as set by the Branch/Group. Technical/Functional skills - Proficient in common operating systems o Windows 10, Windows Server 2018 and above o Redhat Linux based Operating System - Software proficiency o VMWare v6.7 and above o Veeam Backup and Replication o Symantec Endpoint Protection o Symantec Endpoint Encryption o ManageEngine Patch Manager Plus o Microsoft Office … o Bloomberg FXT/eikons o Murex Treasury System o SWIFT Alliance Access (SAA) - Networking (IT) o Cisco Switches and Routers o Fortigate Firewalls o LAN/WAN Routing - Hardware o Dell PowerEdge Servers o Dell PowerVault SAN Storage - Data analysis - Basic PC/Laptop support (formatting, imaging, etc) - Experience of writing and updating IT policies, standards, procedures, and … guidelines Personal skills (Soft Competencies [Core/Leadership]) - Committed and dedicated to team deliverables. - Ownership of the business - Strong interpersonal stakeholders management skills - Strong written and verbal communication skills - Ability to train IT staff, supervise and motivate team members for high performance - Experience in coordinating installations, upgrades, and maintenance - Knowledge of architecture processes and performance reports of operating More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
Ctec Inc
Development o Design and Development: Create and maintain applications using programming languages with Integrated Development Environments (IDEs). o Implementation, Testing, and Deployment: Conduct code reviews, automated unit testing, system testing, and integration testing in multiple environments (i.e., Development, Testing, Staging, and Production). Trigger CI/CD pipelines (with built, test, scan, and deploy stages) culminating in deployment … to various environments. o Maintenance and Support: Provide on-call support for production systems, troubleshoot issues, and upgrade system software. o Collaboration: Work closely with business analysts and stakeholders (i.e., client-facing) to understand requirements and deliver solutions. o Documentation: Create and maintain technical application documentation to support systems' ongoing operations and maintenance. • Leads by example. Mentors and coaches … Working knowledge of integration technologies such as MuleSoft. • Working knowledge of Customer Experience (CX) and User Experience/User Interface (UX/UI), Section 508, United States Web Design System (USWDS), and Customer Journey Mapping (CJM). • Working knowledge of Application Security implementation, including NIST 800-53 R5 security controls. Education: • Bachelor's degree in computer science, Software Engineering More ❯
Washington Navy Yard in Washington, DC or may be 30 miles from the nearest Naval base. What will you do? Provide expertise in Cyber Security engineering, Navy Risk Management Framework (RMF) process … and validation, Navy Cloud Broker processes, and systems engineering. Support Zumwalt-class Total Ship Computing Environment (TSCE) with security engineering and testing. Support PMS 500 with transitioning the business system on the ship to a cloud-based environment. Support PEO IWS 9 and PMS 500 with security engineering and accreditation of TS/SCI domain on Zumwalt-class ships. … results to RMF policy and Standard Operating Procedures (SOPs). Create DoD approved diagrams from the DISM Connection Process Guide (CPG) to include Accreditation Boundary, Security Architecture, and Information Flow Management. Do you have what it takes? Required skills: Bachelor's Degree in Computer Science, Electrical/Computer Engineering or the equivalent combination of education, technical certifications and More ❯
Configuration Items (CIs), such as: Operating systems, firewalls, and intrusion detection/prevention systems (IDS/IPS). Critical security patches, configurations, and software baselines. Establish and maintain secure system baselines for hardware, software, and network configurations to mitigate vulnerabilities. Oversee cybersecurity-specific change management processes, ensuring all updates and modifications are reviewed for potential security impacts … Cyber Hygiene Scorecard, IAVM alerts). Coordinate with the cybersecurity team to assess risks and test changes in isolated environments before deployment. Regularly assess and validate the integrity of system configurations to detect unauthorized changes or misconfigurations. Maintain configuration documentation for cybersecurity-critical components (e.g., firewall rulesets, encryption configurations, and network topology diagrams). Ensure secure storage and controlled … access to sensitive documentation and system baselines, adhering to DoD information security standards. Identify risks associated with misconfigurations or deviations from secure baselines. Collaborate with cybersecurity teams to address vulnerabilities introduced by configuration changes, implementing mitigations as part of the CM process. Monitor and enforce compliance with DoD Cybersecurity Maturity Model Certification (CMMC) requirements. Automate detection of More ❯
Responsible For As an IT Applications Specialist with a specialization in Engineering CAD application management, support and administration, Software renewals, licensing management, and server updates, you will play a critical role in ensuring the smooth … operation of our IT environments. You will be responsible for managing software support tickets from our customers, licenses, tracking renewals, and applying essential server updates and patches to maintain system security and reliability. Key Purpose of Job Someone to manage the existing Business Systems, with the vision to make changes to improve efficiency and enhance the services offered. Keep … support and administration, experience dealing with or working in an engineering environment Knowledge of licensing models for various software products (e.g., Microsoft, Adobe, Oracle, CAD Applications). Experience with system monitoring tools and techniques. Familiarity with Windows and Linux server operating systems and patch management tools Experience of managing hybrid environments. Scripting abilities in PowerShell , Bash , or More ❯
Responsible For As an IT Applications Specialist with a specialization in Engineering CAD application management, support and administration, Software renewals, licensing management, and server updates, you will play a critical role in ensuring the smooth … operation of our IT environments. You will be responsible for managing software support tickets from our customers, licenses, tracking renewals, and applying essential server updates and patches to maintain system security and reliability. Key Purpose of Job Someone to manage the existing Business Systems, with the vision to make changes to improve efficiency and enhance the services offered. Keep … support and administration, experience dealing with or working in an engineering environment Knowledge of licensing models for various software products (e.g., Microsoft, Adobe, Oracle, CAD Applications). Experience with system monitoring tools and techniques. Familiarity with Windows and Linux server operating systems and patch management tools Experience of managing hybrid environments. Scripting abilities in PowerShell , Bash , or More ❯
Azure Cloud Engineer Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: CACI is seeking a Cloud Systems Engineer with strong hands-on experience in Microsoft Azure to support and maintain the operational stability, scalability, and security … DevOps teams to deploy and support cloud-native applications. Participate in the design and implementation of cloud solutions with a focus on reliability, cost-efficiency, and security. Proactively identify system issues and respond to incidents and service requests. Implement and maintain monitoring, alerting, and logging solutions using Azure Monitor, Log Analytics, and Application Insights. Operate and maintain Microsoft Endpoint … Azure Resource Groups, role-based access control (RBAC), policies, and tagging for cost control and governance. Perform regular updates, backups, and patching of Azure-hosted services and applications. Document system architecture and propose solutions and including cloud services to enhance system capabilities. Provide subject matter expertise into development of technical documentation, such as the System Design Document More ❯
Labor Category: Cyber Security Engineer Position Title: InformationSystems Security Engineer Position Level: Level 2 - Expert Salary: Up to $210,000.00 per year Core Hours: 9am to 4pm Location: Herndon VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. B4Corp is seeking a highly skilled and motivated InformationSystems Security Engineer … Conduct risk assessments and provide mitigation strategies for identified vulnerabilities. Coordinate and respond to external organizations to Support the Risk Management Framework (RMF) process, including preparation of System Security Plans (SSP), Contingency Plans (CP) Security Assessment Reports (SAR), and Plans of Action and Milestones (POA&M). Collaborate with System Owners, and other stakeholders to ensure … AWS Security Hub, GuardDuty, Splunk, or ELK for proactive monitoring, logging, and compliance reporting. Participate in security testing, audits, and incident response activities. Provide security engineering support throughout all system lifecycle phases. Stay current with emerging security threats and technologies. Details: Labor Category: Cyber Security Engineer Position Title: InformationSystems Security Engineer Position Level: Level 2 - Expert More ❯
thinker with a hands-on approach to managing and optimising our technical operations to ensure high performance, scalability, and reliability. Head of Technical Operatoins Key Responsibilities: Hardware Architecture Management: Design, implement, and manage the architecture and landscape of the hardware infrastructure to support OnBuy's growth and operational needs. Infrastructure Optimisation: Continuously evaluate and optimise the hardware infrastructure … Cloud Security: Manage and optimise security measures using Google Cloud Armour and/or Cloudflare. Database Management: Ensure robust performance and reliability of Redis and Couchbase databases. System Monitoring and Observability: Implement and manage comprehensive system monitoring, observability, and alerting frameworks. Performance Management: Regularly review and manage the performance of the technical operations team … management skills. Excellent problem-solving and analytical abilities. In-depth knowledge of hardware systems, network architecture, and data centre operations. Experience with Redis and Couchbase. Experience with system monitoring, observability, and alerting tools. Strong understanding of cost analysis, reduction, and forecasting. Experience with contract licensing renewals. Proficiency in using Google Cloud Armour and/or Cloudflare. Excellent More ❯
and organisational and governance teams. Monitor adherence to policy and raise exceptions through an agreed policy with the correct sign off. Identify, assess, and provide remediation plans for Information Security Risks. Ensure Information Risks are raised and treated according to the risk management process, including raising these to senior management for acceptance … where applicable. Collaborate with other members of the organisation to identify appropriate and effective information security controls. Engage in projects to ensure that Information Security controls are built into an implementation or … change. Engage in risk assessments and gap analysis exercises, while working collaboratively with various business units to implement the required remediation. Perform information control reviews to include system development standards, operating procedures, system security, programming controls, communication controls, backup and disaster recovery, and system maintenance. Perform Due Diligence reviews (Vendor Assessment) on new and existing More ❯
Labor Category: Cyber Security Engineer Position Title: InformationSystems Security Engineer Position Level: Level 1 - Subject Matter Expert Salary: Up to $230,000.00 per year Core Hours: 9am to 4pm Location: Herndon VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. B4Corp is seeking a highly skilled and motivated InformationSystems … Conduct risk assessments and provide mitigation strategies for identified vulnerabilities. Coordinate and respond to external organizations to Support the Risk Management Framework (RMF) process, including preparation of System Security Plans (SSP), Contingency Plans (CP) Security Assessment Reports (SAR), and Plans of Action and Milestones (POA&M). Collaborate with System Owners, and other stakeholders to ensure … AWS Security Hub, GuardDuty, Splunk, or ELK for proactive monitoring, logging, and compliance reporting. Participate in security testing, audits, and incident response activities. Provide security engineering support throughout all system lifecycle phases. Stay current with emerging security threats and technologies. Details: Labor Category: Cyber Security Engineer Position Title: InformationSystems Security Engineer Position Level: Level 1 - Subject More ❯
and deliver storage solutions aligned with business objectives. Provide technical expertise and support for storage-related issues, including incident resolution and root cause analysis. Develop and maintain documentation, including system configurations, procedures, and operational guidelines. Implement and enforce data management policies, ensuring compliance with regulatory requirements and internal standards. Stay current with industry trends and emerging technologies … troubleshoot complex storage issues Qualifications: Fourteen (14) years of experience as an SE in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Five (5) years of additional … Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service-Disabled Veteran Owned Small Business with a specialization in technology and management consulting committed to solving intricate and sensitive technology issues facing corporations and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment More ❯
and security posture situational awareness for the enterprise. This opportunity is in anticipation of a future contract award! What you'll be doing: Lead the design, implementation, and management of advanced cybersecurity solutions that protect critical systems and sensitive data. Serve as a technical authority, providing strategic direction and hands-on expertise in securing enterprise infrastructure, applications, and … and manage vulnerability management programs, ensuring timely remediation of discovered vulnerabilities. Conduct penetration testing, red team/blue team exercises, and security audits to assess and enhance system resilience. Collaborate with system administrators and developers to prioritize and remediate identified vulnerabilities. Ensure compliance with regulatory standards such as GDPR, HIPAA, PCI-DSS, SOC 2, and FedRAMP. … legal, compliance, and internal audit teams to ensure alignment with regulatory requirements. Collaborate with IT, engineering, and development teams to integrate security best practices into all stages of the system lifecycle. Lead security architecture reviews, risk assessments, and compliance audits. Mentor and provide technical leadership to junior security engineers, promoting knowledge sharing and professional growth. Advocate for a "security More ❯
our digital journey and have an ambitious portfolio of digital technology initiatives ahead of us, all grounded around - empowering patients and service users; improving the experience navigating the healthcare system and joining up systems and data across to better meet the needs of citizens. Main duties of the job This role is part of our configuration team, who are … so much more! To see the full range of benefits we offer please see our Moorfields benefits document. Job description Job responsibilities Skills needed for this role Incident management: You can identify and register incidents, gathering the required information and allocating it to the appropriate channel. Problem management: You can investigate problems in systems … services, with an understanding of the level of a problem (for example, strategic, tactical, operational). You can contribute to the implementation of remedies and preventative measures. Change management: You can implement simple changes based on requests for change. You know how to apply change control procedures. Asset and configuration management: You can maintain secure configuration More ❯
Database Developer to lead data operations in support of a federal agency's mission-critical objectives. This role will drive the implementation and oversight of a comprehensive data management framework ensuring data integrity, accessibility, security, and performance across systems. Key Responsibilities: Data Management Framework Conduct assessments of current data environments. Design and document enterprise data management … data definitions across platforms. Ensure easy access to data and reports for stakeholders via clear documentation and UI features. Minimum Qualifications: Education Bachelor's degree in Computer Science, InformationSystems, or related field. Experience 15+ years of federal data support and database development experience. Deep expertise with relational and non-relational database management systems. Proven success … interpersonal skills, with the ability to interface with federal stakeholders and technical teams. Must be eligible to obtain and maintain a Public Trust clearance. Demonstrated commitment to data integrity, system reliability, and continuous improvement. More ❯
systems, and a passion for continuous improvement in cybersecurity operations. What you'll be doing as a Senior Cyber Security Engineer Support the creation of secure asset builds and system hardening capabilities across end-user computing and server environments. Collaborate with business stakeholders to align cybersecurity engineering strategies and controls with organisational goals. Develop and maintain cybersecurity engineering documentation … actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security engineering tool performance … enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge of network More ❯
systems, and a passion for continuous improvement in cybersecurity operations. What you'll be doing as a Senior Cyber Security Engineer Support the creation of secure asset builds and system hardening capabilities across end-user computing and server environments. Collaborate with business stakeholders to align cybersecurity engineering strategies and controls with organisational goals. Develop and maintain cybersecurity engineering documentation … actions. Liaise with technology and business teams regarding patching and vulnerability remediation. Develop and maintain cybersecurity engineering dashboards and metrics. Provide tooling support and maintenance for Identity & Access Management, Privileged Access Management, Endpoint Security, and Network Security. Support compliance with standards and regulations, including GDPR, NIS, and ISO 27001. Monitor and optimise security engineering tool performance … enterprise environment. Strong understanding of both IT and OT systems and infrastructure.Experience in identifying and remediating cyber risks in evolving digital environments. Good knowledge of identity and access management technologies (e.g. Entra ID, CyberArk). Familiarity with a range of operating systems and security considerations across SaaS, IaaS, end-user computing, and server estate. Sound knowledge of network More ❯
testing and risk management. You'll use your curiosity for technology and market trends to further research and develop security solutions. Using your knowledge and experience in Agile methodologies, system architecture, and T & E strategy, you'll assess security threats and implement infrastructure controls. In this role, you'll closely impact Navy missions by championing cybersecurity, discovering cyber risks … audiences, including senior management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Join us. The world can't wait. You Have … 5+ years of experience with Assessment and Authorization ( A & A ) and hands-on implementation and execution of all steps of the Risk Management Framework ( RMF ) process to achieve accreditation 5+ years of experience developing RMF artifacts, including Plans of Action and Milestones ( POA & M ) , and working with cybersecurity tools and technologies Experience with cyber engineering and the Cybersecurity More ❯
Lead and manage a team of application developers, system architects, and IT professionals under the Business Application, Development & Reporting division. Develop and implement the strategic roadmap for business applications in alignment with the company's goals. A full review of the applications is required and an End-State Architecture plan produced & executed. Lead digital transformation projects, ensuring they are … delivered on time and within budget. Oversee the lifecycle of application development projects from inception to deployment. Principal Accountabilities: Lead and manage a team of application developers, system architects, and IT professionals. Mentor and develop team members, promoting a culture of continuous learning and improvement. Oversee recruitment, training, and performance evaluations of team members. Develop and implement the strategic … delivery and efficiency. Coordinate with cross-functional teams to ensure seamless integration of new applications. Utilise expertise in various technology stacks including Java, PHP, AWS, Azure, and database management systems. Strong understanding of bespoke applications, Business Central, Jira, Power BI, and CIDC. Ensure the security and compliance of business applications. Introduce and maintain CI/CD pipelines and More ❯
systems are secure, efficient, and aligned with business objectives. This remote UK-based role requires occasional travel to our London office for in-person IT support. Responsibilities IT Management Oversee and manage all internal IT systems, including end-user devices, SaaS platforms, and network infrastructure. Act as the primary point of contact between the company and the existing … are mostly Mac users with a handful of Windows machines. Ensure a smooth onboarding/offboarding process and resolving technical issues efficiently. Implement and maintain identity and access management (IAM) systems, including SSO and MFA. Evaluate and recommend new technology solutions to support company growth and enhance operational efficiency. Partner with the CTO to develop and execute IT … compliance with regulatory standards. Lead employee training and awareness programs on cybersecurity practices. What you'll need to succeed 5+ years of experience in IT management or system administration 2+ years in an InfoSec-related role Technical Skills: Proficiency in managing SaaS platforms like Microsoft 365, and endpoint management tools (e.g., Jumpcloud). Strong understanding More ❯
for securing applications developed on low (unsecure) networks and deployed on high (secure Government) networks, addressing specific challenges of data transfer, sanitization, and access control between domains. Vulnerability Management: Conduct and oversee vulnerability assessments, penetration testing, and security audits of web applications and supporting systems. Analyze results, prioritize findings, and work with development teams to ensure timely remediation … and mitigation strategies. Risk Management & ATO Support: Identify, assess, and manage security risks, contributing to the program's overall risk posture. Prepare and maintain comprehensive security documentation (e.g., SSPs, SARs, POA&Ms) to support Assessment & Authorization (A&A) processes and achieve/maintain Authority to Operate (ATO). Security Control Implementation: Advise and assist development teams in the … containment, eradication, and recovery efforts. Continuous Monitoring: Support ongoing continuous monitoring activities to maintain the security posture of deployed applications and systems. Collaboration & Communication: Work closely with development teams, system administrators, program managers, and government security stakeholders to foster a strong security culture and ensure effective communication of security requirements and risks. Required Qualifications: Active Top Secret/SCI More ❯
technologies, standards, and production techniques through continued training and self-development. Basic Qualifications TS/SCI w/Poly Clearance is required Bachelor's degree in Computer Science, Information Technology, Engineering, or a related technical field, and 8-12 years of relevant experience; or Master's degree with 6-10 years of relevant experience; or … Doctorate in a technical domain with relevant experience. Proven experience supporting and integrating hardware, software, and network configurations across enterprise-scale environments. Strong knowledge and hands-on experience with system administration, network installations, and software deployments. Demonstrated ability to troubleshoot complex technical issues involving multiple systems or disciplines. Ability to develop and implement system installation, configuration, and support … procedures. Effective communication skills with both technical and non-technical stakeholders. Experience providing technical leadership and mentoring in multi-site or enterprise environments. Proficiency with Microsoft Windows environments, system integration tools, and configuration management. Preferred Qualifications Experience working in mission-critical or secure environments (e.g., defense, aerospace, federal agencies). Expertise in systems integration involving cross-platform environments (Windows More ❯
across departments.• Design integration architectures, including data flow diagrams, and technical specifications.• Develop and oversee the implementation of APIs, middleware solutions, and ETL processes.• Experience for development and management of APIs for real-time data exchange between systems.• Experience with cloud-based platforms (AWS, Azure, Google Cloud, and Oracle Integration Cloud) and cloud-to-cloud, on premises-to … to gather requirements and ensure alignment with business objectives.• Collaborate with stakeholders to gather requirements, provide status updates, and address any concerns.• Identify opportunities for improving integration processes and system efficiencies. Stay current with industry trends and advancements in integration technologies.• Conduct thorough testing of integration processes, identifying and resolving issues.• Perform data validation to ensure accuracy and completeness … Azure).• Oracle certification in Fusion applications or integration tools is a plus.• Familiarity with data governance and security protocols• Experience of Transit Industry in Supporting Financial and HR system integrations and migrations Min Citizenship Status Required: Must be a U.S. Citizen or Work Visa Holder Physical Requirements: No Physical requirement needed for this position Location: Washington, DC Remote More ❯
the GovCloud instance compliant with customer policy directives (PD) and guides (PG) mandated to ensure legal and information security compliance. This shall include analysis of the existing system in collaboration with other team members and Government PM, and designing an appropriate solution. Candidates shall be skilled in multiple web application languages, reverse engineering, and have a strong … and managerial team members to troubleshoot and resolve issues. The contractor shall: Required Education, Experience, & Skills Minimum Education: Bachelor of Science (B.S.) Degree in Computer Science, Software Development, InformationSystems or related field of study, or in lieu of education, six (6) additional years of relevant experience. Minimum/General Experience: Five (5) or more years of experience … in building multi-tier framework software applications using object-oriented programming languages, specifically C#. One (1) or more years of experience with cloud (Azure preferred) application development and management; Experience migrating on-premises hosted applications to the cloud (Azure preferred); Experience developing cloud native applications (Azure preferred); Experience developing SOAP and REST APIs in a client/server More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
Undisclosed
delivery of pragmatic business and operational design solutions which maximise benefits while achieving the desired business outcomes Lead Business Analysis from inception to implementation and transition to BAU Endorsing system parameter changes where they impact customers, products and services Supporting the implementation of continuous improvement approaches, including Lean To ensure that internal controls are in place to safeguard the … delivery of the STP and MTP Responsible for devising and developing approaches that are optimal in delivering high Operational Capability and that are reusable, adaptable and transferable. Stakeholder Management and Leadership Acting as the lead Business Analyst from project inception through to implementation and transition to BAU. This role will require a high degree of managerial skills on … to manage relationships and gain commitment from senior stakeholders. To pursue own development to increase personal effectiveness, acknowledging strengths and areas of development Ability to install confidence amongst information technology & end business users. Demonstrating a strong & sound knowledge in relation to business processes & associated technologies. Work alongside the Information Technology Analyst’s & the wider project team More ❯