smooth adoption across the organization. Collaborate with IT teams and stakeholders to assess current on-premises services and develop migration strategies to M365 and Azure. Lead the implementation and configuration of M365 and Azure cloud services, adhering to best practices and security standards. Provide technical expertise and support for troubleshooting and resolving issues related to M365 and Azure cloud … communication skills, both verbal and written, with the ability to explain technical concepts to non-technical stakeholders Experience with migrating on-premises services to M365 and Azure, including identity management and integration Proficiency in scripting languages (eg, PowerShell) for automation and configurationmanagement tasks Proven experience as an M365 Engineer, Cloud Engineer, or similar role, with a … skills, with the ability to troubleshoot complex storage issues Strong knowledge of cloud security principles and best practices Strong understanding of Microsoft 365 (M365) and Azure platforms, including identity management, authentication mechanisms, and security controls Qualifications: Twenty (20) years of experience as an SE in programs and contracts of similar scope, type and complexity is required. Bachelor's degree More ❯
Engineer (SWE) develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements for the Data Transport System (DTS) • DTS products include but are not limited to: Cloud storage areas: Apache Accumulo (Apache Zookeeper, ApacheHadoop), Oracle … data Cache/Storage: Redis, Graph Compute engine/Query Interface apache Tinkerpop/Gremlin. Rules Engine: JBoss Drools, Apache Camel, Spring Framework: used extensively to standardize/simplify configuration logic control, data access, security, Web-tier, etc. Candidates will: o Analyze user requirements to derive software design and performance requirements o Debug existing software and correct defects o … deployments is required • Knowledge of the Spring Framework and Dependency Injection. • Linux proficiency is required, all development is done on Linux systems. • Working knowledge of Git, Maven, Gradle • Use configurationmanagement tools and repositories (i.e. Maven, Eclipse, GIT, Redmine) • Ability to support Multi-threaded applications • Knowledge of RESTFUL services and containers (Oracle WebLogic, JBoss, Tomcat) • Working Knowledge of More ❯
referred to as the “Purchaser”) is seeking an L3 Application Support Engineer (HR Applications & CIS Security Support) to provide ongoing support for the NBAC Business Area for the Personnel Management Application Service. This role will focus on ensuring continued L3 support for existing HR applications while also offering expert guidance and consultation on CIS Security efforts when required. Objectives … The Personnel Management Application Service is an integrated service which consisting of multiple flavors, which provides software applications for personnel management, ID card management, installation access management, entitlements management; and enables business users to provide HR and personnel services across NATO (ACO commands, ACT, NCIA).This Statement of Work aims to enhance the support model … for NBAC Personnel Management Application Service, focusing on maintaining existing applications while providing support for CIS Security evaluation.The ideal candidate should have: Expertise in COTS application deployment and support Strong background in cloud technologies (Azure/AWS) Proven experience in configuring and supporting: RLDatix - DefenceSuite/OneView (APMS), Creative Information Technology – manageID (AMIS), PNMSoft Sequence Strong analytical, problem-solving More ❯
system security architecture. Assessing and mitigating system security threats and risks throughout the program life cycle. Leading and/or contributing to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for various system and networking operations. Effectively collaborating with other internal technical experts on a day-to-day basis. Communicating with Program Managers and POCs … security posture of the system. Evaluating, reviewing, and testing critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using common methodologies and tools. Managing and enforcing security strategies and policies that affect various components of geographically distributed systems. Providing configurationmanagement for security-relevant … Program Managers, Customer technical experts, and internal program teams. Formulating security compliance requirements for new system features. Identifying and remediating security issues throughout the system. Supporting risk assessment, risk management, security control assessment, continuous monitoring, service design, and other IA program support functions. Working with development teams to enrich team-wide understanding of different types of vulnerabilities, attack vectors More ❯
will be required to sign additional NDAs and provide proof of Other Conflicts of Interests for performance in the PMO. Duties include: Develop and maintain Systems Engineering Plans (SEP), ConfigurationManagement Plan (CMP) and other engineering documentation Develop and maintain standard acquisition documentation for PMO portfolio including standardized requirements documentation and process Implement repeatable processes and procedures for … transitioning new technologies and integrating new applications into PMO infrastructure Participate in requirements development and configuration baseline documentation Provide evaluations of proposed industry solutions to identify innovative and new technologies to prototype and transition into the PMO programs Provide baseline requirements for Requests For Change (RFCs), Interface Control Documents (ICDs), standard support to include the full breadth of the … degree 12 years of technical experience is required Demonstrated experience with Integrated Protection Strategy Demonstrated experience with threats including SOSI, Radar and Optical sensors, Command and Control (C2), Battle Management Command, Control, and Communications (BMC3), orbital analysis, and Offensive Space Control/Defensive Space Control (OSC/DSC) Demonstrated experience dealing with data and data sources that exist at More ❯
Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system … system security architecture. Assessing and mitigating system security threats and risks throughout the program life cycle. Leading and/or contributing to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various system and networking operations. Effectively collaborating with other internal technical experts on a day-to-day basis. Communicating with Program Managers and POCs … security posture of the system. Evaluating, reviewing, and testing critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using common methodologies and tools. Managing and enforcing security strategies and policies that effect various components of geographically distributed systems. Providing configurationmanagement for security-relevant More ❯
Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system … system security architecture. Assessing and mitigating system security threats and risks throughout the program life cycle. Leading and/or contributing to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various system and networking operations. Effectively collaborating with other internal technical experts on a day-to-day basis. Communicating with Program Managers and POCs … security posture of the system. Evaluating, reviewing, and testing critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using common methodologies and tools. Managing and enforcing security strategies and policies that effect various components of geographically distributed systems. Providing configurationmanagement for security-relevant More ❯
accredited university and 2 years of related experience, or a Master's Degree and 0 years of related experience. Proficiency in C++ Experience with Git/GitLab for software configurationmanagement Experience using Red Hat Enterprise Linux OS Experience programming network connections (message generation, formatting, UDP and TCP/IP interfaces) Experience with testing sophisticated software within Agile … or a Master's Degree and 3 years of related experience, or 1 years of experience with a PhD. Proficiency in C++ Experience with Git/GitLab for software configurationmanagement Experience using Red Hat Enterprise Linux OS Experience with testing sophisticated software within Agile or SAFe. Experience programming network connections (message generation, formatting, UDP and TCP/… and is required to start. Preferred Qualifications: Experience with test automation or analysis automation Agile Scrum experience Experience with Java and user interfaces Jira - issue tracking and agile project management, or similar tool Multi-core and multi-threaded programming Familiarity with MDA Sensors and missile defense systems Familiarity with modeling and simulation tools Current active in-scope U.S. Government More ❯
CeMM Research Center for Molecular Medicine of the Austrian Academy of Sciences
petabytes of storage in a production environment. Troubleshoot and resolve technical issues including systems, hardware, application software, and networking. Design, develop, implement system administration tasks, including hardware and software configuration, configurationmanagement, networking and metrics. Actively monitor the systems. Answer and resolve user tickets. Environment Dell nodes: Ice Lake and Sapphire Rapids CPUs: totaling approximately … Linux system administration and scripting (e.g., bash, python). Experienced with a job scheduler such as Slurm Experienced with parallel file systems and storage. Lustre is preferred Experience with configurationmanagement and orchestration software. BCM is preferred Experience with reproducible software installations is preferred Experience with Infiniband is preferred. Experience with GPUs is preferred. Experience with containers is More ❯
Technical Process Area - Stakeholder Requirements Definition, Requirements Analysis, Architectural Design, Implementation, Integration, Verification, Transition, Validation, Operation, Maintenance, and Disposal Project Process Area - Project Planning, Project Assessment and Control, Decision Management, Risk Management, ConfigurationManagement, Information Management, and Measurement. Enterprise (Organizational Project-Enabling) Process Area - Project Portfolio Management, Infrastructure Management, lifecycle Model Management, Human Resource Management, and Quality Management. Agreement Process Area - Acquisition and Supply. Perform analysis of technical alternatives for a project and make preliminary recommendations. Independently analyze and recommend alternatives for elements of project's technical design. You're required to have this: 14+ years' experience with High School Diploma.; 10+ years' experience with Bachelor's Degree; 8+ years More ❯
provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Required Skills: Utilize Joint Special Access Program Implementation Guide (JSIG)/Risk Management Framework (RMF) to achieve and maintain Authorization to Operate (ATO), Interim Authorization To Test (IATT), and Authority to Connect (ATC) for all existing and new Information Systems (IS) that … ConMon), Security Assessment Reports (SAR), and Plan of Actions and Milestones (POA&M). Ability to Develop and update documentation, policy and procedures such as: Ports Protocols and Services Management (PPSM) worksheets, system and network diagrams/descriptions, and SOPs. Coordinate and perform security audits and system updates to identify nonstandard events and maintain system and information integrity. Play … on Accredited Information Systems (AIS) its environment of operation to include developing and updating the system artifacts. Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Report Cyber incidents or vulnerabilities to the ISSM and/or government chain of command Strong ability to produce and maintain varied More ❯
HTML, XML, XSLT, Web Services. Cloud: AWS (Lambdas, EC2, EKS, RDS). Tools and Methodologies: Development IDEs (Eclipse, Visual Studio Code, Visual Studio, Rhapsody, WebStorm), software source control and configurationmanagement tools, Agile methodologies, NiFi Workflow management, Data Engineering & ETL, Python Regex & Parsing. Compensation varies per contract position. One representative example would be yearly compensation of More ❯
Access Protocol (SOAP), and JavaScript Object Notation (JSON) Develop responsive web applications compatible across multiple platforms and browsers including Chrome, Internet Explorer, and iOS, using modern UI frameworks. Lead configurationmanagement activities including identification, change control, status accounting, auditing, and maintaining accurate configuration documentation. Engineer and implement secure CI/CD pipelines, integrating DevOpsSec principles and deploying … services such as Apache ActiveMQ and AWS SQS for efficient data communication between distributed systems. Professional Skills Ability to work in a fast-paced environment Strong leadership and team management skills Exceptional problem-solving and critical thinking abilities Excellent communication, presentation, and stakeholder management skills Conflict resolution skills to mitigate risks, resolve issues, and ensure timely and accurate More ❯
actions as needed. Organizes and conducts post implementation meetings to collect improvement suggestions for future Releases. Provides a Communication plan for the Release with all relevant stakeholders including Project Management, Service Introduction, Service Management, and the Service Integrator. Manages Supplier's escalations regarding coordination of environment, test and deployment teams. Ensures teams follow the established Release and Deployment … Management standards and procedures within their organization. Provides constant updates to the Release record. Provides relevant and agreed documentation. Agrees policy with SACM for the access and control of DML (Definitive media library) contents. Manages reporting for Release Management within Supplier's own organization and attends the relevant reporting meetings. Ensures all documentation is completed and updated throughout … Release Co-Ordinator function. Education & Experience: Bachelor's degree in IT, Computer Science, Business, or related field (or equivalent practical experience). 3+ years of experience in IT Service Management, Release & Deployment Management, or related roles. Previous experience working with external suppliers or vendor coordination is highly desirable. Familiarity with ITIL frameworks, particularly in Release and Deployment Management. More ❯
is hiring a Deputy Program Manager for Operations responsible for actively supporting the overall execution of the IT Operations component of an Intelligence Community (IC) program to include the management an oversight of data warehousing, data management and interfaces, data visualization and reporting, SharePoint and Tableau resources. Qualified candidates will have direct experience in IT project management … serving as a key liaison between the program leadership and project teams. Duties and responsibilities: Assisting the Program Manager: Actively supporting the Program Manager in all aspects of program management, including planning, scheduling, budgeting, risk management, talent management and quality control. Project Management Oversight: Leading and managing individual projects within the program, ensuring tasks are completed … on time, within budget, and meeting quality standards. Stakeholder Management: Maintaining strong relationships with key stakeholders, including clients, internal teams, and external vendors, communicating progress and addressing concerns. Performance Monitoring: Tracking program performance against key metrics, identifying potential issues, and proposing corrective actions. Reporting and Documentation: Preparing regular program status reports, presentations, and other required documentation for senior management. More ❯
Expertise in software integration of COTS and Government Off-the-Shelf (GOTS) products • VMware, Xen, Hyper V and other virtualization platforms • Education relevant to computer engineering, information security, information management, and/or computer science • Experience in technical project management • Technical experience in configuring and supporting, at minimum, Windows, Linux, Unix, Mac OS • Technical experience in configuring and … supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configurationmanagement, system maintenance, integration testing, and information system engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through knowledgeable and experienced subject matter experts who recommend innovative solutions to solve complex problems. More ❯
software integration of COTS and Government Off-the-Shelf (GOTS) products • Knowledge of VMware, Xen, Hyper V and other virtualization platforms • Education relevant to computer engineering, information security, information management, and/or computer science • Experience in technical project management • Technical experience in configuring and supporting, at minimum, Windows, Linux, Unix, Mac OS • Technical experience in configuring and … supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configurationmanagement, system maintenance, integration testing, and information system engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through knowledgeable and experienced subject matter experts who recommend innovative solutions to solve complex problems. More ❯
in CS, Computer Engineering, Aerospace Engineering, or an Engineering field Nice If You Have: Experience using back-end and front-end languages to develop complete solutions Experience with software configurationmanagement using Git Experience with containerization tools and techniques Experience using back-end and front-end languages to develop complete solutions Ability to acquire client requirements and resolve More ❯
software integration of COTS and Government Off-the-Shelf (GOTS) products • Knowledge of VMware, Xen, Hyper V and other virtualization platforms • Education relevant to computer engineering, information security, information management, and/or computer science • Experience in technical project management • Technical experience in configuring and supporting, at minimum, Windows, Linux, Unix, Mac OS • Technical experience in configuring and … supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configurationmanagement, system maintenance, integration testing, and information system engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through knowledgeable and experienced subject matter experts who recommend innovative solutions to solve complex problems. More ❯
Expertise in software integration of COTS and Government Off-the-Shelf (GOTS) products • VMware, Xen, Hyper V and other virtualization platforms • Education relevant to computer engineering, information security, information management, and/or computer science • Experience in technical project management • Technical experience in configuring and supporting, at minimum, Windows, Linux, Unix, Mac OS • Technical experience in configuring and … supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configurationmanagement, system maintenance, integration testing, and information system engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through knowledgeable and experienced subject matter experts who recommend innovative solutions to solve complex problems. More ❯
Configuring and supporting Windows, Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configurationmanagement System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution … security tools and associated documentation Security procedures for systems and software within area of expertise to ensure consistent security policy implementation Education relevant to computer engineer, information security, information management, and/or computer science Experience in technical project management Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through More ❯
mechanisms into pipeline. Work with software and system engineers to apply automated test and documentation processes. Troubleshoot and resolve network, automation pipelines, and infrastructure issues. Build, maintain, and monitor configurationmanagement of release products. Create and deliver program and project artifacts and deliverables. Mandatory Qualifications: Must be a US citizen and have a current/active TS/… and CI polygraph. Bachelors degree in relevant field. 8 years of relevant professional experience. Experience leading and/or managing a team of engineers. CompTIA Security+. Experience with source configurationmanagement tools such as Git. CI & CD development experience with technologies like Bash, Jenkins, or GitLab. Experience with automated deployment technologies such as Cloud Formation, and Ansible. Cloud More ❯
Configuring and supporting Windows, Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configurationmanagement • System maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution … security tools and associated documentation • Security procedures for systems and software within area of expertise to ensure consistent security policy implementation • Education relevant to computer engineer, information security, information management, and/or computer science • Experience in technical project management Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through More ❯
Configuring and supporting Windows, Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configurationmanagement • System maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution … security tools and associated documentation • Security procedures for systems and software within area of expertise to ensure consistent security policy implementation • Education relevant to computer engineer, information security, information management, and/or computer science • Experience in technical project management Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through More ❯
Configuring and supporting Windows, Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configurationmanagement System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution … security tools and associated documentation Security procedures for systems and software within area of expertise to ensure consistent security policy implementation Education relevant to computer engineer, information security, information management, and/or computer science Experience in technical project management Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services through More ❯