work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities More ❯
work in close coordination with the ISSM and ISSO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendations to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include providing security coordination and review of all system assessment plans Identify cyber security vulnerabilities More ❯
and Intelligence (C4I)/Information Technology (IT) electronic systems equipment, infrastructure, engineering, design, installation, Supply and Warehouse support to Naval Information Warfare Center Pacific (NIWC Pacific) during design, installation, configuration, and transition to operations of the IT infrastructure for multiple facilities. This initiative aims to design, plan, procure, and implement comprehensive IT solutions within the NC3 Alert Campus/… Assist the NIWC Pacific Government team in planning, executing and documenting development of SOVTs in accordance with Shore Installation Process. • Assist the Government in engineering input to support procurement, configurationmanagement, and certification and accreditation. • Identifies and evaluates solution risks and creates strategies and plans to mitigate those risks. Requirements: • 10 years of systems engineering experience • CCNP or More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities More ❯
PL/SQL, particularly in large-scale information systems High proficiency in Oracle SQL & PL/SQL , with a focus on writing clean, efficient code A solid understanding of configurationmanagement and issue tracking systems Knowledge of HTML, JavaScript, Java, JSON , and a willingness to learn new technologies Strong OLTP experience What We're Looking For: Exceptional diagnostic More ❯
work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configurationmanagement across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access … and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities More ❯
FSO is responsible for implementing and maintaining a security program that complies with the NISPOM (32 CFR Part 117) and other regulations, and partnering with cognizant security authorities, senior management, and personnel. The FSO provides support for all security actions in accordance with corporate and governmental policies and directives. The ISSM is responsible for ensuring the appropriate operational security … security posture to site, group and corporate leadership • Ensure proper training and routine oversight of site reception duties, to include badge handling and processing, visitor control and physical security management o Oversee badging of employees, visitors, consultants and government representatives to ensure compliance with Sparton policy • Manage visit requests and Cleared personnel visit requests utilizing DISS. Process and manage … security clearances using/DISS and assist new applicants with the e-QIP process. • Plan, examine, analyze, evaluate and provide oversight of security operations; prepare reports and record for management team. • Conduct annual clearance justifications and advise leadership when an employee does not meet clearance requirements • Manage the Operational Security (OPSEC) requirements for all government sensitive programs and ensure More ❯
Required: TS/SCI Full Scope Polygraph Job Description This role provides technical expertise in network engineering, administration, and operations. This role maintains enterprise network infrastructure to ensure proper configuration, availability, performance, capacity, and maintenance (including application of the latest patches and upgrades). This role monitors technology obsolescence, manages upgrades, and evaluates alternatives across on-premises and cloud … and stand-alone Apple and Windows based workstation hardware as well as compatibility of applications between Operating system manufacturers and across OS versions. • Demonstrated experience applying quality assurance and configurationmanagement best practices. • Demonstrated experience evaluating new hardware or software to provide recommendations for procurement. • Demonstrated experience recommending process changes to improve efficiency. • Demonstrated experience ensuring component compatibility. More ❯
Data Collection Plan program and event level testing for collection of data required for analysis and to synch T&E events with supported decision points Establish and employ Data & ConfigurationManagement capabilities Support Data Authentication group functions; and comply with program Discrepancy Reporting criteria and processes Produce Evaluation Plans (metric framework, scenarios/threads, timelines, requirements/T … Procedures and Test Readiness Reports) Design data sampling schemes to optimize the information/resource balance and to control testing uncertainties Select, coordinate, and calibrate Instrumentation, collection and data management tools, targets, & facilities Ensure test readiness including training of test event participants re conduct of the event; equipment readiness, and security, legal, and privacy compliance arrangements Participate in T … and/or Integrated Test Team for coordination of data collection plans Execute Testing and Data Collection per plan Produce associated Test Plans, Procedures, and Reports/Briefings, Data Management Plan Assess operational and system performance requirements for testability and criticality to frame and prioritize T&E objectives and enable evaluation planning Coordinate with program Systems Engineering (SE) and More ❯
/SQL, particularly in large-scale information systems High proficiency in Oracle SQL & PL/SQL , with a strong focus on writing clean, efficient code A solid understanding of configurationmanagement and issue tracking systems Knowledge of HTML, JavaScript, Java, JSON , and a willingness to learn new technologies Strong OLTP experience What We're Looking For: Exceptional diagnostic More ❯
exercises. Perform analysis of multi-TDL architecture performance and institute changes based on observations. Coordinate with development and acquisition agencies for procurement of, and evaluate JICO automated tools. Maintain configurationmanagement of the JICO automated tools. Represent JID at joint and combined interoperability working groups. Provide course planning and administration, which includes development and maintenance of schedules, scheduling … and materials, in any form. Shall not divulge any information, or afford access, to other employees not having a need-to-know. Shall not divulge information outside company without management approval. All government and proprietary information will be accessed and stored electronically on company provided resources. Incumbent must be eligible for DoD Personal Security Clearance. Work Environment This job More ❯
simulation models Work closely with system designers, control engineers, and software developers Automate test and verification processes and support continuous integration Help ensure model quality through peer reviews and configurationmanagement Integrate external models (FMUs, C++, third-party software) into our environments Present your work and collaborate with internal and external partners To secure this Senior Simulation and More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Method Resourcing
skills and experience we are looking for: Deep knowledge of Salesforce (essential). Experience with DevOps, GIT, and CI/CD pipelines. Strong experience with Infrastructure as Code. Solid configurationmanagement skills across complex environments. Salesforce certification would be a bonus. Working pattern: Hybrid - 1 day per week in the Cardiff office. Alongside the salary, the benefits include More ❯
of complex avionics systems with 5 interconnected subsystems. Perform on-platform wiring and hardware support. Develop product and procurement specifications. Use Teamcenter and NX/Unigraphics for design and configuration management. Interface with CAMEO for extracting system requirements. Track progress and tasks via Jira. Communicate effectively with suppliers to define clear requirements. Support hardware qualification efforts (black box experience … heavy project. Nice to Have: Background with Raytheon, Honeywell, Collins, or similar defense/aerospace environments. Hands-on experience with avionics hardware qualification and system-level testing. Strong supplier management and systems engineering background. Familiarity with flight hardware or aircraft modification programs. More ❯
exercises. Perform analysis of multi-TDL architecture performance and institute changes based on observations. Coordinate with development and acquisition agencies for procurement of, and evaluate JICO automated tools. Maintain configurationmanagement of the JICO automated tools. Operate the Link 16 Pulse Deconfliction Server (LPDS) and assist users with Frequency Clearance and Time Slot Duty Factor (TSDF) issues. Represent … and materials, in any form. Shall not divulge any information, or afford access, to other employees not having a need-to-know. Shall not divulge information outside company without management approval. All government and proprietary information will be accessed and stored electronically on company provided resources. Incumbent must be eligible for DoD Personal Security Clearance. Due to U.S. Government More ❯
the PM to include training and infrastructure development. Key Responsibilities: • Systems Engineering Support: Perform systems engineering processes, procedures, and best practices to ensure effective development, testing, evaluation, training, and configurationmanagement in support of acquisition programs. • Network Architecture: Provide engineering support on transport and networking architecture, focusing on current and future tactical network capabilities. • Technical Evaluations: Support design More ❯
the Design center of the Bosch Sensortec Division, where you will have the chance to be part of our next generation IMU development: Take responsibility : You are responsible for configurationmanagement and derivation of key requirements for MEMS, ASIC, package, testing and SW from system requirements. Integrated implementation : You plan, organize, implement evaluate und analyze complex simulations, experiments More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Initial plc
of user, policy, regulatory, and resource demands Authors and updates security documentation to include, but not limited to, standards, policy, system security plans, contingency plans, standard operating procedures, and configurationmanagement plans Analyzes information assurance-related technical problems and provides engineering and technical support for solving these problems Identifies, reports, and resolves security violations while also proactively seeks More ❯
L1/L2 architectures and requirement specifications for the electronic warfare systems contribute to cross-functional teams as focal point for the electronic warfare department document technical activities support configurationmanagement support decision making on technical activities support continuous improvement activities Desired skills and qualifications Experience with RF/EO Sensors, Effectors and EW Systems in the fields More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
ABMI
and variation requests Oversee interfaces between the contractor, client, and all internal and external stakeholders to ensure successful contract delivery aligned with the engineering schedule and technical specifications Coordinate configurationmanagement activities, including the preparation of Contract Transfer Sheets, Design Modifications, and Referential Evolution Requests Organise, coordinate, and monitor surveillance activities, including drafting the Surveillance Programme Organisation Note More ❯
of the web site end product. Design and develop visually-pleasing, content rich, user-friendly interfaces with intuitive navigation. Deliver comprehensive web site solutions to satisfy customer requirements. Maintain configuration management. You'd like to do this: Maintain a functioning user-accessible website. Code less complex websites using HTML, Visual Basic, or other web-based programming languages. Support website … develops, tests, maintain and supports high-performance, innovative web-based applications. Responsible for troubleshooting software problems and providing solutions to overcome those problems using the latest technologies. Work with management and information technologists to determine specifications. Use a variety of internet technologies, techniques and tools such as graphics software applications and object-oriented languages (e.g. Java, CGI, Visual Basic More ❯
looking for a Data Architect that will actively participate in sprint planning and review sessions with the product owner and provide coordination with architecture, information assurance, requirements, testing and configurationmanagement personnel. The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner. The More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Raytheon Technologies Corporation
environment. Experience working across all security classifications and delivery of solutions delivered through the Secure by Design principles. Ability to quickly form effective working relationships with all stakeholders required. Configurationmanagement processes and systems. Possess, or be capable of obtaining, Security Clearance. Strong analytical skills and attention to detail. Desirable Managing projects, tasks and deliverables with protective markings More ❯