the integration of hardware and operating systems (OS). Understanding of data RAID, data backup uses and technologies. Install and configure software applications requested by end users. Work with Cybersecurity professionals to maintain security requirements and provide documentation and training on advanced IT processes and procedures and other tasks as assigned. Full time 100% Onsite position. Qualifications You Must Have More ❯
/SCI clearance looking to make an impact in national security? Join our team supporting the Air Force Research Lab in Rome, NY, where you'll work on groundbreaking cybersecurity and R&D initiatives. Job Description: Seeking a Systems Engineer to support the SecureView Program Management Office in Rome NY (onsite). Duties will include the software/hardware testing More ❯
data governance strategies across enterprise systems Lead efforts in data integration, quality assurance, and metadata management Define and enforce policies for data access, lineage, and lifecycle management Collaborate with cybersecurity and cloud teams to ensure secure data sharing and storage Support development of enterprise data architectures and services frameworks Ensure compliance with federal data policies and security standards Advise stakeholders More ❯
research. • Experience supporting military or intelligence community customers. • Experience with open source, publicly available information (PAI) data sources and/or forensic media. • Experience developing predictive algorithms. • Experience supporting cybersecurity or network security operations. • Familiarity with social network analysis, supply chain analysis, forensic accounting, and other analytical methodologies. Major Duties/Tasks: • Analyze and assess software development or data More ❯
our environment. New applications within the SharePoint Farms need to be developed and implemented to meet the needs of the customers all while complying with Department of Defense (DoD) cybersecurity requirements and Microsoft's best practices for SharePoint. This project will require assisting current application developers with migrating existing ColdFusion applications into the SharePoint environment using the existing methodology used More ❯
Be able to work independently in a fast-paced environment to meet procurement and contractual deadlines. Compensation range: $60,000 - $75,000 depending on experience and qualifications Company Description: CyberSecurity company, specializing in specific cyber defense activities and IT services. We are a SDVOSB. OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status More ❯
years of experience w/Degree Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Experience with any of the following: IDA or IDA Pro, x64dgb, 011yDbg, Immunity Debugger, FireEye AX, and Ghidra. DOD 8140/DOD More ❯
of a small team • Technical competency in one of the following fields: SIGINT Collection/Analysis/Targeting, ELINT Collection/Analysis, Electronic Warfare (EW), Cryptologic Linguist, Radio Operations, CyberSecurity, Network Engineering/Security, Information Technology (with degree), HAM Operations and certification Education and Experience • Bachelor's Degree and four (4) years relevant experience. • Direct relevant and military experience More ❯
Springs, CO), hybrid options considered for highly qualified individuals. • Position may shift to ad hoc/on-demand support after initial stabilization period. Company Description: OSAAVA Services is a CyberSecurity company, specializing in cyber defense activities and IT services. We are a Service-Disabled Veteran-Owned Small Business (SDVOSB) committed to excellence and mission impact. We are an equal More ❯
design, development, installation and upgrade of development, support and tools as directed and follow IPT/SSA processes and procedures Support automation to the extent possible of test scripts, cybersecurity scans, and pipeline control gates Provide support for the CI/CD pipeline as directed and as managed by the SAFe, Agile, Kanban, and/or Scrum processes and backlog More ❯
Familiarity with Agile frameworks and Feature/Epic definition Experience with logical architecture modeling and interface definition Exposure to Missile Defense or Space Domain systems highly desired Understanding of cybersecurity principles and system security accreditation Preferred Skills: Familiarity with MDA programs and Missile Defense architecture Experience supporting RMF or NIST security compliance Ability to lead system design efforts with minimal More ❯
and implementation of AWS system architectures to include operational status and security of government systems (Authority To Operate - ATO). Reviews and provides input to system requirements based on cybersecurity posture. Compiles industry best practices and lessons learned into future iterations and new designs. Provides architectural analysis of cloud configurations and connections. Supports the Engineering Review Board, evaluating artifacts … clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
overall operational support processes and staff. • Collect, investigate, and identify network optimization strategies and techniques to meet capacity and performance standards. • Work with information assurance teams and the AGUN cybersecurity service provider (CSSP) to ensure compliance to DoD standards to assist with maintenance of the network security posture. BASIC QUALIFICATIONS: • Minimum of a Bachelor's degree with 8+ years' experience More ❯
data, and other sources Plan, direct, and present reports and assessments focused on intelligence Minimum Qualifications: Knowledge of all-source intelligence, counterintelligence, supply chain risk management, and threat analysis, cybersecurity, manufacturing, finance, or business analytics Education and Experience Requirements: Bachelor's Degree 3 - 7 Years of experience in missional analysis, program goals and objectives, program evaluations, analysis of program effectiveness More ❯
or equivalent Minimum of three years' experience as an Insider Threat analyst or relevant investigative or intelligence experience. Knowledge of incident response, crisis management, data management best practices, and cybersecurity trends Strong oral and written communication, analytical, critical thinking, data management, and research skills Experience conducting end-to-end investigations, including collecting and analyzing qualitative and quantitative data, and More ❯
or Masters +6 yrs or PhD + 4 yr Excellent communication and collaboration skills to interface across NSA Be able to identify intrusions and actors current intrusion sets commercial Cybersecurity Firms Need an understanding of Virtual Private Servers, VPNs, The Diamond Model, obfuscation networks, highly proficient agency tools, DX , Buffalo, CLEARVISION, CVEs, SSVE, VirusTotal Preferred Author and read highly technical More ❯
Agency (DIA) with enterprise-level strategy, IT integration, and mission-critical planning in a high-tempo, classified environment. This role requires a seasoned leader with experience in IT governance, cybersecurity, and program execution-someone who can bridge the gap between technical delivery and strategic oversight, while ensuring team alignment and client satisfaction. As the Program Management Lead, you will drive … planning, execution, and performance monitoring across complex IT and cybersecurity projects supporting the Joint Worldwide Intelligence Communications System (JWICS). Simultaneously, as Task Order Lead, you will manage daily operations, oversee contract performance, and serve as the primary liaison between government stakeholders and Red Gate Group leadership. This is a mission-impactful opportunity for someone who thrives in multi-disciplinary … to ensure planning efforts align with technical delivery Drive quality assurance and performance evaluation across IT programs Support IT integration across communications, infrastructure, data, and special access programs Assist cybersecurity teams with IA compliance, testing, risk management, and accreditation processes Task Order Management: Oversee all task order deliverables, staff performance, and daily operations Serve as the central point of contact More ❯
the implementation of automation within the CI/CD pipeline as directed and follow IPT/SSA processes and procedures Support automation to the extent possible of test scripts, cybersecurity scans, and pipeline control gates Base Image Support Provide support for the CI/CD pipeline as directed and as managed by the SAFe, Agile, Kanban, and/or Scrum More ❯
Proficiency in one or more programming languages such as Java, C++, Python, or C# Experience with Git, Jenkins, and other DevOps tools Strong understanding of secure coding practices and cybersecurity requirements Familiarity with Agile/Scrum methodologies Preferred Qualifications: Experience with DoD systems or within a cleared environment Familiarity with containerization tools (e.g., Docker, Kubernetes) Experience with cloud technologies (AWS More ❯
delivery) to ensure solutions are deliverable, scalable, and aligned to client requirements & their environments The following skills and experience are essential for this role: 14+ years of experience in cybersecurity, with a strong emphasis on network and endpoint security architecture Proven ability to operate in a technical pre-sales or consulting capacity, translating customer requirements into secure solution designs Strong More ❯
Lexington, Massachusetts, United States Hybrid / WFH Options
John Galt Staffing
in compliance with best practices •Manage research networks, file shares, virtual infrastructures, and some SAN/NAS environments within the group •Remediate security vulnerabilities, and harden systems according to cybersecurity best practices in line with NIST 800-171, and CMMC guidelines •Develop and document technical processes and procedures •Work under minimal direction, and independently determine and develop approaches to complex More ❯
equivalent to 3 years of experience Relevant Masters/Doctoral Degree: equivalent to 2 years of experience Relevant Certifications: equivalent to 3 months of experience Proven ability to manage cybersecurity protocols, IT systems, and Assessment & Authorization (A&A) processes, ensuring compliance and security best practices. Skilled in the design, implementation, and management of secure and scalable cloud infrastructure solutions. Proficient More ❯
tasks in assigned OUs. Provide daily administration of the Windows based Virtual Machines and AECC services. Harden the Windows based services per commercial best practices and the required government cybersecurity controls. Troubleshooting and root cause analysis of any Windows issues. Coordinate and perform major OS version upgrades of virtual machines needing upgrades. Develop and maintain system, infrastructure, and process documentation More ❯
Reston, Virginia, United States Hybrid / WFH Options
LexisNexis Special Services Inc
foundational expertise in one or more of the following fields: Computer Science, Data Science, Data Analysis Criminology, Psychology, Applied Social Sciences Statistics, Mathematics, Systems Analysis, Engineering Intelligence, National Security, CyberSecurity Geographic Information Systems, Geospatial Analysis Location: Washington DC Metro Area/Northern Virginia Remote Work: Not eligible, COVID-19 mitigations may be required Travel: up to 25% travel may More ❯
MS Project Apache Airflow Python, Java, JavaScript, React, Flask, HTML, CSS, SQL, R, Docker, Kubernetes, HDFS, Postgres, Linux AutoCAD JIRA, Gitlab, Confluence About Us: IntelliBridge delivers IT strategy, cloud, cybersecurity, application, data and analytics, enterprise IT, intelligence analysis, and mission operation support services to accelerate technical performance and efficiency for Defense, Civilian, and National Security & Federal Law Enforcement clients. More ❯