programs More ❯
operating, and assuring critical voice, video and collaboration services for the full spectrum of operations. AT&T has an opening for a Property Administrator: To support the contract property management team. This position requires office presence a minimum of 5 days per week and is only located in the location(s) posted. No relocation is offered. The job duties … team's processes and procedures (SOP's). Monitor and report on fulfillment of requirements for various customer reporting systems (Confluence, SharePoint, HelpNow. Assist the logistics leads in the management of worldwide logistics operations. Provide support for all customer supply chain management review (SCMR) audits. Work with Key stakeholders on the submission of CDRL's (Contract deliverables). … Additional required qualifications include: Knowledge of automated inventory control systems and proficiency with Microsoft Office products. Experience with data entry into SAP/AM and working with IT Service Management (ITSM) tools, SAP asset management, and ServiceNow. Strong understanding of IT software and hardware logistics with a minimum of three years of related experience. Experience with continuous improvement More ❯
know-how for the support of user requirements of complex to highly complex software/hardware applications and will direct and/or participate in all phases of risk management assessments and software/hardware development with emphasis on analysis of user requirements, test design, and test tools selection. To be considered, you will have to have a bachelor … automating test cases, performing application testing, validating bugs, and isolating issues; writing and initiating tests and then analyzing and reporting the test results in the ticketing system; and performing configurationmanagement, change management, and release management. The candidate will design, implement, and conduct test and evaluation procedures to ensure system requirements are met and develop, maintain, and … know-how for the support of user requirements of complex to highly complex software/hardware applications and will direct and/or participate in all phases of risk management assessments and software/hardware development with emphasis on analysis of user requirements, test design, and test tools selection. The SME will review test plans and test reports for More ❯
This position is contingent on contract award Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and procedures are … established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configurationmanagement (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Pertemps Thames Water
as a Regional SCADA Engineer: SCADA System Support: Maintain high availability of the Regional SCADA platform (targeting 99.2% uptime or higher). Perform proactive system maintenance, patching, upgrades, and configuration management. Diagnose and resolve faults across SCADA applications, RTUs, and client workstations. Emergency & Out-of-Hours Coverage: Participate in the SCADA emergency support roster, providing in-hours and out … of-hours fault response. Investigate high-impact incidents and escalate recurring faults for permanent resolution. Incident & Request Management: Deliver responsive support for SCADA-related service requests and incidents. Manage access and data requests in line with OT policies and security controls. Ensure all changes align with defined operational requirements and compliance standards. Project & Change Support: Work with Capital Delivery … identifying technical and operational risks. Provide technical assurance during implementation to protect live system integrity. Technical Collaboration & Subject Matter Expertise: Act as a key technical contact for SCADA standards, configuration, and performance optimisation. Support integration teams and contractors with expert guidance and assurance on best practices. Collaborate with OT engineers and contribute to the delivery of innovative, future-proof More ❯
information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information. Assist with the ConfigurationManagement for information system security software, hardware, and firmware. Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation. Maintain records on … and maintain documentation for Certification & Accreditation in accordance with specified policies. Develop and update system security plans and other IA documentation. Provide support for Information Assurance Vulnerability Alerts (IAVAs) management (initiating IAVA responses and system security scans, completing remediation, extending IAVA patches and security updates to designated sites, etc.). Provide CM for security-relevant information system software, hardware … have at least 5 years of experience using tools to support IAVA management. Must have at least 5 years of experience using tools to support the preparation, maintenance, and management of SSPs and other security-related documentation. Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; and encryption More ❯
information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information. Assist with the ConfigurationManagement for information system security software, hardware, and firmware. Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation. Maintain records on … and maintain documentation for Certification & Accreditation in accordance with specified policies. Develop and update system security plans and other IA documentation. Provide support for Information Assurance Vulnerability Alerts (IAVAs) management (initiating IAVA responses and system security scans, completing remediation, extending IAVA patches and security updates to designated sites, etc.). Provide CM for security-relevant information system software, hardware … have at least 5 years of experience using tools to support IAVA management. Must have at least 5 years of experience using tools to support the preparation, maintenance, and management of SSPs and other security related documentation. Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques More ❯
a complex nature in the control of processes, design concepts, software, and specification requirements. Provides leadership in the areas of producibility and process improvement, quality engineering, software quality, software configurationmanagement, and procurement quality engineering. Qualifications Must possess and be able to maintain a TS/SCI clearance with Polygraph. Requires a minimum of 10 years relevant experience … technical project(s) within the Intelligence Community that required an understanding of business process and/or systems engineering principles and practices. An active certification relative to business systems management, system engineering, information technology, system administration, or computer science. EEO Statement We are an equal opportunity employer and federal government contractor. We do not discriminate against any employee or More ❯
and practices. Familiarity with Agile software development/maintenance principles and practices. Active Participation in Systems Engineering Reviews to include Preliminary and Critical Design Reviews. Desired Qualifications Experience with ConfigurationManagement of Hardware, Software, and Documentation. Experience with design and development of Space and/or Electronic Warfare programs. Experience with Test and Evaluation of complex, highly technical More ❯
safeguard against potential threats. Evaluating security solutions to ensure they meet stringent security requirements for processing classified information, performing vulnerability and risk assessments to support security authorization, and managing configurationmanagement (CM) processes for information systems security software, hardware, and firmware. The candidate will also play a key role in assessing the security impact of system changes and … C&A) packages, and System Requirements Traceability Matrices (SRTMs). Additionally, the candidate will support security authorization activities in alignment with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). This position offers an exciting opportunity to contribute to the security and compliance of vital information systems, ensuring they meet all security requirements and safeguard … is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information More ❯
s degree in Computer Science, Engineering, or a related field. Strong understanding of requirements engineering principles and methodologies. Experience with requirements elicitation, analysis, and documentation techniques. Experience with requirements management tools (e.g., DOORS, Jama, Jira). Experience working with ConfigurationManagement processes. AN ACTIVE DOD TOP SECRET SECURITY CLEARANCE with SCI ELIGIBILITY IS REQUIRED FOR THIS POSITION More ❯
standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified … information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configurationmanagement (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment & Authorization (A&A) packages, and System Controls Traceability … Matrices (SCTMs). Supports security authorization activities in compliance with the NIST Risk Management Framework (RMF) and any DoD and IC tailored requirements. Key tasks include: • Plan and coordinate the IT security programs and policies • Manage and control changes to the system and assessing the security impact of those changes • Obtain A&A for ISs under their purview • Provide More ❯
Job Description The HII Cyber, Electronic Warfare, & Space Group is hiring a Chief Engineer for a $100M Task Order supporting the Secretary of the Air Force Concepts, Development and Management (SAF/CDM) Mission Partner Capability Office (MPCO) and its mission partners. As part of the senior leadership cadre, you will lead all technical activities associated with the Mission … of the MPE in support of the National Defense Strategy, the warfighter, and foreign Mission Partners. The selected candidate will work directly with the TO Program Manager, HII senior management, industry partners, Combatant Commands, Joint Staff, OSD, and Mission Partners. If you are a technical leader, have the requisite qualifications, and enjoy working in a high tempo environment with … engineering activities performed by a large cadre of HII and subcontractor personnel to meet TO objectives across the MPE portfolio; includes planning, architecture definition, design, development, and integration, and configurationmanagement Prepare, staff, and publish formal Command architecture documents; lead research, development, and analysis of CCMD architectures, perform capability gap analyses, new performance system analyses, and recommend architectural More ❯
safeguard against potential threats. Evaluating security solutions to ensure they meet stringent security requirements for processing classified information, performing vulnerability and risk assessments to support security authorization, and managing configurationmanagement (CM) processes for information systems security software, hardware, and firmware. The candidate will also play a key role in assessing the security impact of system changes and … C&A) packages, and System Requirements Traceability Matrices (SRTMs). Additionally, the candidate will support security authorization activities in alignment with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). This position offers an exciting opportunity to contribute to the security and compliance of vital information systems, ensuring they meet all security requirements and safeguard … is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information More ❯
and supporting, at a minimum, Windows, Linux, Unix, and Mac OS. Experience configuring and supporting VMware, Xen, Hyper V, and other virtualization platforms. Technical experience in software engineering, project management, program design and implementation, configurationmanagement, system maintenance, software and information system engineering, and integration testing. Security Clearance Requirement: An active Top Secret SCI w/Polygraph More ❯
planning, feature and story development, sprint planning, and iteration retrospectives Participating in demos for program sprint reviews Qualifications Required Skills/Experience : Experience with GitLab/Git for software configurationmanagement Experience with Red Hat Enterprise Linux operating system Experience programming network connections (e.g., message generation, formatting, UDP and TCP/IP interfaces) Must be a U.S. Citizen … experience; OR PhD with no experience Desired Skills : Test automation or analysis automation Agile scrum Java and user interfaces Jira, or similar tool, for issue tracking and agile project management Multi-core and multi-threaded programming Familiarity with Missile Defense Agency (MDA) missile defense system, sensors, and M&S Overview People First. Technology Always. PeopleTec, Inc. is an employee More ❯
evaluations for the use of novel technologies to aid in the development of support tools and target transformational computing systems Lead, establish, and enforce the adoption of standard processes, configurationmanagement, and good engineering practices Ensure system technical compliance with the program Statement of Work (SOW) and system requirements Manage the vertical and horizontal technical integration throughout the … of experience, a Master's degree in a STEM discipline with 12 years of experience or a PhD in a STEM discipline with 10 years of experience Demonstrated Requirements Management from Elicitation to Verification. Demonstrated experience with the full product life cycle (design, fabrication, and test) Experience facilitating internal and customer collaboration to capture and enhance engineering artifacts Demonstrated … Physics, Systems Engineering, or related technical fields Multi-Disciplinary Engineering exposure (Software, Hardware, Electrical) and strong ability to communicate cross functionally. Experience leading technical teams. Experience with Earned Value Management Salary Range: $179,600.00 - $282,200.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as More ❯
and build software and/or hardware capabilities, hosting technologies and prototype solution Qualifications Required: BS in software engineering, computer science or information systems Experience in development, integration and configurationmanagement of all architecture products across the span of Unified Architecture Framework (UAF) to include Project Views, Capability Views, Operational Views, System/Service Views, Standard Views and … to engage technical and non-technical stakeholders, lead customer interactions, and prepare executive-level briefings Active TOP SECRET/SCI clearance at time of application. Preferred: Direct experience with management projects involving multifunctional tasks and substantial complexity. Company Overview Integral partners with federal defense, intelligence, and civilian leaders to tackle their most important challenges and deliver positive outcomes. Since More ❯
systems, including design, development, integration, andtest. • Experience in mechanical engineering development standards and techniques including geometric dimensioning and tolerancing (GD&T). • Experience with electro-mechanical components/systems, configurationmanagement, and computer aided design (CAD) systems. For example, experience with Solid Edge/Solid Works, or equivalent, risk identification and mitigation, MATLAB, LabVIEW, T&E analysis, electronics More ❯
trade studies Communicating with suppliers and customers to exchange technical information Collaborating with other functional areas on various aspects of product design/documentation, including procurement, production, logistics, or configurationmanagement Hands-on troubleshooting, inspection, or assembly of parts/subsystems in support of prototyping, production, or test Performing engineering analyses, such as weight and center of mass … drafting, reviewing, or interpreting 2D mechanical drawings Self-motivated and able to work productively and independently in a fast-paced environment Good attention to detail, follow-through, and time-management skills Demonstrated good verbal/written communication skills & proactive inter-personal initiative Ability to obtain a DoD Secret (or greater) security clearance prior to start Preferred Qualifications: Experience performing … 3D solid modeling with NX Experience using any industry-standard Product Lifecycle Management systems such as TeamCenter (preferred) Experience using Manufacturing Resource Planning systems, SAP preferred Experience working in or providing engineering support to manufacturing or test/evaluation, particularly for DoD projects Experience designing to Geometric Dimensioning and Tolerancing (GD&T) standards Experience working in a Scrum, Agile More ❯