application packages in AdminStudio. Ensure compatibility of applications with endpoint systems and manage packaging processes to streamline deployment. Develop, test, and maintain scripts (e.g., PowerShell, Batch, VBScript) to automate systemmanagement tasks such as software deployments, configuration changes, and system updates. Use scripting to improve efficiency in managing endpoint devices, reduce manual intervention, and ensure consistency … Familiarity with Active Directory, Group Policy, and other endpoint management technologies. Expertise in Microsoft Endpoint Configuration Manager (MECM) for software deployment, patch management, and operating system deployment. Proficient in scripting languages such as PowerShell, Batch, or VBScript for task automation and configuration management. Knowledge of AdminStudio for application packaging, deployment, and testing. Experience with endpoint … with SQL queries for reporting and troubleshooting in MECM. Knowledge of Windows Server and Windows OS configurations and management. Strong troubleshooting skills for resolving deployment failures, configuration issues, and system performance problems. Ability to think critically and identify solutions that improve processes and enhance operational efficiency. Strong leadership and mentoring skills to guide junior engineers and cross-functional teams. More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. Responsibilities We … service providers. Cloud engineering support must include the development and delivery of Customer's cloud adoption and migration, provide the technical guidance and direction to design the modular operating system baselines to support the modular data and application Tier hosting strategy. Shall provide technical guidance and direction to engineering a modular security design to protect the workloads hosting services … integrating open-source frameworks/products, experience deploying various open-source packages and/or application stacks into the Customer's production landscape, multi-core, multi-threaded, and distributed system Develop and apply requirements and specifications documentation What we offer: A collaborative team inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. Responsibilities We … service providers. Cloud engineering support must include the development and delivery of Customer's cloud adoption and migration, provide the technical guidance and direction to design the modular operating system baselines to support the modular data and application Tier hosting strategy. Shall provide technical guidance and direction to engineering a modular security design to protect the workloads hosting services … integrating open-source frameworks/products, experience deploying various open-source packages and/or application stacks into the Customer's production landscape, multi-core, multi-threaded, and distributed system Develop and apply requirements and specifications documentation What we offer: A collaborative team inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world More ❯
Together, we ensure efficiency, security, and convenience for our partners and customers. Website: www.liquidgroup.sg The role: Head of Infrastructure The Head Infrastructure will lead the design, implementation, and management of the company’s infrastructure strategies, with a strong focus on AWS-based solutions and high-volume transaction systems . This role requires a deep understanding of the intersection … lifecycle , from technical architecture and infrastructure engineering to operations and support. Manage and optimize database infrastructure , ensuring performance, availability, and security. Implement monitoring tools and best practices to track system health, transactions, and performance trends. Lead incident response efforts to quickly address infrastructure and security incidents. DevOps & Security Integration: Work closely with software development teams to integrate infrastructure, DevOps … IT business processes within the company and with partners/clients. Manage relationships with infrastructure and cybersecurity vendors , ensuring optimal solutions and services. Ensure cost optimization while maintaining high system performance and security. Leadership & Strategy: Mentor and lead a team of infrastructure professionals, fostering a culture of continuous improvement and innovation . Track infrastructure issues and performance metrics to More ❯
software solutions in a dynamic environment. Key Responsibilities • Lead Lean Agile development teams, including sprint planning and prioritization of MVIs, Features, and user stories. • Translate stakeholder requirements into technical system requirements. • Manage delivery timelines, ensuring commitments are met within schedule and budget constraints. • Monitor the progress of multiple, concurrent software development projects. • Identify and mitigate technical and programmatic risks … insight via sprint burn-up charts, top line metrics, and milestone tracking. • Recommend corrective actions as needed based on project health and performance indicators. • Facilitate collaboration across teams for system integration, security support, and operations. Mandatory Skills & Experience • Proven experience leading Lean Agile development teams in complex software environments. • Deep understanding of Agile lifecycle planning, sprint forecasting, and backlog … grooming. • Experience managing system delivery from requirements definition to deployment. • Strong knowledge of Jira for Agile project tracking (portfolios, products, and sprints). • Experience tailoring technical information for multiple audiences in briefings and written reports. • Ability to assess project status and implement corrective action plans when necessary. • Familiarity with risk management frameworks and mitigation strategies. More ❯
and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing … testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for InformationSystems or programs to ensure InformationSystem Security policies, standards, and procedures are followed. Enable System Security Planning and collaborate with engineers on system integration. The Level 2 Functional Analyst shall possess the following … customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of SSPs in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation that affect Cybersecurity requirements Collaborate with Security Control Assessors to identify and execute system testing requirements Qualifications: 2 years of related work More ❯
Security Control Assessor Senior Bethesda, MD Job Description Requirements: • Bachelor's degree in computer engineering, Computer Science, Electrical Engineering, Informationsystems, Information Technology, Cybersecurity, or a closely related discipline. Four years of additional demonstrated work experience in Security Control Assessor (SCA) and Defensive Cyber Operations (DCO)Testing will be accepted in lieu of a bachelor's … e.g., Cloud Environments) ASW, Google, IBM, Azure, and Oracle. Other Requirements: • Make recommendations to the IC CISO or designee for improving TTPS for better cyber threat protection. • Knowledge of system and application security threats and vulnerabilities. • Knowledge of network access, identity, and access management e.g. public key infrastructure (PKI). • Knowledge of network protocols such as Transition … Control Protocol/Internet Protocol (TCP/IP), Dynamic Host Configuration, Domain Name System (DNS), and directory Services. • Ability to assess the robustness of security systems and designs. • Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). • Three years of experience performing security assessments in a cloud computing environment. • Strong writing skills. More ❯
deliver the world’s most impactful projects and programmes as we turn challenge into opportunity and complexity into success. Our capabilities include programme, project, cost, asset and commercial management, controls and performance, procurement and supply chain, net zero and digital solutions. We are majority-owned by CBRE Group, Inc., the world’s largest commercial real estate services and … across multi-disciplinary client-facing teams. The Role As part of the role, you will have: SharePoint Architect: SharePoint, Power Apps, Power Automate, 365: Have a proven background in system architecture, with extensive experience in designing, implementing, and maintaining complex systems environments, including Microsoft 365. Solution Development: Design, develop, and deliver solutions in collaboration with clients and other business … to translate complex technical subject matter into easily understood presentations and written documentation for mixed technical audiences. Consulting skills, ability to manage relationships, and provide technical guidance. Integration testing, system testing and user acceptance testing Experience in collaborating in multi-disciplinary teams Desirable skills include: Experience in Agile delivery methodology and strong project management skills An understanding More ❯
Tasks & Responsibilities • Develop requirements for systems based on local Systems Engineering Processes, DoD and NAVSEA guidance, and commercial specifications as applicable. • Perform Analysis of Alternatives (AoA) for various informationsystems options. • Provide software engineering services that include … development and maintenance in support of software technical documentation and requirements. • Provide remote and on-site troubleshooting and root cause analysis support. • Address issues and implement solutions in the System Problem/Improvement Report (SPIR) database. • Support architecture, design, development, utilization, authorization, maintenance of, and migration to/operation on Department of Navy authorized cloud system providers where … to leverage authorized cloud technology offerings. • Recommend solutions to gaps between existing capabilities and departmental requirements. • Establish POA&M addressing short-, mid- and long-term solutions. • Develop Change Management, provisioning, and management processes and associated documentation. • Identify success criteria regarding cloud deployments. • Align cloud deployments to DoD/DON IT security and infrastructure requirements. • Serve as More ❯
tools, etc ) as well as microservices. Establish standards and guardrails for internal and external use. Provide architectural guidance to support Agile/DevSecOps software development solutions, modern architectures, system integrations, and cloud migration projects. Develop and integrate IT solutions architecture artifacts in coordination with IPOs and programs within the agency. Develop and assist IPOs and programs within the … data visualization through the use of COTS/GOTS provided applications for response to oversight RFIs. Document and translate technical/IT requirements and digital engineering modernization/digital system engineering thread into plain English for briefing to decision makers. Assist the Government in integrating IT architecture products across the agency Develop high level business views and requirements that … span the entire agency. Skills and Experience: Required: Bachelor's degree or higher in Computer Science, Computer Systems Engineering, Engineering, Engineering Management, Information Technology, Mathematics, System Engineering, or a related STEM Degree Program, or equivalent Expert level experience as a Software Architect. Skillset with balanced experience in Business, Data, Application and Technology architecture domains. Experience More ❯
critical infrastructure including highways, bridges, roads, and airports. The cybersecurity team is dedicated to collaborating, cooperating, and facilitating the maintenance and enhancement of the security posture of government informationsystems and underlying infrastructure that support critical national operations. Job Description As a Lead Security Engineer, you will assist the government agency's cybersecurity mission by supporting the implementation … infrastructure. Your primary focus will be on IPv6 security implementation, working with federal leadership and counterparts to design, implement, and maintain secure network architectures. You'll collaborate with network, system, and application administrators to troubleshoot IPv6 security-related issues while supporting regular assessments to identify potential vulnerabilities and develop mitigation strategies. Duties and Responsibilities • Engage with Federal Leadership and … counterparts to support designing, implementing, and maintaining secure IPv6 network architectures, including firewalls and network segmentation. • Collaborate with network, system and application/software administrators/engineers to troubleshoot issues associated with IPv6 security related technologies. • Support regular assessments to identify potential vulnerabilities in IPv6 networks, services, and applications and develop strategies to mitigate these risks. • Support IPv6 related More ❯
performance of operational controls, implement and manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of … security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise. * Management … on the audience. Some other highly valued skills may include: * A solid technical understanding of threats against the financial industry across physical and cyber threat domains. * Proficiency in operating system fundamentals and security (Windows & Linux). * Expertise in networking principles, protocols, and practices. * Familiarity with traditional ITIL concepts, including incident, change, and problem management. * Understanding of cloud security principles More ❯
database technology. • Perform testing, analysis, and modification of existing database SQL stored procedures. • Evaluate, refine, and tune existing Oracle objects in support of application. Install, upgrade, patch, secure, diagnose system problems, user accessibility, and troubleshoot Oracle Database versions 12.2 through 19.26. • Digest onsite concepts, design, implementation, limitations, and configuration of complex database environments. • Ability to define, troubleshoot, document, and … and support data-oriented development efforts. • Work closely with support center to expeditiously resolve issues or problems as they arise. • Assist with analysis and documentation of user requirements. Implement system security patches & Security Technical Implementation Guides (STIGs). • Maintain electronic repository of all database baseline, changes, and documentation. • Perform directed tasks in a timely and efficient manner. • Research and … environment. • Experience working with programming languages such as SQL, PL/SQL, Shell Scripts, and Batch Scripts. • Proven troubleshooting and problem-solving skills for critical database, application, network, and system administration issues. • Ability to work efficiently under pressure and with a high degree of independence. • Critical thinking skills, ability to accurately analyze information and make sound decisions. More ❯
/create report dashboard designs, automated custom email report notifications, report log data repositories for each environment that are specific to the following audiences: Leadership & Executives; Cybersecurity Staff; and System Administrators Qualifications/Requirements: Splunk Administrator candidate should have a minimum of 3+ years of Splunk products experience. Splunk experience performing administration in a large-scale environment. Preferably overseeing … systems and incident tickets in support of operations. Be familiar with scripting tools such as Python, Bash, and SPL. Firm understanding of REGEX. Candidate should have experience in: o system Integration and/or administration for Splunk users, searches/reports, dashboards, systems, or onboarding 3rd party log data. o Windows OS, UNIX or Linux-based systems support with … bachelor's degree in computer science/informationsystems, Science/Engineering/Math, or 2-4 years' relevant experience in Information Technology preferably within system or application administration is acceptable. There are three required certifications for this position, of which two are required to start on the contract and one that must be earned More ❯
e.g., Common Vulnerabilities and Exposures (CVE), Computer Emergency Readiness Team (CERT), Information Assurance Vulnerability Alert (IAVM), etc.). Duties/Responsibilities: Draft and finalize DHS National Security System and Sensitive System Policy proposals and updates. Draft DHS NSS Assessment, Compliance, and Policy Support Standard Operating Procedures and Playbooks Draft DHS RMF Processes and Procedures Provide Analysis … include ERB (Engineering Review Board),C-ICCB (Classified Infrastructure Change Control Board), HSDN Safeguarding and Information Assurance (IA) Governance Board, CIACS (Classified Information Assurance Compliance System) status meetings. Participate in NSCD Site Compliance Fulfill/complete/meet/act in accordance with DHS NSCD guidance. Adhere to all CONOPS, DHS NSCD procedures and guidance … Analysis (I&A) requests for information. Maintain an up-to-date list of Department, Component, and relevant cyber-IA POCs in designated website. Utilize DHS NSCD-authorized compliance tracking system(s) tool to track approvals, compliance activities, and reporting. Compliance reports shall be in business language and effectively communicate the effect on the mission, what assets were evaluated, what More ❯
will collaborate proactively at a strategic level with IT leadership, Product teams, and end users to ensure Aker's Corporate IT is performing to the highest standards. Key Responsibilities System Administration & Platform Support Lead administration and configuration of Microsoft 365 (Exchange online, Outlook, SharePoint, Intune, Teams, OneDrive, Microsoft Dynamics) Take strategic ownership of user and group identity management … primary point of escalation for complex IT issues across endpoints, cloud services, and networks Troubleshoot and resolve OS, network, and storage-related problems across Windows and MacOS systems Manage system patching, updates, security and compliance configuration policy Independently conduct root cause analysis and continuous improvement of recurring technical issues Security, Maintenance & Compliance Independently lead the implementation and enforcement of … BYOD policies, VPN configurations, and endpoint protection Monitor system usage, audit logs, and quota settings; produce performance and compliance reports Independently manage IT controls and be accountable for compliance with ISO 27001, Cyber Essentials Plus, and NIST frameworks Training, Enablement & Documentation Independently deliver onboarding and continuous training, strategic enablement and mentoring of internal users, and technical documentation and internal More ❯
IT Project Manager Job Description Prism is Looking for an experienced Information Technology Project Manager to join our team, supporting a mission-critical enterprise client in the National Capital Region. This is an exciting opportunity to work with a dynamic team that engineers and implements significant upgrades and modernization efforts for essential IT systems and applications. This hybrid … maintains a robust roadmap of IT infrastructure projects and upgrades that are prioritized for execution. Major initiatives include Azure cloud migrations, RedHat (RHEL) and Windows Server and Desktop operating system upgrades, Oracle Database and Middleware upgrades, Zero Trust Architecture (ZTA) implementation, comprehensive data backup modernization, mobile device refresh programs, resiliency implementations, and more. These are examples of the high … risks, reporting progress against established plans, facilitating the collection of lessons learned, and delivering clear executive presentations. Qualifications EDUCATION & EXPERIENCE: Bachelor's degree with 6+ years of project management experience in a technical environment with a variety of IT systems. Master's degree with 5+ years of project management experience. Associate's degree with 9+ years More ❯
wafer fabrication facility, including tool interfaces, factory automation, Manufacturing Execution Systems, and Data Infrastructure Collaborating with Fab Operations, including Engineering and Production teams, to support production demand and optimize system uptime Ensuring the reliability, availability, and performance of IT systems critical to fab manufacturing processes (e.g., MES, SPC, APC, Factory Bus, SECS/GEM interfaces, Plant Maintenance) Managing and … coordinating factory IT projects, including upgrades, migrations, new tool integration, and system improvements Developing and implementing IT standards, procedures, and documentation to support fab operations and industry compliance (e.g., ISO, VDA, or SEMI standards) Driving digital innovation and automation initiatives, including the use of Artificial Intelligence and Machine Learning for Predictive Maintenance, Yield Optimization, and Smart Factory Solutions, including … and Factory IT support staff or contractors on-site, including a dedicated Factory Systems Support team (CIM), Operational Technology Engineers, Data Engineers, and Web Developer Monitoring and reporting on system performance, availability, and incident response metrics Providing leadership in incident management and root cause analysis for system-related issues, while also ensuring effective change control procedures More ❯
competitive advantage. Governance and Oversight: Establish governance frameworks for ERP usage, ensuring standardization, compliance, and risk management. Oversee budgets, contracts, and relationships with ERP vendors and implementation partners. Monitor system performance, scalability, and security, ensuring business continuity. Accountable for BAU/Change management Lead enterprise-wide ERP projects, including new implementations, system upgrades, and cross-functional … integrations. Direct cross-departmental collaboration to identify and resolve system challenges and enhance functionality. Support in the creation of business cases to validate RoI's on ERP Projects. Ensure appropriate resources are available to support the delivery of ERP projects into Uniphar Stakeholder Engagement: Act as the primary point of contact between business leaders and IT teams to translate … Proficiency in business intelligence and analytics tools (e.g., Tableau, Power BI). Knowledge of regulatory frameworks such as GxP, GDPR, SOX, or other compliance standards. Expertise in enterprise architecture, system integration, and process optimization. Deep understanding of financial management, supply chain, and other core ERP-supported business processes. Proficiency in business intelligence and analytics tools (e.g., Tableau More ❯
and COTS developers, and consumers and owners of the mission data. Conduct and analyze site surveys and prepare site preparation requirements and installation plans. Build, configure and test each system and hardware suite prior to shipment and implementation. Create and update documentation to include post installation documentation packages, installations guides, configuration guides, user guides test plans and procedures, technical … a Windows specialist you will focus on mission capabilities and Windows based COTS applications and servers. The Level 2 ITE Windows shall possess the following capabilities: Develops and reviews system architecture, including relevant use cases. Manages and tunes technology to ensure expected availability and performance levels are achieved. Leads major portions of large or medium complex IT projects, and … leads small projects autonomously. Develops models for future architectural enhancements to system hardware and software. Develops and conducts training programs. Assist and advises in the development or modification of complex hardware and software solutions to enhance a commodity or specialized IT infrastructure or environment. Interfaces with multiple levels of the organization and aspects of a team to resolve systemMore ❯
Global Solutions Management - Operations II (GSM-O II) contract at DISA. This contract includes the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense InformationSystem Network (DISN) within the DOD Information Network (DODIN) in support of the Defense InformationSystems Agency (DISA). It also includes support to other key … receiving mentoring from senior developers. Preferred Qualifications ServiceNow Certified Application Developer Experience or familiarity with Agile development and testing methodology Exposure to ServiceNow applications like Telecommunication ManagementSystem (TSM), Telecommunications Network Inventory (TNI), Order Management Telecommunications (OMT) modules, etc. Experience with JIRA, Git and Confluence. Understanding of ITIL foundation or ITIL certified. AWS cloud and … ServiceNow certifications. Bachelor's degree in a technical field such as System Engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management, or related discipline Experience working with large software systems including hardware integration and test. Experience working with multi-disciplinary technical development teams. Experience using SAFe as the agile development methodology. Experience moving from a More ❯
of various enabling technologies. The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk … assessor's judgement. The Contractor shall apply consistent and systematic investigative practices to comprehensively assess risks, identify and characterize threats and vulnerabilities. The Contractor shall evaluate system or network operations using network management platforms, network scanning tools, auditing functions, PCAP captures, and log reviews. The Contractor shall analyze system, network, or cloud configurations for mis-configured … settings, configurations not required for deployment, removal of test scripts to minimize the configuration to fulfill the specific deployment. The Contractor shall analyze hardware and software used in a system or network for origin of manufacturer, known vulnerabilities, outdated hardware or software. The Contractor shall remain current with existing and future technologies to assist the Sponsor with identifying associated More ❯
modernize core business processes and unlock greater efficiency, visibility, and responsiveness across departments. As a key member of the IT team, you will collaborate with end users, software and system engineers, and system vendors to ensure applications are reliable, secure, and aligned with evolving business needs. You will be empowered to identify areas for improvement, apply innovative workflow … daily application support for enterprise and departmental software systems, responding to incidents and user requests in a timely manner. Maintain application health and ensure operational continuity by performing regular system checks, patching, upgrades, and configuration updates. Maintain and curate the software and license inventory database, ensuring accurate records, renewal tracking, and license compliance. Serve as an escalation point for … as needed. Assist with planning and execution of application lifecycle activities, including software upgrades, licensing, end-of-life transitions, and documentation. Collaborate with software engineers to implement data and system integrations using standardized APIs, scripts, or middleware. Identify opportunities for automation or process improvement, and implement changes using workflow tools such as Microsoft Power Automate, SharePoint, or equivalent. Coordinate More ❯
IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Primary Responsibilities: Develop secure privileged access management solutions and architectures for clients. Evaluate designs and infrastructure against information assurance/security standards and procedures. Support Authorizing Official (AO) actions by developing and delivering PAM … Privileged Access Management) solutions that include supporting documents and artifacts in accordance with RMF as defined in NIST 800-37 revision 2 and related agency specific RMF requirements Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation and authorization against AU (Audit and Accountability) family controls per NIST SP … Access Control family of controls to include auditing annually, at a minimum Develop integrated solutions, processes, and procedures for evaluating, monitoring, remediating, and/or documenting informationsystem security vulnerabilities IAW DoD Instruction (DoDI) 8510.01 (RMF for DoD IT) Support integration and implementation of Asset Management, Identity, Access Control Systems/Solutions, Compliance Monitoring and More ❯
Enterprise Technology Services Reporting to Director of Technology - Group and Client Services The Solutions Architect proactively and holistically leads and supports EA activities that guide the development and management of a portfolio of solutions. Solutions include projects, systems (including applications, technologies, processes, and information), shared infrastructure services and shared application services. They understand the concepts of … needs and align with architectural governance and standards. They create deliverables for managing the organization's portfolio of "to be" and "as is" solutions - including systems (applications, processes, information and technology), shared infrastructure services, and shared application services and components to enable and drive targeted business outcomes. This role will involve designing solutions in the fund administration industry … solution patterns to ensure solution decisions are aligned with the enterprise's future-state architecture vision Skills & Experience: Bachelor's degree in computer science, information-technology, engineering, system analysis or a related study, or equivalent experience Minimum of five years of experience in at least two IT solution development disciplines, including technical or infrastructure architecture, network managementMore ❯