opportunity to work on mission-critical platforms, applications, and networks, ensuring they are secure by design and compliant with the highest standards. Key Responsibilities Design, develop, and maintain secure system architectures for MOD platforms and networks. Ensure alignment with standards including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain … security documentation such as Security Architecture Documents, Risk Assessments, and Management Plans. Lead secure design reviews and contribute to engineering assurance gates. Liaise with MOD, NCSC, and other stakeholders to support security assurance processes. Collaborate with engineering and development teams to embed security from the outset. Stay ahead of evolving threat landscapes and propose mitigation strategies. Essential Skills … principles and secure development lifecycles. Deep understanding of security architectures, processes, and compliance frameworks (ISO 27001, CE/CE+). Experience with MOD security assurance artefacts and risk management frameworks (HMG IS1/IS2, NIST RMF). Excellent communication skills - able to engage technical and non-technical stakeholders. Must hold current SC Clearance. Certifications (Preferred) CISSP - Certified InformationMore ❯
a Cloud Architect to support enterprise cloud transformation initiatives across mission-critical programs. The ideal candidate will have experience in cloud-based systems architecture and demonstrate knowledge of DevSecOps, system lifecycle development, and Agile methodologies. This role will contribute to the strategic design and implementation of scalable, secure, and resilient cloud environments across various platforms. Key Responsibilities: • Design and … implement cloud-based architectures in support of enterprise systems. • Collaborate with cross-functional teams to define cloud strategies and requirements. • Apply DevSecOps practices to streamline system development, integration, and deployment. • Support system engineering lifecycle activities, from concept through deployment. • Participate in Agile development activities including Program Increment Planning, Sprint Execution, and team retrospectives. • Utilize cloud service provider technologies … or equivalent. • Serve as a thought leader in cloud modernization initiatives and architecture best practices. Skills and Experience: Required Qualifications: • Bachelor's degree or higher in Computer Science, Information Technology, ManagementInformationSystems, or related STEM discipline. Six (6) years of experience as a Cloud Architect may be considered in lieu of a degree. More ❯
of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Seeking a Cyber Technical Specialist 4 that is able to work with a dynamic team of system engineers and administrators responsible for design, implementation, operations & maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure. This position will perform Cybersecurity/Information Assurance … managed systems, applications, and hardware. Responsibilities Essential responsibilities and activities include but are not limited to: Design, implement, and maintain provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints. Analyze new security requirements, define courses of action, and design enterprise solutions, coordinating with engineering and operations teams to implement within the … proactive control testing. Set up and execute Nessus scans; establish automated reporting. Document, prioritize, and formally report asset and vulnerability state, along with remediation recommendations and validation. Coordinate with system owners and system administrators/technical points of contact to identify system vulnerabilities, conduct vulnerability analysis, and formulate remediation strategies. Develop packages for complex remediation efforts and More ❯
range program protection security strategies and tactics for new and established programs, as well as changes in program direction. Use knowledge of the various security disciplines (e.g. physical, information, personnel, etc.) to determine, apply, and monitor appropriate security requirements and tasks relative to the specific technology programs to be protected. Prepare and present suggestions for improvement as appropriate. … information, including individuals, programs, contracts, and performers, if required, into appropriate information security managementsystems, i.e.: DARPA Archive System. Defense InformationSystem for Security (DISS). DARPA Facility and Security Tracking System (DFASTS). Security Control Suite (SCS). SILVERADO/Joint Access Database Environment (JADE). The Program Security … for meetings. The Program Security Representative will attend program reviews, i.e., preliminary design reviews (PDR), critical design reviews (CDR), and integrated product team (IPT) reviews, to ensure changes to system baselines don't negatively affect security and initiate actions to add mitigation where necessary. Actively support Agency Staff Assistance Visits of cleared defense industry base contractors and government agencies More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Boeing Intelligence & Analytics
for: Developing, maintaining, and enhancing complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business managementinformationsystems) based upon documented requirements Contributing to cutting edge development programs and designing new solutions Innovating RF signal processing applications Developing analytics, visualization and discovery tools … form factors Reviewing and testing software components for adherence to the design requirements and documents test results. Resolves software problem reports. Providing specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development, and … requirements analysis and synthesis from system level to individual software components What Makes BI&A Different: As a fully owned subsidiary of The Boeing Company, BI&A offers an optimal mix of a small company environment with exceptional opportunities supported by a large corporation. Every day, Boeing Intelligence & Analytics supports global missions by building and delivering intelligence, analytics, and More ❯
special access. Basic Qualifications: Bachelors degree from an accredited college in science and technology related disciplines such as Mathematics, Computer Science, Systems Engineering, Electrical Engineering, Computer Engineering, Physics, Information Technology, ManagementInformationSystems, Cyber Security or related discipline. Applicants selected will be subject to a government security investigation and must meet eligibility requirements for … access to classified information, including US Citizenship. Ability to obtain a TS/… SCI Clearance required for this role. Desired Skills: Candidate will have knowledge of basic software practices such as coding standards, unit testing and configuration management, database and System administration. Good communication skills. Strong team player. Candidate will work in a team environment utilizing software methodologies and processes. Familiarity with Agile Development Process a plus. Strong communication skills More ❯
Description SAIC has an immediate need for a cleared (Secret) Systems Administrators with Agile Core Services (ACS) knowledge and experience to support a recently awarded contractwithin the Navy Information Warfare Systems Command (NAVWAR). You will integrate, install, and maintain Agile Core Services (ACS) and associated components within the OPE AWS environment. You will research, design, and develop … utility programs. In this role, the Systems Administrator will be an integral team member supporting assured Command and Control capabilities for the Naval Operational Architecture within the Navy Information Warfare Systems Command (NAVWAR) in San Diego, CA. Responsibilities: Analyze user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis Update or … in a professional or academic setting Experience developing internal OPSEC programs specific to the task order and based on Government client OPSEC requirements Experience providing to the government, a system security plan (or extract thereof) and any associated plans of action developed to satisfy the adequate security requirements of DFARS , and in accordance with NIST Special Publication (SP More ❯
data and presenting it to meet customer needs? Join our team as a Reports Developer! You will get to use your systems knowledge to improve our Financial and Acquisitions System that supports our DoD Customer execute their vital mission. How does the opportunity to help improve the visibility of data for a key Government system sound to you … We have been supporting our customer for over 20 years with the implementation of a Commercial-Off-the-Shelf (COTS) Financial and Acquisitions System, Momentum. We continue to develop and implement exciting and complex solutions to support the evolving needs of our customers. We are looking for a Reports Developer with the desire to be a critical member of … business requirements. • Design, development and testing of underlying universe or framework to support ad hoc reporting. • Defining, documenting, and executing unit test cases to confirm requirements are met. • Support system and user acceptance testing activities, including issue resolution. • Supporting the functional and technical activities for the customer's financial management and contract writing system reporting tool. More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Boeing Intelligence & Analytics
for: Developing, maintaining, and enhancing complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business managementinformationsystems) based upon documented requirements Contributing to cutting edge development programs and designing new solutions Innovating RF signal processing applications Developing analytics, visualization and discovery tools … form factors Reviewing and testing software components for adherence to the design requirements and documents test results. Resolves software problem reports. Providing specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development, and … requirements analysis and synthesis from system level to individual software components What Makes BI&A Different: As a fully owned subsidiary of The Boeing Company, BI&A offers an optimal mix of a small company environment with exceptional opportunities supported by a large corporation. Every day, Boeing Intelligence & Analytics supports global missions by building and delivering intelligence, analytics, and More ❯
products. POSITION OVERVIEW A seasoned cybersecurity engineer with deep expertise in designing, implementing, and maintaining secure systems, networks, and applications across NATO and defense-aligned environments. Adept at defining system security requirements, developing secure architectures, and integrating advanced security measures to protect mission-critical infrastructure and sensitive information. Skilled in deploying tools like Nessus, Qualys, Prisma, Burp Suite, and … networks, and applications across NATO environments. Engineer, implement, and monitor technical and organizational security measures for the protection of computer systems, networks, and sensitive information. Identify, define, and document system security requirements, ensuring they align with NATO security standards and operational priorities. Design secure architectures and develop detailed Cybersecurity designs, supporting enterprise-scale solutions and mission-critical systems. Plan … assessments using established tools and frameworks, advising stakeholders on mitigation strategies. Conduct incident response planning, disaster recovery preparation, and contribute to forensic investigations where required. Collaborate closely with developers, system administrators, and product managers to ensure security requirements are met throughout the lifecycle. Clearly communicate complex cybersecurity risks and issues to technical teams, leadership, and non-technical audiences. Required More ❯
CGI seeks a high-potential Functional Business Analyst able to work closely with our clients to understand their requirements and work to identify and deliver the best process and system solutions to achieve mission. The ideal candidate can actively engage with clients and teammates to address challenges with existing processes or system functionality, identify fixes or new solutions … or technical requirements • Support the requirements refinement process, bringing current subject matter expertise or developing new expertise to more efficiently craft and document requirements to support solution improvement and system modernization to enhance the client's business functionality and overall performance, while maintaining a high degree of customer satisfaction • Analyze existing software applications, system interfaces, and business processes … for troubleshooting: investigate and analyze data to determine business problems and trends to and solve software problems or opportunities for process improvements • Support various aspects of requirements testing (e.g. system setup, produce &/or execute scenarios, documentation, defect management, user test support) for system, integration and user-acceptance testing to ensure minimal production defects are realized More ❯
Washington, Washington DC, United States Hybrid / WFH Options
BAE Systems
Job Description Performs work on the AWS hosted case managementsystem/application, including Production and Engineering Test environments, and CI/CD pipeline. Skills include Java, JavaScript, CSS, SQL, AWS services, networking, backup/recovery, Kubernetes, Helm, and Harness. Participates in CI/CD delivery and adheres to standards and conventions outlined as part of quality … Identify bottlenecks and improve performance of our platform. Required Education, Experience, & Skills U.S. Citizenship, with ability to obtainand maintain Federal Public Trust Bachelors Degree (preferred in Software Engineering, Information Technology or related area) Five plus (5+) years, building and maintaining Kubernetes clusters across hybrid-cloud infrastructure Eight-plus (8+) years of experience working in Operations, DevOps, or Site … Reliability Engineering Five-plus (5+) years in configuration/package management experience using tools like Terraform, Helm etc. Five-plus (5+) years of experience with Cloud service monitoring like Prometheus, Grafana, FluentD, ElasticStack, Prometheus, SumoLogic, etc. Experience Using Infrastructure as Code on a large scale multi-site deployment Experience Scaling platform capabilities Experience Implementing automated workflows Experience Maintaining More ❯
work directly with senior government stakeholders to ensure technical alignment across the lifecycle of complex defense, intelligence, and geospatial systems. Responsibilities Provide subject matter expertise on acquisition lifecycle management in accordance with DoD, IC, NGA, NSG, and NATO standards and directives. Review and assess requirements documents, architecture frameworks, policy guidance, test plans, and engineering artifacts to ensure technical … GEOINT and multi-domain operations. Participate in and advise various governance bodies (e.g., AGC, NARB, MIB, ITEC) and ensure integration of standards across NSG and ASG enterprise environments. Develop system architectures, identify process gaps, and recommend solutions using PRINCE2, ITIL, L6S, and other best practices. Conduct infrastructure and performance reviews, capability gap analyses, and strategic assessments for allied and … Telecommunications, Engineering, or related field; and 10-15 years of experience in defense acquisition, systems engineering, or intelligence community operations. Expertise in requirements engineering, capability development, and lifecycle management across C4ISR, JISR, BMC3I, and Cyber domains. Experience interfacing with senior military and civilian stakeholders, including international partners. TS/SCI with POLY is required to start Desired Skills More ❯
An exciting DHS Customer is on contract to provide division-wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) security authorizations, and deliver cyber security compliance for DHS operational mission systems. We are looking for personnel to support our … process. The result of these efforts will be that the systems meet all the requirements for ATO approval before they are officially submitted to the Office of Chief Information Officer (OCIO). Job Summary Serve as the Cybersecurity Assessment Team's principal Operational Technology SME. Participate in the development and implementation of comprehensive Cybersecurity program strategies, including OT … performance of hands-on technical assessments of OT systems and infrastructure. This includes the identification of in-scope technologies, application of industry-standard assessment strategies and available tools into system assessment plans, identifying vulnerabilities, and recommendation of corrective actions. Support the development and implementation of secure OT policies and assessment procedures, ensuring compliance with federal regulations and best practices. More ❯
services provided to the IC customer workforce are secure. This includes Identity and Access Control Infrastructure Operations, Cross Domain Infrastructure Operations, Cyber Security Infrastructure Operations, Cyber Security Operations, Information Technology (IT) Audit Infrastructure, and Security Infrastructure Operations. The right candidate will possess the below skills and qualifications and be ready to handle all responsibilities independently and professionally. Responsibilities … Formulates and publishes custom Security Information and Event Management (SIEM) tool content and IDS/IPS signatures to address threats. Performs security event and incident correlation using information gathered from a variety of sources within the enterprise. Analyzes … and assesses damage to the data/infrastructure as a result of cyber incidents. Performs cyber incident trend analysis and reporting. Characterizes and performs analysis of network traffic and system data to identify anomalous activity and potential threats to resources. Provides detection, identification, and reporting of possible cyber-attacks/intrusions, anomalous activities, and misuse activities. Creates, deploys, and More ❯
meet new requirements and enhancements to existing Unified Communications services to include identifying hardware refresh recommendations. Performs an AoA for periodic Unified Communications hardware refreshes following all. Changes Management processes. Creates and documents requisite network configuration. Performs design, project management, acceptance testing, and vendor assessment activities. Communicates with internal and external groups to … determine communications requirements and prepares engineering specifications to ensure functional requirements are met. Ensures the accuracy and completeness of systems documentation. Helps in the design and the development of system equipment, as well as installing, and testing system equipment and implementing procedures to make all components operational. Involvement in all aspects of service delivery, from carrying out feasibility … of Experience: 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD. Required Certifications: Information Assurance Technical (IAT) III Certification. Desired Certifications: ITIL Foundations certification desired Professional-level Cisco certifications desired. Required Skills: Experience utilizing trouble ticket systems like ServiceNow. Excellent customer service, writing More ❯
not limited to, the following: Network Design: Designs and plans network communications systems, including LAN, WAN, and video networks, to meet organizational requirements and ensure reliability, scalability, and security. System Architecture: Provides specifications and detailed schematics for network and video architecture, including diagrams, flowcharts, and technical documentation. Testing and Evaluation: Conducts testing of network and video designs, including functional … s Degree with the following experience: Network Operations & Fundamentals: Knowledge of LAN/WAN operations, network protocols, architectures, topologies, and networking devices (multiplexors, firewalls, hubs, bridges, gateways). Information Security Understanding of security policies, risk management, threat analysis, and vulnerability assessment. Video Technologies & A/V Solutions Experience with video conferencing, streaming, content delivery networks, and … cameras, displays). Accreditation Process Knowledge of accreditation tools for video and communications systems, including security assessments. Communication Skills Strong oral and written communication skills for conveying technical information to non-technical stakeholders. Dynamic Environment Ability to adapt to changing priorities, technologies, and requirements. Design & Documentation Tools Experience with Visio for network diagrams, flowcharts, and technical documentation. Extron More ❯
Cyber Watch (CyWatch) Assistant to support a Federal Agency in a contract role located in Clarksburg, WV. The Cyber Watch Assistant shall perform the following tasks: • Review all information for completeness, accuracy, and consistency. • Review incoming IC3 complaints for classification purposes, actioning complaints as directed. • Continuously review data to make recommendations for continued and improved methods of Contractor … incidents/complaints shall be created and moved from the draft state to submitted status for opening pursuant to established policy and procedures. • Compare data with data in the system of record as well as other source documents originating from OGAs and shall ensure details match to prevent duplicate records and provide quality control (QC) for the process. CyWatch … of in-person meetings pursuant to established procedures. • Assist in the formulation of replies, responses, and further disseminations of threat information received. • Transfer data to the appropriate system of record. • Perform open-source research as directed. • Assist with documentation preparation. • Participate in briefings as directed in the organization and other Federal agencies and departments in relation to More ❯
and digital engineering, software, test & evaluation, product support, cybersecurity, international/Foreign Military Sales, strategic communications, and IT support to more than 100 Above Water Sensor, Undersea, and Combat System programs and projects in the Navy's Program Executive Office for Integrated Warfare Systems (PEO IWS) and customers in Naval Surface Warfare Center, Dahlgren Division (NSWCDD), Office of Naval … software development tools within numerous requirements, specifically to planning, design, development, testing, installation, and maintenance of complex technical software systems Experience in producing technical and user documentation, training, and system orientation, and consulting with related development teams throughout the software development life cycle Experience in all aspects of software development supporting complex Multi-INT processing from initial planning and … design to final installation and maintenance Experience with enterprise computing and architecture design capability for ground-based analysis systems, to include systeminformation modeling and database design Experience incorporating system architecture using enterprise design, business process modeling (BPM), workflow implementation, and web-based/semantics-based development methodologies Experience developing and implementing databases to store raw More ❯
Description Assured Information Security is seeking a skilled Senior-Level FSR/Developer supporting our government customer between two sites: Hanover and Fort Meade, MD. The ideal candidate will have hands-on experience with expertise across various IT disciplines, including virtualization, operating systems, networking, automation, and security. This position requires on-call availability as needed. What You'll … virtualized environments using VMware/ESXi, with a focus on resource allocation, virtual networking (standard and distributed switches), and infrastructure optimization. Administer Linux systems (RHEL, Ubuntu) including patch management, disk partitioning, permissions, and repository configuration for offline maintenance. Manage Windows server infrastructure, including Active Directory, DNS, DHCP, and domain controller configurations, while executing secure offline updates using WSUS … NXOS for installing releases and performing security maintenance on network devices, as well as a solid understanding of TCP/IP protocols and Layer 2/3 networking concepts. System administration experience across Linux (RHEL, Ubuntu) and Windows environments, including offline maintenance (e.g., patching, repository/WSUS updates), managing core services (Active Directory, DNS, DHCP), and strong knowledge of More ❯
as Citrix, as well as MacOS and iOS platforms. - Troubleshoot and resolve a broad range of technical issues, from basic to complex network problems - Implement granular access controls, monitor system performance and accessibility, establish and maintain backup protocols, and ensure system security. - Diagnose and resolve complex enterprise storage issues across local and wide area networks, including replication strategy … maintain robust network environments by configuring routers, switches, and firewalls, as well as updating network devices and performing IP address audits. - Ensure optimal network performance by troubleshooting issues, enforcing system standards, and collaborating with stakeholders to optimize infrastructure. - Secure network systems through policy enforcement, access controls, and continuous monitoring. Required Skills: - U.S. Citizenship - Must have an active DoD Secret … automation/optimization - Strong documentation skills for technical procedures and SOPs - Capable of creating and maintaining network diagrams - Demonstrated experience in network design, implementation, and performance tuning - Project management capabilities and excellent time-management skills - Expertise in hardening network devices and infrastructure for enhanced security Required Education: BS Computer Science, Computer Engineering, Computer InformationMore ❯
services to an Intelligence Customer in the Northern Virginia. The main goal of this initiative is to provide critical capabilities to help enable efficient and timely GEOINT collection management across multiple collection FOSS/COTS platforms, with operational sustainability being at the forefront. We are looking for Software Developers to work with our team producing comprehensive GEOINT operation … Applying knowledge of computer hardware and software, subject matter to be programmed in business/mission applications, information processing techniques used, and information gathered from system users to develop software. Correcting program errors, compiling documentation of program development, and analyzing system capabilities to resolve questions of program intent, output requirements, input data acquisition, programming … dynamic user needs. Strong troubleshooting skills. Proven experience in COTS/FOSS integration and support. Scripting Knowledge and experience: JavaScript, Python, Perl, etc. Experience with DevOps tools and management platform: Chef, Jenkins, Ansible, Docker, Kubernetes, etc. Desired Experience Knowledge with the following Big Data technologies: Data Ingest (JSON, Kafka, Microservices, Elastic Search), Analytics (HIVE, SPARK, R, PIG, OOZIE More ❯
solving skills Ability to diagnose and resolve complex network issues quickly and effectively FILLING THIS POSITION IS CONTINGENT UPON FUNDING Requirements Technical bachelor's degree in computer science, informationsystemsmanagement, mathematics, or similar Active Secret clearance Ideal certifications: CCNA/CCNP, Security+ or higher Minimum five (5) years of experience in the design, installation, maintenance … troubleshooting, and management of complex network systems that typically link numerous computing platforms, operating systems, and network topologies Minimum three (3) years of broad and diverse background experience in business analysis, applications/systems engineering, and information operations and architecture Minimum three (3) years of experience designing, testing, and implementing interface programs, developing security procedures, and … and cyber policies Virtualization technologies (e.g., VMware, Hyper-V) Cloud-based networking solutions (e.g., AWS, Azure) Desired Skills Experience with the functions and capability of the Automated Digital Network System (ADNS) Experience in network integration with Surface Afloat ADNS Experience with Surface Ashore ADNS configurations will be required VCP or similar certification Clearance Information SRC IS A More ❯
near Wright-Patterson Air Force Base in Beavercreek, OH. We have earned national and regional awards in the Department of Defense for our proven IT, Engineering, and Program Management capabilities. We are committed to working with exceptional quality and professionalism to deliver excellence to our customers, while providing our employees a stimulating and satisfying work environment as we … security design to ascertain that security software, hardware, and firmware features affecting confidentiality, integrity, availability, accountability, and nonrepudiation have been implemented. Analysis of weapons systems' Supply Chain Risk Management plans and implementation. Develop A&A package artifacts for assigned systems as well as, assisting the program managers in developing decision briefings for the Security Control Assessor (SCA) and … QUALIFICATIONS: Prior performance in role as ISSM Information Assurance background with policy, STIGS, ACAS. Network security and Network management/operations experience is desired. Weapon system/airborne platform software, avionics or networking experience is desired. Knowledge of Enterprise Mission Assurance Support Service (eMASS) is desired Cloud/Web Development Experience with Certified Cloud Security More ❯
import and export. • Experience maintaining, monitoring, performance tuning, backing up, and recovering databases in a Hybrid Windows Linux or Unix environment. • Experience installing, configuring, maintaining, and patching database management software. • Experience in the use of Standard Query Language (SQL) to create, store, retrieve, and update data in relational databases. • Experience developing Procedural Language SQL (PL/SQL) packages … Experience with the Software Lifecycle Management and knowledge of Oracle products and database features sufficient to communicate performance factors, author management plans, and collaborate with system administrators, customers, and Director-level management. • Conduct periodic Information Assurance accreditation reviews and implement the applicable Security Technical Implementation Guide or Security Readiness Guide to databases, database … diagnose and resolve problems to satisfy customer needs. Required Skills and Experiences: Valid certification of an IAT-2 technical level with one of the following, Security+, or Global Information Assurance Certification's (GIAC) Security Essentials (GSEC), or (ISC)2 Systems Security Certified Practitioner (SSCP) Minimum Experience: 5+ years administering Databases/Database Entry, MS Access, Oracle, Microsoft Excel More ❯