understanding of impact to the end-product/solution Ensures the availability of mission critical launch communications systems through proactive voice systems IT systems engineering Performs incident and problem management to resolve or escalate issues in order to restore service Supports configurationmanagement and change management activities Basic Qualifications: To be considered for this position, you … strategic launch capabilities Requires Launch or mission operations experience Experience performing voice systems engineering on mission critical systems Understand mission critical desktop and communications hardware and software Experience supporting configurationmanagement, change management and service transition Excellent verbal and written communication skills Proven ability to work collaboratively and constructively as part of a team Must be willing More ❯
the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Will provide assistance to ensure Cybersecurity functions are included in the configurationmanagement process. Interact … design process, defense-in- d epth/breadth, engineering life cycle, information domains, cross-domain solutions, controlled interfaces, identification, authentication and authorization, system integration, ICD 503 (formerly NISCAP), risk management, intrusion detection, contingency planning, incident handling, configuration control, change management, auditing, security authorization process, principles of Cybersecurity (confidentiality, integrity, non-repudiation, availability, access control), and security testing. More ❯
for experienced systems engineers to support: Stakeholder Requirements Definition, Requirements Analysis, Architectural Design, Implementation, Integration, Verification, Transition, Validation, Operation, Maintenance, and Disposal; Project Planning, Project Assessment and Control, Decision Management, Risk Management, ConfigurationManagement, Information Management, and Measurement Planning; Measurement; and Project Portfolio Management, Infrastructure Management, Lifecycle Model Management, and Quality Management … systems will have leg up during the selection process. There is also an on-going need for systems engineers who have practical experience with network security accreditation/Risk Management Framework (RMF), input to system security plans, management of POAMs. Candidates who have a current DODD 8570 Certification (Security+ etc) are especially in demand. Target salary range More ❯
for National Cryptologic University classified training enclaves and unclassified learning centers. including: Directory Services (DS): Architecture, governance, development, implementation, maintenance, and oversight of EIT's Active Directories and Directory Management for all Enterprise Services on all domains. Desktop and Enclave Services (DES): governance, development, implementation, maintenance, and oversight of EIT's desktop, mobile platforms, Virtual Desktop Infrastructures (VDI) and … Tier 1 (Help Desk) and Tier 2 and Tier 3(Escalation) problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and … configures network components along with implementing operating systems enhancements to improve reliability and performance. Provide support for implementation, troubleshooting and maintenance of IT systems. Manage the daily activities of configuration and operation of IT systems. Provide Tier 1 (Help Desk) problem identification, diagnosis and resolution of problems. Provide assistance to users in accessing and using IT systems. Provide Tier More ❯
Technologies: Release & Configuration Windows Linux Server Unix SQL ISEB ISTQB V Model Waterfall Software Test Engineer Needed! Endeavour Recruitment is seeking an experienced Software Test Engineer for their client in Leicester. The Software Test Engineer is required to take responsibility for testing software on multiple projects and ensure all defects are resolved. A background in process control, warehouse automation … Engineers the Software Test Engineer would take ownership of the testing requirements. You must ensure that all function and non-functional requirements are translated into test cases. Manage the configuration control of hardware and software test environments. Perform testing and record results. Ensure testing is carried out with the project constraints. Working Knowledge Required: Software release and configurationmanagement systems. Installation and configuration of applications on Windows/Unix/Linux server environments. Work in Process Control, Warehouse Automation, Control Logistics or a similar business area. Experience in performing Factory and User Acceptance Testing. Testing of mission critical high availability systems. Generating test scenarios from client's brief and translating into functional tests. Minimum of More ❯
for National Cryptologic University classified training enclaves and unclassified learning centers. including: Directory Services (DS): Architecture, governance, development, implementation, maintenance, and oversight of EIT's Active Directories and Directory Management for all Enterprise Services on all domains. Desktop and Enclave Services (DES): governance, development, implementation, maintenance, and oversight of EIT's desktop, mobile platforms, Virtual Desktop Infrastructures (VDI) and … Tier 1 (Help Desk) and Tier 2 and Tier 3(Escalation) problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and … configures network components along with implementing operating systems enhancements to improve reliability and performance. Provide support for implementation, troubleshooting and maintenance of IT systems. Manage the daily activities of configuration and operation of IT systems. Provide Tier 1 (Help Desk) problem identification, diagnosis and resolution of problems. Provide assistance to users in accessing and using IT systems. Provide Tier More ❯
Overview Data Manager to support the Missile Defense Agency Information Management and Software Services (AIMSS) program. This role is critical to managing the full lifecycle of test, mission, and program data across MDA systems. The Data Manager ensures the implementation of data governance practices, oversees tactical and operational data handling, and serves as a liaison between data stakeholders, program … offices, and technical teams. This position supports enterprise-level decision-making and operational readiness by enhancing data quality, accessibility, and mission impact. Responsibilities Develop, implement, and improve Integrated Data Management Plans (IDMPs) and Data Handling Plans (DHPs), addressing data lifecycle stages including collection, validation, storage, dissemination, and archival in accordance with DoD and MDA policies. Coordinate data integration and … on data readiness, delivery status, and performance metrics. Contribute to the ongoing improvement of MDA's data governance practices, including development of processes, technical documentation, and stakeholder training. Implement configurationmanagement practices for controlled data release, ensuring security, traceability, and compliance. Use centralized repositories and standard formats to improve consistency, access, and reuse of authoritative data sources. Translate More ❯
for National Cryptologic University classified training enclaves and unclassified learning centers. including: Directory Services (DS): Architecture, governance, development, implementation, maintenance, and oversight of EIT's Active Directories and Directory Management for all Enterprise Services on all domains. Desktop and Enclave Services (DES): governance, development, implementation, maintenance, and oversight of EIT's desktop, mobile platforms, Virtual Desktop Infrastructures (VDI) and … Tier 1 (Help Desk) and Tier 2 and Tier 3(Escalation) problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and … configures network components along with implementing operating systems enhancements to improve reliability and performance. Provide support for implementation, troubleshooting and maintenance of IT systems. Manage the daily activities of configuration and operation of IT systems. Provide Tier 1 (Help Desk) problem identification, diagnosis and resolution of problems. Provide assistance to users in accessing and using IT systems. Provide Tier More ❯
for National Cryptologic University classified training enclaves and unclassified learning centers. including: Directory Services (DS): Architecture, governance, development, implementation, maintenance, and oversight of EIT's Active Directories and Directory Management for all Enterprise Services on all domains. Desktop and Enclave Services (DES): governance, development, implementation, maintenance, and oversight of EIT's desktop, mobile platforms, Virtual Desktop Infrastructures (VDI) and … Tier 1 (Help Desk) and Tier 2 and Tier 3(Escalation) problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and … configures network components along with implementing operating systems enhancements to improve reliability and performance. Provide support for implementation, troubleshooting and maintenance of IT systems. Manage the daily activities of configuration and operation of IT systems. Provide Tier 1 (Help Desk) problem identification, diagnosis and resolution of problems. Provide assistance to users in accessing and using IT systems. Provide Tier More ❯
eligibility is required. You will leverage your knowledge in systems engineering, Model-Based Systems Engineering (MBSE), and security engineering to support a range of initiatives, including modernization and lifecycle management of PMW 770 programs. This position also involves collaboration with key stakeholders and partner organizations, such as: Naval Information Warfare Systems Command (NAVWAR 5.0) United States Strategic Command (USSTRATCOM … including networking and transport issues. Document risks, issues, and opportunities; develop mitigation strategies and contingency plans; and track their resolution through completion. Document and manage system baseline and change management processes. Ensure alignment of baseline changes, Engineering Change Requests (ECRs), Ship Specification Change Requests, and Temporary Alterations (TEMPALTs) with the Model-Based Systems Engineering (MBSE) baseline. Review these changes … be in the high-risk category will be required to undergo advanced training based on their role and level of access. Individuals with access to modify data and the configuration baseline will require further training. QUALIFICATIONS Proficient in using a variety of tools and systems, including but not limited to: NAVWAR/PEO Installation Data Environment Repository (SPIDER) Navy More ❯
successful candidate will have previous experience as an ISSO and Security Control Assessor having documented the full scope of security documentation in support of the NIST 800-37 (Risk Management Framework (RMF). A strong foundation in the understanding of encryption and how encryption is applied to National Security Systems (NSS) is necessary. Responsibilities Assess DHS NSS systems and … and mitigation plans. Maintain documentation for all NSS compliance activities, including CISO and I&A requests. Monitor and review POAMs to ensure timely mitigation and closure. Analyze continuous monitoring, configurationmanagement, vulnerability management, asset management, software management and self-reported data to identify risk and work with System Teams to develop a plan to mitigate … Office of the Inspector General (OIG). Compile data to support analysis and reporting in support of cyber risk compliance activities and activities stemming from Cybersecurity Supply Chain Risk Management (CSCRM). Create and maintain documentation from all NSS-related compliance activities, to include any incoming Chief Information Security Officer (CISO) and Information and Analysis (I&A) requests for More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
and how it is fitted. Day-to-day, you'll provide support at the Waterfront and be responsible for design information management. Your key responsibilities will include: Maintaining the configuration data and datum pack records for all items as fitted to Royal Navy submarines in accordance with a ConfigurationManagement Plan Maintaining a record of the status … of extant submarine technical documentation to ensure quality assurance is achieved and maintained Ensuring all design change management documentation is managed and maintained correctly within the submarine definition database Working as part of a team as a subject matter expert across Babcock, the Royal Navy, Ministry of Defence (MoD) and industry partners This role is full time, 35 hours … office/onsite and 3 days working from home. Essential experience of the Supportability Engineer Experience in using engineering documentation (such as drawings and technical records) Understanding of change management and the control of project and engineering documentation Desirable Qualifications for the Supportability Engineer HND/BTEC Level 5 qualified in a Science, Technology, Engineering and Mathematics discipline Hold More ❯
Fort George G Meade, MD, United States Description: You will act as a Senior Technical Writer responsible for the preparation, review, revision, and maintenance of operational doctrine documents including management directives, guidance documents, implementation plans, and standard operating procedures. This is an exciting, high-visibility opportunity where you will be working at the office level of Mission Management … is accurate. Organize document content for readability, with a focus on the intended audience. Write/edit content, then publish and distribute final product. Maintain documentation library using existing configurationmanagement processes. Skills Requirements: 8 yrs., B.S. or 6 yrs. w/an M.S., 4 yrs. of additional TW experience may be substituted for a bachelor's degree. … CNO experience required-high-visibility opportunity where you will be working at the office level of Mission Management, requiring frequent interaction with senior leaders throughout the organization. All work focuses on the CNO org and mission TS.SCI w FSP active and current in Maryland Strong editing and proofreading skills. Strong oral and written communication skills. Ability to gather technical More ❯
standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified … information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configurationmanagement (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements … Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). What Sets You Apart: Bachelor of Science degree in Computer Science, Information Assurance, Information Security, or related discipline and 12 or more years of related experience, in lieu of bachelor's degree or a More ❯
specifications for security project Produce rough sketches and using CAD software to prepare detailed drawings, plans and blueprints Visit sites to gather information, to based line security systems for configurationmanagement Update software, drawings and other documents Maintain decorum when feedback is delivered, and implementing any changes to draft as soon as possible Ensure drawings are compliant with … building regulations, engineering principles and ICD 705 compliant Communicate potential design issues to engineers and architects Important skills, knowledge and abilities for this role: Computer-Aided Design (CAD) experience ConfigurationManagement (CM) experience Strong communication skills Ability to conduct research, when required Detail oriented Knowledge of Microsoft Office Suite (including but not limited to Word, Excel and PowerPoint More ❯
integration of new COTS/GOTS systems (network equipment, servers, workstations, etc) into the production environment, responsible for ensuring mission readiness. 2) Manages change controls for documentation within a configurationmanagement database (CMDB) and performs corrective action on any discrepancies or findings. 3) Develops technical solutions and resolves complex user, computer, server, network, appliance, and application issues. Independently … trained on the program specific equipment, the candidate will be relied on as an expert in their AOR, and will be expected to analyze issues, make remediation recommendations to management, and subsequently carry out those remediation processes. Basic Qualifications A dditional 4 years' relevant experience may be considered in lieu of a degree. • Final Secret clearance with ability to … obtain a Top Secret. • Experience with one or more of the following Windows Server administration tools: AD CS, AD DNS, DHCP, etc. • Cisco, Junos, and Palo Alto configuration, maintenance, and troubleshooting. • Network diagram creation experience using Visio or other visualization tools. • Working knowledge of general networking concepts, such as multicast, OSPF, BGP, VLAN, NAT, etc. • Tier 3 network support. More ❯
troubleshooting of the RNEC-NCR network infrastructure, including the Installation Campus Area Network (ICAN). Key Responsibilities: • Network Design & Implementation: Design, implement, test, and troubleshoot intricate network infrastructure. • Ticket Management: Respond to critical and VIP AESMP ticket submissions within two hours of notification by telephone or email. • Network Operations Support: Install and modify hardware, operating systems, and software applications. … . • Authentication & Security: Configure and support the use of DOD Common Access Card (CAC) and Public Key Infrastructure (PKI) for user authentication, signing, and encrypting electronic mail. • Equipment Management: Complete installations, movements, additions, and changes to maintain network infrastructure, including hubs, routers, switches, firewalls, VPNs, SONET multiplexers, servers, SANs, and cable management systems. • Connectivity & Communication: Establish communication links … to support effective connectivity and digital communications between Fort Belvoir and offsite Government facilities. • Software & Application Management: Implement and maintain software and application configurationmanagement and reporting. Install/update antivirus software and security patches. • Access Control: Ensure only approved personnel have access to the Fort Belvoir network. • Secure Data Transmission: Install Government PKI server-side certificates More ❯
standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified … information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configurationmanagement (CM) for information systems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability … Matrices (SRTMs). Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies Assist with preparation and maintenance of documentation Assist in the evaluation of security solutions to ensure they meet security requirements for More ❯
standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified … information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configurationmanagement (CM) for information systems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability … Matrices (SRTMs). Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies Assist with preparation and maintenance of documentation Assist in the evaluation of security solutions to ensure they meet security requirements for More ❯
will maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. You will assist with the management of security aspects of the information system and performs day-to-day security operations of the system. You will evaluate security solutions to ensure they meet security requirements for … processing classified information. You will perform vulnerability/risk assessment analysis to support certification and accreditation. You will provide configurationmanagement (CM) for information system security software, hardware, and firmware. You will manage changes to the system and assess the security impact of those changes. You will prepare and reviews documentation to include System Security Plans (SSPs), Risk … and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). You will support security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). You will be part of an overall effort to provide life cycle services that include systems engineering, integration, software development, testing, configurationmanagementMore ❯
troubleshooting of the RNEC-NCR network infrastructure, including the Installation Campus Area Network (ICAN). Key Responsibilities: • Network Design & Implementation: Design, implement, test, and troubleshoot intricate network infrastructure. • Ticket Management: Respond to critical and VIP AESMP ticket submissions within two hours of notification by telephone or email. • Network Operations Support: Install and modify hardware, operating systems, and software applications. … . • Authentication & Security: Configure and support the use of DOD Common Access Card (CAC) and Public Key Infrastructure (PKI) for user authentication, signing, and encrypting electronic mail. • Equipment Management: Complete installations, movements, additions, and changes to maintain network infrastructure, including hubs, routers, switches, firewalls, VPNs, SONET multiplexers, servers, SANs, and cable management systems. • Connectivity & Communication: Establish communication links … to support effective connectivity and digital communications between Fort Belvoir and offsite Government facilities. • Software & Application Management: Implement and maintain software and application configurationmanagement and reporting. Install/update antivirus software and security patches. • Access Control: Ensure only approved personnel have access to the Fort Belvoir network. • Secure Data Transmission: Install Government PKI server-side certificates More ❯
ensuring timely and accurate completion of tasks. Oversee all aspects of MAC execution, including hardware moves, port activations/deactivations, and office reconfigurations. Ensure compliance with JSP's change management process and track MACs via service request tickets. Conduct root-cause analysis on recurring problems related to MACs, networks, and systems under JSP's responsibility. Include analysis results in … to, coordinate, and manage all Change Requests (CRQs) for additions, removals, and modifications to Government Furnished Equipment (GFE) maintenance coverage. Prepare, submit, and track CRQ approvals, ensuring compliance with configuration and change management processes. Update the ConfigurationManagement Database (CMDB) with MAC information for traceability. Follow established change and configurationmanagement policies and processes … Arlington, VA. T ekSynap is a fast-growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. "Technology moving at the speed of thought" embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our More ❯
We are currently seeking a Financial Systems Analyst (Junior, Financial Management) to support our growing team. Responsibilities: Supporting program schedule development. Supporting the development of business cases and resulting system enhancements Developing and maintaining system documentation and training materials. Developing methodologies for migrating data including validation of information migrated to a new system. Participating in joint meetings related to … technical exchange meetings to support quick resolution of architectural, design, system interoperability and policy issues. Coordinating and participating in milestone events to include requirement reviews, design reviews, and program management reviews. Coordinating with security organizations facilitating security certification and accreditation documentation and activities such as security reviews and package submittals. Minimum TS/SCI clearance with CI polygraph Minimum … four (4) years of experience and two (2) years of relevant experience. Possess a Bachelor's degree or higher in a business related field such as Business, Finance, Accounting, Management, Computer Science, Economics. 4 years of total experience in assessing federal financial business processes, developing Momentum based system options, and/or implementation in all aspects of programming, planning More ❯
for highly qualified Subject Matter Experts (SMEs) Space System Engineers to support our U.S. Space Force, Space Systems Command Space Domain Awareness and Combat Power (SDA&CP) and Battle Management Command, Control and Communications (BMC3) Support Services contract (Hemisphere) in the Huntsville, AL area. Responsibilities SME-Level Space System Engineers assist Program Office leadership performing requirements engineering, solutions engineering … between Combatant Command (COCOM) and Tactical Control (TACON) authorities Domain expertise with the Joint Space Operations Center (JSpOC), USSTRATCOM, and their mission partners and associated relationships Domain expertise in ConfigurationManagement and Change Control, Risk Management and Opportunity Exploitation, Quality Assurance, Requirements Development and Traceability, Design Maturation, Independent Verification and Validation, Analysis of Alternatives, Facility Planning and … dynamics, space system communications, space vehicle hardening, Electro-Magnetic Interference (EMI) properties, and solar power generation and storage Domain expertise developing and preparing space system documentations, including Systems Engineering Management Plans (SEMPs), Quality Assurance Plans (QAPs), Risk Management Plans (RMPs), Test and Evaluation Master Plans (TEMPs), ConfigurationManagement Plans, (CMPs), Integrated Master Plans (IMPs), Program Master More ❯
number of highly qualified Mid-Level (Journeyman) Space System Engineers to support our U.S. Space Force, Space Systems Command Space Domain Awareness and Combat Power (SDA&CP) and Battle Management Command, Control and Communications (BMC3) Support Services contract (Hemisphere) in the Huntsville, AL area. Responsibilities Mid-Level Space System Engineers assist Program Office leadership performing requirements engineering, solutions engineering … relationships between Combatant Command (COCOM) and Tactical Control (TACON) authorities Experience with the Joint Space Operations Center (JSpOC), USSTRATCOM, and their mission partners and associated relationships Practitioner experience in ConfigurationManagement and Change Control, Risk Management and Opportunity Exploitation, Quality Assurance, Requirements Development and Traceability, Design Maturation, Independent Verification and Validation, Analysis of Alternatives, Facility Planning and … launch dynamics, space system communications, space vehicle hardening, Electro-Magnetic Interference (EMI) properties, and solar power generation and storage Experience developing and preparing space system documentation, including Systems Engineering Management Plans (SEMPs), Quality Assurance Plans (QAPs), Risk Management Plans (RMPs), Test and Evaluation Master Plans (TEMPs), ConfigurationManagement Plans, (CMPs), Integrated Master Plans (IMPs), Program Master More ❯