software development/coding experience At a minimum three (3) years of experience with web development with .NET, MVC, C#, HTML, CSS, JavaScript, and SQL Understand and use change management functions for production turnover Possesses skills to organize and implement operational level configurationmanagement TS/SCI clearance More ❯
and Intelligence (C4I)/Information Technology (IT) electronic systems equipment, infrastructure, engineering, design, installation, Supply and Warehouse support to Naval Information Warfare Center Pacific (NIWC Pacific) during design, installation, configuration, and transition to operations of the IT infrastructure for multiple facilities. This initiative aims to design, plan, procure, and implement comprehensive IT solutions within the NC3 Alert Campus/… TLD) by drafting and refining assigned portions of the document and participate in interim and final reviews to ensure alignment with identified requirements and feasibility within project constraints • System Management & Maintenance - Install, configure, and maintain Mac and Windows systems, ensuring optimal performance, security, and uptime. • User Support & Troubleshooting - Provide technical support, diagnose hardware/software issues, and resolve system … Assist the NIWC Pacific Government team in planning, executing and documenting development of SOVTs in accordance with Shore Installation Process. • Assist the Government in engineering input to support procurement, configurationmanagement, and certification and accreditation. • Identifies and evaluates solution risks and creates strategies and plans to mitigate those risks. Requirements: • 6 to 8 years of systems administration experience More ❯
and Intelligence (C4I)/Information Technology (IT) electronic systems equipment, infrastructure, engineering, design, installation, Supply and Warehouse support to Naval Information Warfare Center Pacific (NIWC Pacific) during design, installation, configuration, and transition to operations of the IT infrastructure for multiple facilities. This initiative aims to design, plan, procure, and implement comprehensive IT solutions within the NC3 Alert Campus/… alignment with identified requirements and feasibility within project constraints • Security Architecture & Design - Design, implement, and maintain security frameworks, protocols, and solutions to safeguard DoD enterprise IT infrastructure. • Compliance & Risk Management - Ensure compliance with industry standards (e.g., NIST, GDPR) and implement risk management strategies to protect against vulnerabilities, data loss, and cyber threats. • Collaboration & Documentation - Work closely with engineers … Assist the NIWC Pacific Government team in planning, executing and documenting development of SOVTs in accordance with Shore Installation Process. • Assist the Government in engineering input to support procurement, configurationmanagement, and certification and accreditation. • Identifies and evaluates solution risks and creates strategies and plans to mitigate those risks. Requirements: • 6 to 8 years of systems engineering experience More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries Education and Experience: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related experience More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Experience and Education : Bachelor's degree 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience : Bachelor's degree - or - 4 years of additional experience in lieu of degree. 2-5 years related experience, especially More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Education and Experience Required: Bachelor's degree -or- 4 years of additional, relevant experience, in lieu of degree 2-5 years related More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities … security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configurationmanagement changes to the authorization boundaries. Required Education and Experience : Bachelor's degree -or- 4 years of relevant additional experience in lieu of degree 2-5 years related More ❯
Job Description: We are seeking a Junior Engineer to support the test, evaluation, and integration of C5ISR systems with a focus on configurationmanagement and electromagnetic environmental effects (E3). The ideal candidate will have a foundational understanding of EMI/EMC, EMP, and shipboard electromagnetic compatibility and will work alongside senior engineers to conduct testing, analysis, and … technical assessments in support of Navy programs. Key Responsibilities: Assist in the test, evaluation, and integration of C5ISR systems related to configuration management. Support EMI/EMC analysis, problem investigation, and mitigation strategies. Conduct E3 computation, modeling, and simulation to assess electromagnetic effects. Participate in EMP and PCI shipboard testing to ensure system resilience and compliance. Perform technical assessments … in an engineering, scientific, or technical discipline from an accredited college or university. At least one (1) year of experience in test, evaluation, and integration related to C5ISR system configuration management. Experience in one or more of the following areas: Integrated Topside Design EMP testing, modeling, and simulation E3 computation and analysis EMI/EMC problem investigation and resolution More ❯
the IT Service Delivery Manager, the Application Support Analyst has primary responsibility for providing day to day operational support for the Company Application Portfolio, through the effective use and management of incident, requests and problems. You will be responsible for the regular monitoring and maintenance of the application portfolio. You will be responsible for the change management process … plan and are scheduled in conjunction with the SSC and 3 rd party suppliers as appropriate. In addition you will provide appropriate SharePoint expertise, in terms of support, content management and development of sites, services and functionality. Responsibilities Provide 2 nd and 3 rd line support for the Company application portfolio Monitor application systems, identifying performance trends and taking … as required for project deliverables Ensure that pro-formas are completed and submitted and track delivery Provide test support for new and enhanced systems/applications Responsible for Change Management process, ensuring that changes are managed, roll-back plans are in place and that they are appropriately scheduled and approved, liasing with SSC Change Manager Owns ConfigurationManagementMore ❯
Welwyn Garden City, Hertfordshire, South East, United Kingdom
Aimtech Recruitment Ltd
vision of how to future-proof this. Take ownership of supplier relationships with a strong technical understanding that enables the conversation to be beneficial to all parties. Ensure Change Management and ConfigurationManagement is is robust and upheld Maintain clear documentation. Strong knowledge of Microsoft products including but not limited to Intune, VMWare and Azure. You will More ❯
Demonstrates high responsiveness for technology issues, security compliance, and SLA attainment Drives problems to root cause through partnership with engineers, ensuring knowledge is captured for future events Develops software configurationmanagement standards and performs data de-identification and provisioning Documents and tracks hardware and software configuration, migration, testing, and deployment solutions rovides user support for an enterprise More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
of the client LAN/WAN devices. Respond to and resolve incident tickets. Draft and implement standard network change requests. Provide support to Tier III network engineers for incident management and projects (site surveys, TEMS, coordinate and install new equipment). Perform configurationmanagement functions such as update topology drawings, ensure asset management records are accurate More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments … that the features and assurances required for each protection level functioning Maintain a and/or applicable repository for all system authorization documentation and modifications Institute and implement a Configuration Control Board (CCB) charter Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents Ensure proper protection or corrective measures have … cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configurationmanagement (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of More ❯
Signature Federal Systems has an opening for a Government Network Operations Center (GNOC) Tier II Incident Management Technician to support the customer's computer data communications systems, providing network event management and incident troubleshooting. Technicians provide additional support by ensuring network devices meet baseline configurations, software, and network performance standards. Technicians will make extensive use of Microfocus tools … Respond to, update, and resolve incident tickets within ServiceNow. • Administer networks including hardware, systems software, applications software, and all hardware configurations. • Coordinate network operations, maintenance, repairs, or upgrades. Perform configurationmanagement functions such as validating topology drawings and ensure that asset management records are accurate. • Leverage knowledge of OSI layers 1, 2, and 3 to troubleshoot various More ❯
of the client LAN/WAN devices. • Respond to and resolve incident tickets. • Draft and implement standard network change requests. • Provide support to Tier III network engineers for incident management and projects (site surveys, TEMS, coordinate and install new equipment). • Perform configurationmanagement functions such as update topology drawings, ensure asset management records are accurate More ❯
of the client LAN/WAN devices. • Respond to and resolve incident tickets. • Draft and implement standard network change requests. • Provide support to Tier III network engineers for incident management and projects (site surveys, TEMS, coordinate and install new equipment). • Perform configurationmanagement functions such as update topology drawings, ensure asset management records are accurate More ❯