encompasses important services, such as data analytics and visualization, threat analysis, risk management, modeling and simulation, cost estimating, earned value management, program management, system engineering, independent evaluation, and High Consequence Event prevention. SPA's Strategic Division's Strategic Development Group (SDG) supports critical U.S. government programs providing Systems Engineering support, Systems Safety support … both the COLUMBIA and United Kingdom (UK) Dreadnought (DRNT) Class Submarines. The analyst will serve as a liaison between the D.C. and Groton-based SP26 teams, facilitating effective information exchange between these two sites and ensuring coordination between teams on resolving issues and advancing efforts affecting SWS related installation and testing activities. The analyst will also be responsible … construction or shipyard context. Proficiency in Microsoft Office 365 suite (Excel, Word, PowerPoint, Teams, Project). Desired Qualifications: Prior SSP or NAVSEA experience, particularly related to the Strategic Weapon System and/or submarine construction. Background in defense acquisition planning. More ❯
at Hill Air Force Base, Utah are closely aligned to the United States Air Force Nuclear Weapons Center. We support the Center in sustaining the existing Minuteman III weapon system and the new Sentinel missile system in development. We are a uniquely valued mission partner delivering daily technical excellence and innovative solutions to our government customers. BAE Systems … Interface with CDRL owners to meet delivery schedules. Ensure deliverables align with defined requirements. Ensure data transmittals are accurate and on time. Archive deliverables and maintaining the data management repository. Track, monitor, and report delivery metrics. Contribute to the efficiency and effectiveness of the business unit's service to its customers by offering suggestions and directing or participating … Hill AFB, UT. US Citizenship is required DoD Secret Security Clearance upon hire is required Offer pending contract funding approval Required Education, Experience, & Skills 3+ yrs. of project management experience Background in managing deliverables to customer requirements and timelines. Experience with management reports, to include reviewing and editing. Great cross-functional communication and interaction Leading & coaching More ❯
data to ensure CIM compliance, and develop data models to accelerate queries, dashboards, and correlation searches Work closely with all relevant stakeholders to solve technical problems at the network, system, and application levels Conduct periodic architectural reviews of Splunk and related systems to assess effectiveness and propose optimal installation alternatives as required Develop and manage comprehensive documentation, artifacts, procedures … and processes for the optimal management of the Splunk infrastructure Basic Qualifications: Bachelor's Degree and 12-15 years of experience in system administration, database administration, network engineering, software engineering, or software development, with a concentration in Cybersecurity 12-15 years of experience with Linux and Windows system administration or an expert understanding of operating systems … integration Intermediate understanding of SQL and common SQL dialects Proficiency implementing and onboarding data in Splunk DB Connect Experience with Splunk performing systems administration, including performing installation, configuration, monitoring system performance and availability, upgrades, and troubleshooting General networking and security troubleshooting (firewalls, routing, NAT, etc.) Splunk architecture/design, implementation, and troubleshooting experience Experience in managing, maintaining , and administering More ❯
to maintain a secure and compliant environment • Offer technical support to end-users, troubleshoot and resolve communication-related issues, and provide training as needed to enhance user proficiency and system effectiveness • Develop and update comprehensive documentation for unified communications systems, covering configurations, procedures, and best practices to ensure clear guidance and consistency in systemmanagement and … managing vendor relationships to maintain timely delivery, quality, and alignment with organizational needs • Create and uphold disaster recovery plans and procedures to maintain business continuity in the event of system failures Qualifications - External Requirements: • At least 10 years of telecommunications technical experience installing, administering, and upgrading Cisco Unified Collaboration appliances and troubleshooting converged networks that leverage Cisco UC capabilities … Associate), GCED, GCIH • Must have current Cisco Certified Network Associate (CCNA) Certification Preferred: • Bachelor's degree in IT related field • Foundational knowledge and/or experience with Unified Messaging system, audio conference bridge systems and gateways, voice circuits, and crypto technologies for voice systems • Cisco Certified Network Professional (CCNP) Certification More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
to propose and implement cost-efficient strategies for meeting mission goals Develops and implements long-range plans to accomplish component or directorate goals. Prepares budget exercise submissions; assimilates information about program goals, requirements, costs, and schedules; ensures that submissions are rational, defensible, and executable. Ensures that program execution is proceeding within available resource constraints and remains consistent with … in the budget development and execution processes. Routinely constructs and maintains background documentation on programmatic and resource analyses, discussions, thinking, and decisions to aid the component's resource management continuity. Strategic planning Exhibits awareness of the component's alignment with strategic goals of the component, directorate, Agency, and Intelligence Community. Participates in discussions to identify objectives, specific actions … information needed or relevant for addressing complex issues or taskings (e.g., supporting new policies or procedures, developing business plans), such as trend reports within the Sponsor finance system, billing statements, budget system reports, and component tracking databases). Analyzes multiple, complex pieces of information to form logical, sound conclusions about its value, importance, or More ❯
assumes all cyber advisory responsibility for the Red Team. The Red Cell Cyber Analyst works as needed with Red Cell Program Leads. This will include supporting adversarial cyber information for program objectives, identifying gaps in cyber architecture, and developing cyber emulative courses of action pertaining to vulnerability assessment. The Red Cell Cyber Analyst is responsible for providing advice … papers, after action reviews, final reports, risk analysis products, and other documents necessary to convey assessment findings to customers, partners, and other stakeholders. Be able to explain network/system mechanisms to analysts and ground element in order to facilitate better analysis and operations. Should have a diverse understanding of network and information security operations, network exploitation … networks including experience in Windows Security, Network Security, Linux/Unix Security, Database security, or Mainframe Security. Ability to operate and navigate the Windows and UNIX/Linux operating system from the command prompt/line with ease. Graduate of one of the following Joint Cyber Analysis Course, Cyber Common Technical Core, Cyber Threat Emulation Methodologies or equivalent Bachelor More ❯
Demonstrated proficiency in business modeling, process modeling, and data modeling Knowledge of methods and techniques of computer systems analysis, design, technical terminology, codes, and standard abbreviations Using the available systemmanagement tools (both console and Web-based SystemManagement) Strong Analytical and problem-solving skills, ability to diagnose/receive complex technical issues. Excellent … Architect with solid proven experience in Natural Adabas (Natural One is highly desirable ). The Architect will focus on Adabas and Natural, design, implementation, and maintenance of the MA21 system utilizing these technologies. The TA collaborates closely with the MA21 technical development staff to conceptualize and design system functionality. The Architect will be instrumental in developing a roadmap … maintaining architectural blueprints for Adabas and Natural One application, ensuring scalability, performance, and security. Directly involved in the implementation of Adabas and Natural, including code development, database design, and system configuration. Responsible for identifying and resolving technical issues related to Adabas and Natural applications, ensuring minimal downtime and disruption. Optimize Adabas and Natural systems for performance, ensuring efficient data More ❯
cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiative Establishing a detailed Execution Plan for each USSF location to include SME contact information, expected visitation length, assets being analyzed, SME contact information, and types of information being collected Analyzes a wide range of mission related cyberspace network activities … defense-in-depth architecture against known vulnerabilities. Must have knowledge and experience to support military planning tasks. Must have extensive knowledge of Mission Assurance disciplines to include risk management, mission mapping, vulnerability assessments, and defensive cyber capabilities. Must have a detailed understanding of mission analysis techniques, FMA-C methodologies, and mission dependencies. Must have … the ability to solve complex problems involving a wide variety of information systems. Must be familiar with the purpose and use of the Mission Assurance Database Support System (MADSS) and other similar database repositories. Excellent communication skills both verbal and written. Good time management, prioritization, and multitasking abilities. Excellent interpersonal skills to build strong relationships More ❯
the commitment to grow and sustain our company for the next 100 years! Come grow with us! Torch Technologies is seeking a Senior Survivability Engineer with deep expertise in system resilience, threat mitigation, and defense survivability to join our Counter-Unmanned Aircraft Systems (CUAS) team. In this high-impact role, you will lead survivability engineering efforts to ensure CUAS … As a Sr. CUAS Survivability Engineer your duties will include the following, but are not limited to: Technical: Establishes the requirements for the protective technologies, export controls, and improved system assurance of the major end items that are owned by the Counter-UAS Product Manager. Works with the intelligence community to capture requirements of improvements to counter-act near … C-UAS and tracks their progress to support the fielding resilient systems. Works with Foreign Military Sales to provide input to protect CPI and other technologies of C-UAS system that are selected to be sold to foreign partners. Works with the Protective Technologies office to ensure appropriate technologies are utilize to protect Critical Program Information. Ensures systemMore ❯
systems. The intent is to provide senior decision makers with documented and actionable data to aid in making strategic investment decisions. THE ROLE The Contractor shall document all identified system risks, planned test procedures, and results. The Contractor shall perform analyses of vulnerabilities identified during testing. The Contractor shall review program-level documentation such as requirements specification, system … security or related IT field. Demonstrated experience with cyber penetration testing. Demonstrated experience leveraging adversarial tactics to conduct hands-on security testing. Demonstrated experience applying computer attack methods and system exploitation techniques. Demonstrated working knowledge of cyber security principles for Linux, Windows, and virtual platforms. Demonstrated experience designing, testing, or implementing IT security architecture. Demonstrated experience performing network security … management tools Demonstrated experience developing risk management methodologies. Demonstrated experience analyzing test results to develop risk and threat mitigation plans. Demonstrated experience testing or reviewing system configuration, development, and design specifically around enterprise systems and hypervisors. Demonstrated experience designing, testing, or implementing complex Windows installations. Desired Skills (Optional) Demonstrated experience participating in public and private More ❯
. Provides support to eVDI end-users, back-end applications and infrastructure. Works with the network to utilize resources, capture network performance, and resolve networking issues. Provides hardware, operating system and system administration support for enterprise IT services including software scripting, software installation, provisioning, and configuration. The Level 2 Platform Engineer shall possess the following capabilities: Configure and … Windows, UNIX, Linux systems Collaborate with back-end application developers and DBA to integrate applications into the eVDI Perform software scripting, software installation, provisioning, and configuration Prepare hardware and system designs for updates to the eVDI Provide support for the eVDI including troubleshooting, repairing, monitoring, and testing Provide Tier 2 and Tier 3 support to Citrix end users Collaborate … with engineers on systems integration efforts Optimize system operations and resource utilization, and perform system capacity analysis and planning Conduct data captures to obtain network performance information Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, and network address translation (NAT) where appropriate Qualifications: Ten (10) years' experience as More ❯
PIAM Implementation Business Analyst Position Overview Our organization is looking for experienced professionals to fill the position of PIAM (Physical Identity Access Management) Implementation Business Analyst. The ideal candidate will possess a solid background in security and identity governance, with practical experience implementing PIAM solutions, including Visitor Management and Mobile Credentials, in complex physical access environments … within functional flow diagrams. Demos: Lead solution demos, UAT sessions, and client trainings Collaboration: Foster collaboration with team members to maintain data and functional integrity across projects and systems. System Configuration: Take hands-on responsibility for system configuration approaches and implementation. Solution Design: Actively participate in solution design, implementation, and quality assurance activities & act as the primary point … solving with a customer-centric approach. Teamwork and Adaptability: Excellent teamwork skills, adaptability to diverse personalities, and ability to thrive in a multicultural organization. Research Proficiency: Proficient in researching system issues, formulating solutions, and presenting findings to end-users. Support Availability: Willingness to provide phone support on a 24x7 basis. Learning Agility: Ability to quickly comprehend complex concepts through More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
networks (i.e., SIEM, DLP, etc). • Ensuring that the organization's data and infrastructure are protected by enabling the appropriate security controls. • Troubleshooting technical security and network problems. • Leads system and/or network security breach response • Participating in the change management process. • Testing and identifying network and system vulnerabilities. • Coordinate activities with the ISSM and … IT lead to ensure systems are secure and technically ready for inspection. • Identifying requirements for verification and validation, creates, understands, and updates system design and architecture. • Daily administrative tasks, reporting, and communication with the relevant departments in the organization. Selected candidate will be subject to a Classified Cyber Security panel to demonstrate advanced technical knowledge and skills. Who we … Possess a DoD 8570 IASAE Level-II Certification (CASP+ CE, CISSP (or Associate), CSSLP) • Experience identifying requirements to include requirement verification and validation • Experience with creating, understanding, and updating system designs and architecture • Experience executing Security Hardening on Windows and/or Linux Operating Systems based on approved DISA STIGs and SRGs • Experience implementing NIST SP 800-53 security More ❯
in a dynamic and mission-critical environment? As a Cyber Engineer, you will work on developing and implementing advanced cyber defense technologies, securing sensitive systems, and supporting risk management processes. You will ensure compliance with cybersecurity frameworks, lead cyber testing initiatives, and contribute to obtaining and maintaining Authority to Operate (ATO) within secure systems. What You'll Do … reports for security reviews. Key Responsibilities: • Manage and review cybersecurity artifacts for accuracy and compliance with government standards. • Develop detailed cyber testing scenarios and analyze test results to ensure system integrity. • Collaborate with government and engineering teams to enforce STIG compliance on all systems. • Support the ATO process by guiding teams through security assessments and RMF phases. • Participate in … the development of POA&Ms to track system vulnerabilities and remediation efforts. • Maintain up-to-date knowledge of cybersecurity policies, technologies, and emerging threats. What You'll Bring to the Team: • Education: Bachelor's degree in Cybersecurity, Computer Science, Engineering, or a related technical field. • Experience: 5+ years of experience in cybersecurity engineering, cyber risk management, or More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Edgesource
skilled Cloud Architect to support enterprise cloud transformation initiatives across mission-critical programs. The ideal candidate will have experience in cloud-based systems architecture and demonstrate knowledge of DevSecOps, system lifecycle development, and Agile methodologies. This role will contribute to the strategic design and implementation of scalable, secure, and resilient cloud environments across various platforms. This position requires that … Job Duties: Design and implement cloud-based architectures in support of enterprise systems. Collaborate with cross-functional teams to define cloud strategies and requirements. Apply DevSecOps practices to streamline system development, integration, and deployment. Support system engineering lifecycle activities, from concept through deployment. Participate in Agile development activities including Program Increment Planning, Sprint Execution, and team retrospectives. Utilize … thought leader in cloud modernization initiatives and architecture best practices. Required Qualifications: Active TS/SCI with polygraph security clearance. Bachelor's degree or higher in Computer Science, Information Technology, ManagementInformationSystems, or related STEM discipline. Six (6) years of experience as a Cloud Architect may be considered in lieu of a degree. More ❯
strategic, regional, and operational levels. This role does not offer relocation support and requires working on-site with no remote options. Position Overview: The Command and Control, Battle Management, and Communications (C2BMC) program is a crucial part of the Missile Defense System. It provides an essential operational platform that enables the U.S. president, the Secretary of Defense, and … systems and operations worldwide and locally to enhance overall performance. Furthermore, C2BMC is a vital component of all ground and flight tests that verify and demonstrate the missile defense system's current and future capabilities. The selected applicant will perform the following tasks: Software development Database manipulation Automated tooling pipeline management and maintenance Document creation and presentation … Networking Data communications Microsoft Excel, including development of Pivot Tables and Excel Macros Preferred Qualifications: Experience in producing tooling and products to assist with analyzing or assessing a system or project is preferred Experience in performing systems engineering for DoD InformationSystems preferred Experience with DevOps tools such as Jenkins, HTCondor, GitLab, etc., is preferred What More ❯
projects Support OLTP (Online Transaction Processing) systems while learning advanced database architecture Assist in data warehousing and ETL process design and implementation Work on database replication and user management tasks Write and optimize SQL queries, stored procedures, and functions Apply transaction management and ACID principles to ensure data integrity Contribute to legacy database upgrades and migrations … have been recently employed by the U.S. government, a post-employment ethics letter will be required if employment with VSolvit is offered Bachelor's degree in computer science, InformationSystems, or a related field 2 - 5 years of professional experience in database development Basic understanding of OLTP systems Exposure to data warehousing concepts and ETL processes Familiarity with … Strong knowledge of SQL and database programming (queries, stored procedures, functions) Understanding of transaction management and ACID principles Willingness to learn and contribute to legacy system modernization Strong problem-solving skills and attention to detail Preferred Qualifications: Experience with one or more database platforms (SQL Server, Oracle, PostgreSQL, MySQL) Exposure to cloud-based database environments More ❯
Team events. Support mission and training events by creating new technical and non-technical solutions using an interdisciplinary approach to actively, and passively expose and exploit informationsystem vulnerabilities. Exploitation and vulnerability research, tool design and development (software/application/scripting/coding), support of Red Team operations, test lab configuration and administration, and other duties … assigned. Experience with network and security-related protocols Experience in using network protocol analyzers and sniffers, as well as the ability to decipher packet captures. Work effectively with management, staff, vendors, and external consultants Emulate adversarial approaches. Required Skills Candidate must have an active Secret clearance and the ability to obtain TS/SCI clearance. Bachelor's degree … from an accredited college or university in computer science, informationsystems, engineering, scientific or a mathematics-intensive discipline, or a Relevant Technical Discipline. 5-8 years of practical experience Ability to program and script in C++, and C# Excellent independent (self-motivational, organizational, personal project management) skills Capable of conducting pentests on applications, systems and networks More ❯
are followed. Manage core NSPO security programs, including Counterintelligence (CI), Insider Threat Awareness, Industrial Security, Physical Security, and Communications Security (COMSEC). Maintain oversight of the NSPO Access Control System (ACS), Intrusion Detection System (IDS), and visitor control program to ensure compliance and operational integrity. Oversee the processing of classified materials, including inventory, packaging, and secure transportation from … international agreements. Support the review and maintenance of Contract Security Classification Specifications (DD 254s). Be available for 24/7 on-call support to respond to IDS alarms, system failures, or other security-related incidents. Required Education, Experience, & Skills Must possess a US Government Secret Clearance. At least ten years of relevant job experience. Experience in developing security … industrial security, information security, personnel security, and physical security. Proficient computer skills and experience in maintaining and administration of security databases, to include Defense InformationSystem for Security (DISS). Ability to manage time, make sound decisions, work independently, analyze problems and provide focused solutions. Knowledge of the government classified contract process to include providing More ❯
Overview The Data Manager supports the Missile Defense Agency's InformationManagement and Software Services (AIMSS) program by executing and overseeing the full lifecycle of test and mission data across MDA systems. This role focuses on data flow coordination with test data producers, adherence to mission-specific standards, and the operational management of data … non-standard inputs. Ensure compliance with retention schedules; coordinate archival and destruction activities with proper documentation and traceability. Operate AIMSS mission tools such as the Data ManagementSystem (DMS), Library Control Center (LCC), and other purpose-built data management tools; interface with software teams for system issues or enhancements. Conduct QA checks to validate … a technically diverse, 100% team member owned business, headquartered in Huntsville, Alabama specializing in missile and aviation systems engineering and logistic services, electronic warfare and electromagnetic effects analysis, UAS system integration and flight operations, full lifecycle C5ISR engineering services, cybersecurity and IT/IA innovative solutions and virtual training, simulation & serious game development and implementation. We have established a More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Koniag Government Services
more. Koniag Professional Services is seeking an experienced Task Lead-T&A to support our client, the Department of Health and Human Services (DHHS), Office of the Chief Information Officer (OCIO) in developing a secure, scalable, and integrated Human Capital Management solution that consolidates core HR functions into a unified enterprise platform. The Human Resource Information … Employee/Manager/HR Self-Service, and Enterprise Business Intelligence capability. The solution will be compliant with federal cybersecurity, records management, and accessibility standards, to improve system performance, user satisfaction, and long-term sustainability of HR services. This role is critical for maintaining, enhancing, and optimizing HCM applications that support essential administrative and operational functions across … implementation of a "Time and Attendance" module within the unified HCM platform for HHS. Manage the approach and guide the team through planning and governance, data migration and integration, system design and development, documentation, testing, engaging training strategies, security compliance, production readiness, and deployment. Provide guidance to the team on Requirements gathering techniques, Change Management, Risk Analysis More ❯
software components to ensure alignment with design specifications, and documenting test outcomes. Troubleshooting and resolving software issues. Applying appropriate software development methodologies based on the project environment. Contributing to system design by evaluating hardware/software trade-offs, promoting software reuse, and leveraging COTS/GOTS solutions where applicable. Conducting requirements analysis from system-level down to individual … or updated systems and environments. Create basic data queries for current or planned databases and repositories. Recommend improvements to documentation and development standards. Implement algorithms that meet or exceed system performance and functional goals. Assist in creating and executing software test procedures. Author or review technical documentation for software and systems. Develop software solutions by analyzing performance standards, user … feedback, data flows, and system processes. Lead development teams as appropriate to the project's methodology. Modify software to correct errors, adapt to new hardware, or improve performance. Use scientific and mathematical models to design and evaluate software systems. Design and implement advanced database interfaces and queries. Supervise software development teams, ensuring adherence to project constraints and development processes. More ❯
design, enhancement, and maintenance of enterprise communications infrastructure within a secure classified environment. This role requires hands-on engineering expertise in Unified Communications (UC), LAN/WAN technologies, and system integration to ensure resilient, scalable, and secure collaboration services across the enterprise. Responsibilities: Review and analyze the existing Unified Communications (UC) infrastructure and provide recommendations for improvement and modernization. … and design enhancements to existing UC services, including identifying and planning hardware refresh cycles. Perform Analyses of Alternatives (AoA) for periodic UC hardware refreshes while following established Change Management processes. Create and document network configurations, ensuring accurate and detailed technical documentation for all changes and implementations. Conduct design, project management, acceptance testing, and vendor evaluation activities … specifications, and ensure functional performance objectives are met. Ensure accuracy, completeness, and compliance of all systems documentation and configuration records. Support the design, installation, testing, and operationalization of UC system components, ensuring interoperability across enterprise systems. Participate in all aspects of service delivery - from feasibility and connectivity assessments to technical and operational documentation preparation. Qualifications: Must possess an InformationMore ❯
is a full-time position based in Huntsville, AL. Responsibilities Responsible for planning and tracking maintenance of financials within BizOps (Business Operations), AICIS (AvMC Integrated Center InformationSystem), GFEBS (General Fund Enterprise Business System), DTS (Defense Travel System) & ATAAPS (Automated Time Attendance Production System). Coordinates with all Stakeholders (Division Chief, Branch Chiefs, Tech … and/or customers. This includes GFEBS reports, Rubix Fund Reports, AICIS Reports, and DTS Transaction reports. Responsible for work purchases and payment requirements in PURS (DEVCOM Purchase Requisition System). Responsible for updating labor category changes while ensuring employees align correctly to reduce any labor tracking errors in CMS (Contact ManagementSystem). Create and … requirements, costing, and program scheduling. Microsoft Office, Excel, Word, PowerPoint, and Adobe acrobat experience required. Microsoft Project experience preferred. Prior experience creating travel orders and vouchers in Defense Travel System (DTS) preferred. Experience generating labor reports in ATAAPS (Automated Time and Attendance Production System) preferred. Experience accessing funding reports and documents in GFEBS (General Fund Enterprise Business SystemMore ❯
and testing software components to ensure compliance with design specifications, and documenting results. Troubleshooting and resolving software issues. Applying appropriate development methodologies tailored to the project environment. Contributing to system design by evaluating hardware/software trade-offs, promoting reuse, and integrating COTS/GOTS solutions where feasible. Conducting requirements analysis from system-level down to individual software … into updated systems or operating environments. Create data queries for current or planned databases and repositories. Recommend improvements to documentation and development standards. Implement algorithms that meet or exceed system performance and functional requirements. Assist in developing and executing software test procedures. Author or review technical documentation for software and systems. Develop software solutions by analyzing performance standards, user … feedback, data flows, and system processes. Lead development teams according to the software development methodology in use. Modify software to correct errors, adapt to new hardware, or improve performance. Use scientific and mathematical models to design and evaluate software systems. Design and implement advanced database interfaces and queries. Supervise multiple software development teams, ensuring adherence to project constraints and More ❯