emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
emerging technologies. The Role As a 2nd Line Support Engineer you will be responsible for supporting the mobile operating system environment. Mobile device support is delivered using cloud-based management tools (Workspace ONE, JAMF, Apple Business Manager, Android Enterprise Manager, Samsung KNOX). The Responsibilities * You will oversee the configuration, and in-life support of mobile devices. This … includes policy management changes, configurationmanagement, and post-deployment support. * Work closely with the 3rd line analysts, you will liaise with internal technical teams, customer stakeholders, and service management functions to ensure aligned delivery, transparency, and issue resolution throughout the mobile lifecycle. * Manage incident queues and SLA's, desirable technical knowledge of mobile automation tools, and … to support the end user mobile estate. The ideal candidate will have a good working background in a 2nd line support role and a working knowledge in mobile endpoint management and cloud technologies. The Requirements * Security (SC Clearance) or able to achieve. * Proven experience in a 2nd line support mobile endpoint engineering role * Workspace ONE Unified Endpoint Manager * Apple More ❯
SiloSmashers, Inc. is a strategy, technology, and management consulting firm, founded in 1992, and located in Reston, Virginia. SiloSmashers delivers superior services and solutions to the public sector in the areas of project/program management, performance management, and IT security. The company provides innovative, collaborative business approaches, and proven methodologies that enable customers to break down … The Program Manager serves as the single point of contact for the contracting officer and the contracting officer's representative. The ideal candidate has experience managing a security program management office (PMO), positively affecting change and improving operations in a federal cybersecurity environment. The position entails managing a team of up to 50 individuals. General Responsibilities Collect requirements from … customer on production and delivery of documentation providing operational guidance and processes around cybersecurity capability services, cybersecurity management, and other topics as needed. Translate technical cybersecurity capability requirements into stakeholder needs and solutions statements. Manages overall contract financials. Maintains a budget and seeks efficiencies to save costs. Produces financial reports as required by the contract and by management. Primary More ❯
rapid responses to changes within the existing infrastructure and adjust services according to need. • Standardization: Service delivery strategies must support existing services on standardized platforms for DISA infrastructure. Program Management Higher level tasks, stand ups, regular briefings, to include in progress reviews. Deployment, Configuration, Change Control • Provide asset management status updates, configuration control, and change management … for IFR, Moves, Adds, and Changes (MACs) and decommissions. • Build, install, provide test and acceptance services to include any life-cycle upgrades/technology that impact of program. IFR Management • Key focal point for DISA customers and support agencies, systems administrators, telecom companies, and contractors requiring on premises footprint, power, and telecom services. Operational Engineering • Support the definition of … requirements for upgrades and lifecycle replacements (Continual Service Improvement) Project Engineering • Support the definition of requirements for upgrades and lifecycle replacements (Continual Service • Project management and execution for deployment efforts in accordance with (IAW) enterprise engineering standards • Support customer migrations Performance Requirements • The contractor shall provide support for overall operations, maintenance, change and configurationmanagement, and deployment More ❯
rapid responses to changes within the existing infrastructure and adjust services according to need. • Standardization: Service delivery strategies must support existing services on standardized platforms for DISA infrastructure. Program Management Higher level tasks, stand ups, regular briefings, to include in progress reviews. Deployment, Configuration, Change Control • Provide asset management status updates, configuration control, and change management … for IFR, Moves, Adds, and Changes (MACs) and decommissions. • Build, install, provide test and acceptance services to include any life-cycle upgrades/technology that impact of program. IFR Management • Key focal point for DISA customers and support agencies, systems administrators, telecom companies, and contractors requiring on premises footprint, power, and telecom services. Operational Engineering • Support the definition of … requirements for upgrades and lifecycle replacements (Continual Service Improvement) Project Engineering • Support the definition of requirements for upgrades and lifecycle replacements (Continual Service • Project management and execution for deployment efforts in accordance with (IAW) enterprise engineering standards • Support customer migrations Performance Requirements • The contractor shall provide support for overall operations, maintenance, change and configurationmanagement, and deployment More ❯
Gloucester, Gloucestershire, South West, United Kingdom
PS Computer Services Ltd t/a Parker Shaw
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) If More ❯
analyst understanding what data sets resides where and support which requirements. Analysing and understanding federation vs integration Documenting integration requirements, flows, subscriptions etc to support use cases Understanding of ConfigurationManagement Knowledge of access methodologies, data analysis Define data standards, taxonomies, and naming conventions across ITSM Knowledge of ITIL Principals SACM (Service Asset & ConfigurationManagement) Data More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Education and Experience: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related experience More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Required Education and Experience : Bachelor's degree -or- 4 years of relevant additional experience in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience : Bachelor's degree - or - 4 years of additional experience in lieu of degree. 2-5 years related experience, especially More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Education and Experience Required: Bachelor's degree -or- 4 years of additional experience in lieu of degree 2-5 years related experience More ❯
We are seeking a highly experienced Senior Submarine CM & Logistics Analyst to lead ConfigurationManagement (CM) and Integrated Logistics Support (ILS) activities for a high-priority Navy submarine program. This critical role supports strategic initiatives focused on improving lifecycle sustainment, engineering change processes, and logistics readiness across complex undersea warfare systems. The ideal candidate will bring deep expertise … processes, hands-on experience with submarine platforms, and a proactive leadership style that drives compliance, efficiency, and technical excellence. Key Responsibilities: Lead the development, implementation, and continuous improvement of ConfigurationManagement processes and ILS strategies. Oversee the preparation and execution of Engineering Change Documents (ECDs), including ECIs, TECIs, CPs, and ECPs. Ensure compliance with Navy CM policies and More ❯
Looking for a role that will have a meaningful impact on project management? We are looking for an individual to support the delivery of a strategic priority, Best of Markel (BoM) and other growth initiatives. What part will you play? If you're looking for a place where you can make a meaningful difference, you've found it. The … of MINT's strategic programmes and operational change priorities in collaboration with business teams and IT. The team currently comprises of three main capabilities - business analysis, programme/project management and portfolio management office. Best of Markel is about using existing products and capabilities to capitalise on market opportunities in different business lines and countries. You will work … programme risks, including the development of contingency plans Monitoring and reporting overall progress, resourcing and budget, initiating corrective action where necessary Maintaining project and programme governance, change control and configurationmanagement Continuously driving lessons learned and scanning for opportunities at the portfolio and team level Working with IT stakeholders to ensure products are delivered to technical standards Working More ❯
/SCI Required RPI Group, Inc. is seeking an Intel COMSEC Specialist to join our team in support of a critical national security mission. This role ensures the proper configuration, management, and operational readiness of communications security (COMSEC) systems. The ideal candidate will have hands-on experience with TACLANE systems, GemOne workstations, and secure communications practices in alignment … be able to demonstrate the following knowledge and/or experience: • Collaborating with key personnel to verify appropriate storage requirements for classified communication equipment • Coordinating monthly and annual COMSEC management activities • Tracking Controlled Cryptographic Item (CCI) equipment and rekey status across the program • Maintaining and operating primary GemOne workstations, including coordinating updates and security controls with system administrators • Managing … TACLANE network configurations, including lifecycle support, troubleshooting, hands-on configurationmanagement, and secure network integration. • Delivering technical troubleshooting support across all assigned COMSEC systems Qualifications: • Bachelor of Science in Information Systems, Information Technology, Computer Science, Computer Engineering • A combined total of ten (10) years of full-time professional experience covering all required disciplines listed above • Active Top Secret More ❯
and deliver high value, complex projects across its Surface Ship domain, managing programmes in excess of £10M from inception through to completion, demonstrating strong leadership, strategic thinking and stakeholder management skills. Knowledge and experience of the Project Manager: Experience of successfully delivering complex technical products from initial design definition through to final test and acceptance into service. Excellent organisational … will lead the project delivery. Clear definition and placement of work packages including key subcontracts required to deliver the project. Ensuring appropriate risk, opportunity, security, trade controls, quality and configurationmanagement for the project. Planning, monitoring, control and update of the project including management of project Life Cycle. Management gate reviews. Ensuring that the contract remains … up to date and consistent with the project goals and business objectives. Ensuring that contract milestones are met and that cash flow is optimised. Bid Management -PMs are also key contributors to bids and are required to apply the fundamental project management principles and methodology to bids including: Stakeholder management WBS, OBS and programme definition (external and More ❯
and deliver high value, complex projects across its Surface Ship domain, managing programmes in excess of £10M from inception through to completion, demonstrating strong leadership, strategic thinking and stakeholder management skills. Knowledge and experience of the Project Manager: Experience of successfully delivering complex technical products from initial design definition through to final test and acceptance into service. Excellent organisational … will lead the project delivery. Clear definition and placement of work packages including key subcontracts required to deliver the project. Ensuring appropriate risk, opportunity, security, trade controls, quality and configurationmanagement for the project. Planning, monitoring, control and update of the project including management of project Life Cycle. Management gate reviews. Ensuring that the contract remains … up to date and consistent with the project goals and business objectives. Ensuring that contract milestones are met and that cash flow is optimised. Bid Management -PMs are also key contributors to bids and are required to apply the fundamental project management principles and methodology to bids including: Stakeholder management WBS, OBS and programme definition (external and More ❯
and deliver high value, complex projects across its Surface Ship domain, managing programmes in excess of £10M from inception through to completion, demonstrating strong leadership, strategic thinking and stakeholder management skills. Knowledge and experience of the Project Manager: Experience of successfully delivering complex technical products from initial design definition through to final test and acceptance into service. Excellent organisational … will lead the project delivery. Clear definition and placement of work packages including key subcontracts required to deliver the project. Ensuring appropriate risk, opportunity, security, trade controls, quality and configurationmanagement for the project. Planning, monitoring, control and update of the project including management of project Life Cycle. Management gate reviews. Ensuring that the contract remains … up to date and consistent with the project goals and business objectives. Ensuring that contract milestones are met and that cash flow is optimised. Bid Management -PMs are also key contributors to bids and are required to apply the fundamental project management principles and methodology to bids including: Stakeholder management WBS, OBS and programme definition (external and More ❯
GitLab, or Jenkins). • Proficiency in scripting languages like Python, Bash and PowerShell to automate routine tasks and processes within a pipeline. • 2+ years experience in automated infrastructure provisioning, configurationmanagement and deployment processes (Configuration as Code) using tools like Ansible, Terraform or similar (Desired State Configuration (DSD . • Proficient in virtualized storage solution design, planning … configuration, and troubleshooting; particularly using VMware environments. • Expertise in system administration to include managing and maintaining IT infrastructure such as servers, networks, and storage systems. • Understanding of Microsoft server infrastructure, virtualization, and networking principles. • Proficient in GitLab runners, including expertise in runner installation, registration, and configuring executors on various operating systems (Windows and Linux), as well as pipeline configuration. … or end users. Additional Desired Skills: • Experience using project planning software (such as Jira, Jira Service Desk and Confluence for planning and task tracking). • Expertise in Azure Infrastructure Management to include virtual machines, networks, storage, and security solutions, ensuring optimal performance, scalability, and reliability. • Expertise in hybrid cloud integrations to include creating strategies and implementing solutions that include More ❯
coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of network security … DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. Missile Defense Agency Ground-based Midcourse Defense (GMD) Communications Network. Other key services provided include operational engineering, service activations, performance management, configurationmanagement, administration and security. PRIMARY RESPONSIBILITIES: Self- motivated and driven to seek solutions to resolve monitoring errors, using research and documentation. Troubleshoot circuits using router commands … baseline certification (Security+ CE, or equivalent) at start date. Ability to work in a 24/7 operation. Experience with one or more of the following: alarm surveillance, fault management, LAN maintenance, performance management. Expertise in one or more of the following: routers, switches, crypto devices, routing, DSN/DRSN, Video Services, Promina, CISCO, Juniper, MSPP, DWDM, Optical Switching. More ❯