Opportunity PeopleTec is currently seeking a Senior Survivability Engineer to support our Huntsville, AL location. Develops and implements survivability strategies to enhance system resilience against kinetic and non-kinetic threats. Conducts vulnerability assessments and integrates countermeasure technologies across platforms to meet mission survivability goals. Strategic partner to the Program Manager, AMCOM G2, and AvMC Protective Technologies. Influences program direction … based on technical considerations and System Security Engineer requirements and initiatives. Presents threat assessments, near peer threat systems, and system assurance requirements for review and approval. Supports the PMO in managing changes to the system to improve system resiliency. Duties: Technical: Establishes the requirements for the protective technologies, export controls, and improved system assurance of … their progress to support the fielding resilient systems. Works with Foreign Military Sales to provide input to protect Critical Program Information (CPI) and other technologies of the system that are selected to be sold to foreign partners. Works with the Protective Technologies office to ensure appropriate technologies are utilized to protect CPI. Ensures system protection and More ❯
Assist the Government Business Contract Management Offices with conducting the End of Year activities. Enter, process, and modify requisitions in the NSA's financial managementsystem to include all necessary information and ensure customer acceptance. Create and maintain spend plans in the customers financial managementsystem Assist Government Program Managers … Four (4) years of DoD, IC, or 6 (six) years of combined DoD, IC and commercial experience in purchasing or finance required. NSA's financial managementsystem and its interfaces (currently FACTS, CMIS and CDW) experience is preferred. In lieu of two (2) years of experience, an undergraduate degree with a business focus is acceptable. Proficiency with … in areas of cost, schedule and performance is required. Experience in budget planning, budget preparation and budget execution for acquisition programs is required. NSA's financial managementsystem and its interfaces (currently FACTS and CMIS) experience is preferred. In lieu of a degree, Program Management Professional (PMP) certification, Certified Defense Financial Manager (CDFM), or DAWIA More ❯
and tickets with accuracy, timeliness, reliability, and consistency. Drafting summaries of ongoing operations and be able to provide oral presentations for various levels of leadership. Maintaining knowledge objects in system of record consistently and professionally. Threat and vulnerability management to recognize and categorize types of vulnerabilities, threat actors, and different operational threat environments, and associated attacks (MITRE … ATT&CK framework). Knowledgeable of network security monitoring and/or security operations analysis, system administration, operating system hardening, cyber hygiene techniques, and cybersecurity defense policies, procedures, and regulations. Requirements: U.S. Citizenship Active TS/SCI Clearance Must be able to obtain DHS Suitability BS Incident Management, Operations Management, Cybersecurity or related degree. … handling methodologies Ability to track multiple active engagements, personnel or equipment deployments, as well as coordinate with internal and external stakeholders. Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering More ❯
and policy compliance, debug, document, deploy, and maintain the software. Manipulate extremely large data sets, and data queries for existing or proposed databases Provide requirement analysis and synthesis from system to component level software Working with Real Time Systems and Business ManagementInformationSystems Resolve software issues and problem reports, modifying existing software to work … design Oversee/lead one or more software development teams to ensure work is completed per the requirements and process of each particular project Generate designs in coordination with System Engineering to address the performance and cyber requirements of each particular project Assist in developing and executing test procedures for software components Generate and maintain technical documentation for each … working in an Agile and or SAFe development approach Experienced in scoping and assessing efforts to get a task accomplished Experience leading efforts of working requirements with customers and system engineers, and leading the development of software solutions for satisfying them Experience working effectively in a cross functional team environment, developing solutions to customer/system requirement and More ❯
The Joint Defense Support Group (JDSG), within SPA's Sea Land Air (SLA) Division, supports the Surface Community and components of the United States Navy by providing program management, requirements management, force development, and readiness support in Washington DC and the Fleet concentration areas. We provide timely, objective, analytic assessments, strategic planning, and expert operational, technical … short suspense time-line. Prepare and present executive level products as needed. Will be required to successfully complete courses on the Navy's Planning, Programming, Budgeting and Execution (PPBE) System, PBIS database, and Action Officer Training. Qualifications Required Qualifications: Bachelor's degree in Mathematics, Business, Physical/Applied Science, or management disciplines such as Business Administration, Accounting … independently with a minimum of supervision and guidance SECRET Clearance, and the ability to maintain it throughout employment Desired Qualifications: Experience with the Program and Budget InformationSystem (PBIS), Intelligent Workbook module of the Navy Manpower Programming and Budgeting System (NMPBS) and Corporate Automated Resource InformationSystem (CARIS) Knowledge of the Planning, Programming More ❯
life cycle. Identifying manual processes that can be automated. Selecting and deploying appropriate CI/CD tools. Implementing various development, testing, and automation tools, optimizing IT infrastructure. Ensuring that system improvements do not jeopardize system security. Striving for improvement, and building continuous integration, development, and deployment pipelines (CI/CD). Persevering when facing challenges, with a strong … years of experience managing tools for development, deployment, and integrated test. Must have at least 5 years of experience working with CI/CD frameworks. Must have meaningful System Administration experience (mostly Windows but also Linux). Must have experience with several of the following: Java, Groovy, Python, PowerShell, Batch, and Bash scripting, JavaScript, AngularJS. Must have experience with … life cycle. Identifying manual processes that can be automated. Selecting and deploying appropriate CI/CD tools. Implementing various development, testing, and automation tools, optimizing IT infrastructure. Ensuring that system improvements do not jeopardize system security. Striving for improvement, and building continuous integration, development, and deployment pipelines (CI/CD). Persevering when facing challenges, with a strong More ❯
of breaches, develop mitigation plans, and assist with the restoration of services. Nightwing is seeking a Technical Engagement Network (TEN) Lab Manager with experience in Linux, Splunk and Ansible System Administration to support the design, development, and deployment of advanced cybersecurity capabilities in the customer environment supporting analysts and business continuity of the customer mission. Responsibilities: - Serve as a … Configure, deploy, and maintain Red Hat Ansible Automation Platform for large-scale provisioning, configuration management, and compliance enforcement. - Administer and maintain Splunk Enterprise/Splunk Cloud for system monitoring, security analytics, and operational intelligence - Implement and monitor security controls, including STIG compliance, access management, and audit configurations for Linux and Splunk systems. - Develop dashboards and … alerts in Splunk for proactive system health, performance, and security event monitoring. - Performing implementation of granular access control, and monitor systems for acceptable performance and user accessibility, establish back-ups, and monitor systems security. - Troubleshoot and resolve complex storage problems across the enterprise related to storage and replication strategies across local and wide area networks, monitor channels for storage More ❯
Overall management of Client InformationSystem resources. This includes formulating I.S. departmental business plans and budgets in support of the department and overall company objectives. Position will also be responsible for all daily systems operations, equipment maintenance, and subordinate task management. Incumbent will also provide hands-on service to the user community as required in … formulation and monitoring of a disaster recovery plan for all systems. Develop and manage a project change methodology for the department. Maintain knowledge and operation of an IBM Power System environment and its associated applications. Maintain knowledge and operation of a Windows Server environment which includes on-prem Active Directory Domain Controllers. Maintain knowledge and operation of network management … Willing to travel and support multiple locations. Establish a long-range departmental plan in support of the company goals. Ability to manage and develop departmental staff. REQUIREMENTS: Must have system/network administration experience working with a virtual server environment. The individual must also be comfortable troubleshooting and maintaining on-prem equipment and be able to perform each essential More ❯
parser software, and database loading software. Project long-range requirements for database administration and design. Responsible for developing a database structure that fits into the overall architecture of the system under development and has to make trades among data volumes, number of users, logical and physical distribution, response times, retention rules, security and domain controls. The DBE works primarily … at the front end of the lifecycle-requirements through system acceptance testing and Initial Operational Capability (IOC). Develop requirements from a project's inception to its conclusion for a particular business and Information Technology (IT) subject matter area (i.e., simple to complex systems). Assist with recommendations for, and analysis and evaluation of systems improvements, optimization … storage and retrieval using Cloud methodologies. Support the database design, development, implementation, information storage and retrieval, data flow and analysis activities Support the analysis and evaluation of system improvements, optimization, development and/or maintenance efforts Support the development of long and short term requirements for database administration and design Translate a set of requirements and data More ❯
Network-System Administrator 3 The primary function will be to organize, install, and support government organization's computer systems, including local area networks (LANs), wide area networks (WANs), network segments, intranets, and other data communication systems. This will also include helping architect, design and analyze network models. It will require participation in decisions about buying future hardware or software … such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties may include : Able to perform self-sustaining and work with little to no oversight Lead IT ops team on day to … JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes Manage COTS & GOTS products to collect, display and remediate a variety of automated system. security and system operations/performance functions and metrics. Assist during security assessments of servers/network devices/security appliances Assist during security assessments with regard to accuracy and efficiency Assist More ❯
Company Summary Arlo Solutions (Arlo) is an information technology consulting services company that specializes in delivering technology solutions. Our reputation reflects the high quality of the talented Arlo Solutions team and the consultants working in partnership with our customers. Our mission is to understand and meet the needs of both our customers and consultants by delivering quality, value … Maintain personnel security documentation, ensuring that in-processing and out-processing records are accurate and up to date. Database and Security Systems Maintenance: Update the Defense InformationSystem for Security (DISS) and related databases, ensuring the accurate tracking of security clearances and personnel access. Process classified visit requests and verifiy clearances through systems like DISS and Scattered … on security incidents, access suspensions, and personnel clearances. Manage the secure handling, storing, marking, dissemination, and destruction of classified materials in accordance with applicable regulations. Maintain a comprehensive file system tracking security clearance statuses, access denials, revocations, and other regulatory requirements. Required Skills and Qualifications: Security Expertise: In-depth knowledge of DoD and Intelligence Community security procedures, including ICD More ❯
vesting schedule. Career development opportunities, including on-the-job training, tuition reimbursement, and networking. A positive work environment where employees are respected, supported, and engaged. Job Requirements (Mission Management and Mission Integration ) Desired experiences : Assist aligning processes and technology to enable information sharing by analysts and organizations for analytic production. Uses centralized and peripheral databases, content … management, records managementsystems and shapes workflow and processes. Compiles reports on performance and usage metrics and future requirements for existing knowledge management capabilities including, but not limited to, search, discovery, storage and retrieval of data and formal production and taskings. Disseminates intelligence products across separate networks and portals. Deliver expertise regarding intelligence production … and offices. Support the coordination and consolidation of divisional inputs for the review and updates of the Quarterly Defense Intelligence Analysis Program Workforce Alignment and Quarterly Defense Readiness Reporting System Assessments. Support the coordination and consolidation of DIE-CT Inputs for enterprise wide CT support to the national intelligence manager (NIM)- CT and the annual DIE-CT capabilities state More ❯
Keeps informed of the latest technologies to enhance knowledge of networking hardware, software, and best practices. May be certified in vendor-specific products. Major Duties and Responsibilities Network management for client systems: Ability to manage client internal IT network Cyber Security management and oversight Develop and support all hardware configuration for all Avert products as determined … infrastructure partner (nFina) on our scalable environment Create, develop, and implement solutions to address infrastructure and security requirements Troubleshoot, identify, and fix problems in the DevSecOps domain Identify management concerns and problems, assess them, and offer prompt solutions and/or escalation Required Work Experience and Skills The following skills and attributes are necessary to be successful in … and support contractors. Knowledge of systems and tools that can augment network management and security. Familiarity with tools such as Bitdefender and Manage Engine or similar. Operating system knowledge for Linux and MS Windows server and desktop systems. Experience managing desktop support Ability to express technical information clearly at different organizational levels Solid level of More ❯
or SCI environment experience within the last 5 years MA/MS/ME in Computer Science, Cybersecurity, MIS, or related degree 1+ year of experience using Risk Management Framework (RMF) IT security controls and … policies DoD 8140/DoD 8570 IASAE Level II Certification Security Professional Education Development (SP?D) Certification Program Job Summary: seeking a qualified and motivated Cybersecurity InformationSystem Security Officer (ISSO) Level 3 to support a mission-critical DoD program. This role offers the opportunity to work alongside a skilled team of professionals dedicated to cybersecurity excellence … security controls to safeguard the confidentiality, integrity, and availability of DoD systems and data. Your work will ensure alignment with existing hardware and software configurations, while maintaining coordination with system and network configuration managers. In this role, you will support the Risk Management Framework (RMF) life cycle-spanning assessment, authorization, sustainment, and system disposition. You'll More ❯
and Access Management (ICAM) capabilities for the enterprise and stand-alone deployment throughout the IC. Tasks include program management, mission support, software integration, software development, system engineering, migration, testing, documentation development, network and system monitoring, configuration control and release management. Responsibilities: We are looking for technical staff to provide 24x7 support to an existing … Required: • TS/SCI Clearance with polygraph • 7 years' experience of relevant experience in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. 5 years of additional technical … Attribute Based Access Control (ABAC) Entitlements Management LDAP directories SQL and basic database querying abilities RESTful services Ticket tracking systems (e.g., JIRA, Redmine, SNOW) Ability to: Analyze system applications and perform troubleshooting. Understand and communicate complex software systems. Modify Confluence pages and write technical documentation to support customers. Assist with educating/training customers on software capabilities. More ❯
and digital engineering, software, test & evaluation, product support, cybersecurity, international/Foreign Military Sales, strategic communications, and IT support to more than 100 Above Water Sensor, Undersea, and Combat System programs and projects in the Navy's Program Executive Office for Integrated Warfare Systems (PEO IWS) and customers in Naval Surface Warfare Center, Dahlgren Division (NSWCDD), Office of Naval … servers, telecommunications networks, remote access systems, and mail servers Desired Experience designing and implementing informationsystems which will adequately support the enterprise infrastructure of the organization, analyzing system requirements and ensuring that systems offer security and effectively integrate with current applications, ensuring that all systems work at optimal levels and offering support to application development department regarding … new technologies and system requirements, establishing detailed understanding of infrastructure, application programming, and web and software applications, and managing suites of hardware and software infrastructure components, including Virtual Machine (VM) management in both secure and unsecure network environments supporting complex Multi-INT development to High Availability (HA) operational processing systems for a variety of government clients Ability More ❯
and projects. We're seeking a Construction Contract Administration Project Manager to be based in Huntsville, Al (Redstone Arsenal), responsible for administering construction documentation, and a variety of management roles in specific project, business, and/or technical functions. As a member of our CCA team, you will lead Construction Administration project consisting of multi-discipline teams of … lead this project on-site (project field presence) as required by project and client needs. The candidate will lead this construction contract administration project by effective, skilled project management techniques to advise the Government of construction support solutions, leveraging project success by delivering cost-effective and value-added decisions to the flow of information, delivering costs … contract documents, etc. in conjunction with the Design Team. • Manage the flow of construction-related documents, including input and recording data in a web-based Construction InformationSystem (CIS). • Organize and maintain project specific CCA procedures manuals, project filing systems, and the document control system within the CIS system and corporate network drive. • Coordinate More ❯
San Diego, California, United States Hybrid / WFH Options
Serco Inc
Experienced Senior-Level Surface Warfare Analyst (SWA) sought to support PMS 339 in the planning, development and management of a Surface Training and Readiness ManagementSystem (STRMS) that enables collection and analysis of data supporting training effectiveness throughout the Fleet. Directly supports Senior Staff personnel by investigating, consolidating, and providing recommended solutions for training issues … to support applicable Surface Warfare Enterprise (SWE) stakeholders in reaching informed surface Navy training investment decisions. Support Senior TYCOM Staff in implementing viable surface force training automated decision support system consistent with west-coast TA. Determine and establish organizational structures and supervisory relationships. Support development of a Training and Readiness ManagementSystem Application that supports management and collection of Kirkpatrick level three training data training effectiveness data and automated ROI Assessment. Provide information assurance Subject Matter Expertise and recommend system enhancements to improve Information Security deficiencies. Assist in the integration of innovative technology, design concepts, and systems to improve sharing, collection, and analysis of data with Career Training Continuum More ❯
with MDOC clients and DTMB professionals to develop requirements, analyze data in support of projects, make recommendations for process and business flows, and develop consensus on both business and system requirements. This position will take on a leading role in completing the activities associated with Request for Proposals (RFP), estimating costs to complete projects, establishing action plans, completing impact … analysis, and implementing test strategies. Serves as a liaison to vendors, and an IT system owner representing the agency for impact and strategic planning. Engage with the MDOC in establishing and fulfilling the Agencies strategic goals and objectives through exemplary delivery of IT Services. Inform and escalate issues and risks in a timely manner. Participate in DTMB or statewide … alternatives, exercise sound judgment, and implement effective solutions; to develop and evaluate policies and procedures; and prepare reports. Ability to communicate effectively with vendors, customers, and enterprise technology management Ability to build and maintain effective relationships with cross-departmental and inter-agency teams; including effective communication skills with technical and non-technical groups. Ability to organize and develop More ❯
for the Army Research Lab, which operates 24/7/365. The ideal candidate must possess excellent customer service skills and the ability to effectively communicate technical information to non-technical users. Key Responsibilities • Proactively maintain and develop all Linux infrastructure technology to maintain a 24x7x365 uptime service at the Service Desk. • Manage, coordinate, and implement software … infrastructure. • Collaborate with other teams and team members to develop automation strategies and deployment processes. • Develop, implement and maintain security controls and supporting documentation as required for risk management framework (RMF … . • Fault finding, analysis and of logging information for reporting of performance exceptions. • Support security incident reporting, vulnerability assessments, and information assurance compliance scans. • Maintain system evaluations and certifications. • Facilitate the creation and maintenance of Identity and Device Management • Provide platform administration for Linux based applications. • Provide input on ways to improve the More ❯
Virginia 22315 Clearance Level: Active DoD - Top Secret SUMMARY Bureau of Diplomatic Security (DS) requires a seamless, end-to-end approach to supply chain services with a strong management infrastructure and robust analytics capable of integrating and managing the flow of products and information to ensure an efficient and effective operation. The information provided … and provides solutions which are highly innovative. Provides expert knowledge for maintenance and upgrade of intrusion systems. Provides knowledge for IDS integrity while ensuring compliance with policies and maintains system backup and recovery capability. Coordinates the acquisition of hardware and software as well as subcontractor services as needed. Evaluates new communications technologies to enhance capabilities of the network. Maintains … Years of Experience Bachelor's degree in engineering from an accredited university (e.g., Electrical Engineering, Computer Engineering, Mechanical Engineering, Electrical and Computer Engineering, or Electromechanical Engineering, Computer Science or System engineering). 10+ years of experience, minimum 5 years of alarm system design experience. Minimum Secret level clearance issued by the Defense Security Service (DSS), Department of Defense More ❯
program. Responsibilities This role provides programmatic, technical and acquisition support to the Joint Explosive Ordnance Disposal (JEOD) program. The ideal candidate will possess a strong background in program management with experience supporting defense or federal programs. They bring strong leadership, organizational, and technical expertise to assist with the management of complex projects involving information … and maintain continuity of accountability with the APM for various service providers. • Help lead planning and execution efforts for software development and deployment across multiple platforms and systems. • Support system lifecycle activities including software development, deployment, maintenance, updates, and user support to maintain system reliability and minimize downtime. • Explore and plan the integration of emerging technologies to improve … and milestone planning. Required Qualifications • Active SECRET clearance • 5+ years of experience • 3+ years of experience supporting a US Navy or Joint acquisition program • Bachelor degree in Engineering, InformationSystems or related field • Knowledge of the Navy Acquisition process • Ability to generate, evaluate, and guide technical reports, briefings, and other stakeholder communications. • Strong written and verbal communication skills. More ❯
Overall Assignment Description: The N2W Cyber Security Engineer will serve as a member of the N2W Active IT and project team, providing systems engineering, security engineering, and project management expertise. The N2W Cyber Security Engineer will support the overall goals/objectives of the NGA Technical Security Program, specifically, cyber security requirements required to support the National Security … Information (NSI) compliance. The N2W Cyber Security Engineer will support the development and documentation of the N2W Active IT Cyber Security architecture, roadmaps and investments. The Cyber Security Engineer will act as a technical point of contact for many of the N2W activities, work with other teams to complete studies/research, develop concept of operations (CONOPS) in … requirements for the planned wired and wireless environments of the N2W. Develop encryption strategies in compliance with IC/DoD/NGA standards and policies. Support Government to develop system security plans and accreditation packages. Review cyber security Test Plans/Test Reports and provide input to the government. Assist in the development of mitigation strategies and exception packages. More ❯
the program's global effectiveness, increase operational visibility into its IT assets, and drive cost savings by implementing the full range of ServiceNow capabilities, to include IT Service Management (ITSM), IT Operations Management (ITOM), IT Asset Management (ITAM), IT Business Management (ITBM), Security Operation (SECOPs), Governance, Risk, and Compliance (GRC). Responsibilities … the strategic development of new platform development, as needed, based on customer needs Performs management and configuration of ServiceNow applications and modules, product development, service automation, and system integration. Lead or mentor junior developers on an agile, ServiceNow implementation team Actively collaborates with other teammates to perform code reviews, discuss new developments and projects, and shadow other … all SCRUM ceremonies and/or discussions with team members and stakeholders. Aids with reporting configuration and maintenance and performs operational administrative tasks, as needed. Assesses architecture and current system limitations, defines, and designs system specifications, and evaluates input/output processes and working parameters for hardware/software compatibility. Plans and manages meetings, as needed to solicit More ❯
engineering, integration, and advanced technology services to transform the future safety, security, and resiliency of critical missions on the ground, in the air, in space, and in the informationsystems that connect these domains. Learn more about ENSCO. Position Description ENSCO, Inc. is seeking an INFOSEC/Cybersecurity Specialist (Level 3) to provide advanced cybersecurity engineering support to … the NAS Security and Enterprise Operations (NASEO) Directorate. This position plays a key role in developing, integrating, and managing enterprise cybersecurity capabilities and toolsets that protect the National Airspace System (NAS) from sophisticated threats. The selected candidate will lead technical assessments of complex systems, evaluate proposed changes for potential cybersecurity impacts, and ensure that enterprise and system-level … architectures meet stringent federal and FAA security requirements. Responsibilities include overseeing the design, implementation, and sustainment of advanced cybersecurity tools for asset management and threat modeling, managing secure repositories, and integrating security processes and data flows across the organization. Additional duties include producing authoritative risk assessments, guiding the resolution of high-impact security issues, and preparing executive-level More ❯