monitoring, and continuous improvement of cybersecurity technologies and processes. Responsibilities include but are not limited to: Threat Detection & Response: Identify, assess, and report potential cyber-attacks, intrusions, and abnormal system behaviors. Participate actively in incident response and recovery activities. Technology Administration: Administer and maintain systems supporting Identity Management, Privileged User Access, Access Control (firewall), End Point Protection … Internet Protection, Vulnerability Scanning, and Security Information and Event Management (SIEM) tools. … Mitigation & Remediation: Develop and implement enterprise-level mitigation strategies to address complex vulnerabilities. Operational Support: Ensure proper installation, testing, patching, upgrading, and performance of cybersecurity tools and applications. Maintain system resiliency and availability across all managed technologies. Policy Enforcement & Compliance: Enforce cybersecurity policies, standards, and best practices in alignment with ManTech's security framework and regulatory requirements. Leadership & Collaboration More ❯
remediation and capabilities enhancement. Leverage multi-source Cyber Intelligence to bolster cybersecurity posture. Effectively lead and advise Security Operations and Infrastructure teams regarding threats and vulnerabilities mitigation procedures and system(s) enhancement(s). Meet/exceed/expand customer mission requirements, goals, and vision. Coordinate and communicate with multi-partner teams/services regarding 24/7 security … collected by network tools (e.g., Microsoft Defender, FireEye, Akamai and packet capture). Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), bandwidth/utilization management and directory services. Measure, analyze and tune network performance, confidentiality, integrity, and availability. Experience with network data structures and models (e.g., Open … System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ). Certifications/Licenses: Bachelor's degree or higher 7+ years' experience in network management and experience directly performing configurations and security implementation on LAN and WAN equipment. Certifications addressing system security, network infrastructure, access control, cryptography, assessments and audits, and organizational security. More ❯
coordination with EII subject matter experts (SMEs) to accuracy verification and validation of all application information in Department of the Navy Application and Database ManagementSystem (DADMS). Support N2N6 in organizing and executing routine FAM Lead and EII Working Group meetings/teleconferences to continue to enhance the lines of communication and to execute … FAM PfM at the enterprise, functional and EII levels. Support the Navy Information Technology Approval System (NAV-ITAS) process by assisting N2N6 in reviewing Information Technology Procurement Requests (ITPR) including and Server Hardware requests and all IT requests greater than $500K. Ensure the executive summary meets all applicable requirements for request submission, all data is … required to evaluate the fiscal, technical, capability gaps, redundancies, and business efficiencies by researching existing data and interfaces that would facilitate data sharing between Planning Budget InformationSystem - Information Technology (PBIS-IT), DADMS, DITPR-DON, and ITPR processes. Support N2N6 in managing the Enterprise Services (ES), Command and Control (C2), Weapons Planning and Control (WPC More ❯
and data pipelines to verify accuracy and functionality. Ensure compliance with organizational, NATO, industry, and regulatory standards for data storage, reporting, and access control. Collaborate with business analysts, developers, system administrators, and end users to capture requirements and translate them into technical specifications. Identify opportunities for automating repetitive data preparation, reporting, and integration tasks to improve efficiency and reduce … modelling, database administration, and BI development. 2+ years of experience performing these tasks in IBM-ELM and the IBM database environment (Db2), including the relational database managementsystem (RDBMS). Demonstrated expertise with Enterprise Data and Analytics and Publishing tools: IBM-ELM, IBM Rational Publishing Engine (RPE), Oracle, MS SQL Server, and BI tools such as Power … BI and Oracle BI. Bachelor's degree in Computer Science, InformationSystems, or a related field. Demonstrated experience with data integration, ETL processes, and system interoperability in enterprise environments such as Open Services for Lifecycle Collaboration (OSLC) (API development and management), and experience with Requirements Interchange Format (ReqIF) for information exchange across the More ❯
through the administration, monitoring, and continuous improvement of cybersecurity technologies and processes. Responsibilities include but are not limited to: This position serves as the Lead IT Security/Information Assurance Officer and must demonstrate possession of strong information technology security … skills, troubleshooting skills, and a strong understanding of the JSIG to include associated policies and regulations. Threat Detection & Response: Identify, assess, and report potential cyber-attacks, intrusions, and abnormal system behaviors. Participate actively in incident response and recovery activities; Mitigation & Remediation: Develop and implement enterprise-level mitigation strategies to address complex vulnerabilities. Technology Administration: Administer and maintain systems supporting … Scanning, and Security Information and Event Management (SIEM) tools. Operational Support: Ensure proper installation, testing, patching, upgrading, and performance of cybersecurity tools and applications. Maintain system resiliency and availability across all managed technologies. Policy Enforcement & Compliance: Enforce cybersecurity policies, standards, and best practices in alignment with ManTech's security framework and regulatory requirements. Leadership & Collaboration More ❯
deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments New and emerging information technology (IT) and cybersecurity technologies System life cycle management principles, including software security and usability Application vulnerabilities Cryptography and cryptographic key management concepts Penetration testing principles, tools, and techniques Industry technologies … and how differences affect exploitation/vulnerabilities Information technology (IT) supply chain security and risk management policies, requirements, and procedures Local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology IT ) for safety, performance, and reliability) Relevant laws, policies, procedures, or governance related to critical infrastructure … engineering process; applying and incorporating information technologies into proposed solutions; and using scientific rules and methods to solve problems Researching current technology to understand capabilities of required system or network Researching and evaluating available technologies and standards to meet customer requirements Identifying cyber capabilities strategies for custom hardware and software development based on mission requirements Collaborating with More ❯
ensure compliance with industry standards. The successful candidate will have relevant experience and a documented record of working in IV&V. They will demonstrate a strong understanding of Agile System Methodologies, preparing and reviewing workplan progress, and developing standard operating procedures for testing. Additionally, the candidate will possess knowledge of federal and state compliance requirements for child support enforcement … the quality of requirements for building test cases and scenarios. Execute acceptance tests for maintaining changes to all federal systems and document test results in detailed test reports. Maintain system test beds and develop additional test beds as new systems are developed, ensuring they are in sync with software releases. Conduct ad hoc testing, regression testing, and vulnerability testing … and systems operations staff to assess testing impact and provide required input to the release management process. Identify risks and coordinate across teams, represent IV&V at system workgroup meetings, and assess testing impact of system changes for Release Management. Coordinate vulnerability testing with the security team, collaborate with Program Support, Systems development, and Systems Operations More ❯
DirectViz Solutions, (DVS) is a rapidly growing government contractor that provides strategic services that meet mission IT needs for government customers. DVS provides innovative information technology solutions to government clients through the knowledge and expertise of our dedicated employees. DVS is an employee-centric employer that provides competitive compensation, comprehensive medical plans, 401k match, PTO accrual, professional development … Lead Incident Responder to manage and maintain critical security documentation and ensure compliance with government standards for various systems. The ideal candidate will have extensive experience in risk management, incident response, and vulnerability assessment within a government contract setting. This role involves creating, updating, and overseeing security documentation, policies, and processes for about 63 systems, conducting annual Security … Department of Labor's Computer Security Incident Response Capability (CSIRC). Key Responsibilities: Security Documentation Management: Develop, maintain, and update critical security documentation, including privacy assessments and system security plans, ensuring full compliance with government standards. Security Policy Oversight: Manage security policies and procedures, conduct risk assessments, and ensure training compliance for all InformationSystemMore ❯
across business units (e.g., sales, finance, security, compliance) to develop analyses and documentation, ensuring effective and efficient communication with production, managerial, and executive teams. Continuously evaluate, analyze, and communicate system requirements, maintaining processes and providing monthly status reports to all relevant parties. Write and update both internal and external documentation, formally initiating and delivering requirements and documentation. Conduct daily … system analysis to optimize effectiveness and resolve issues. Foster strong, long-term relationships with partners to enhance systems integration, addressing questions and concerns from managers and executives with well-researched insights and recommendations. Promote awareness of requirements across business units and identify inefficiencies in system processes by analyzing real-time data. Act as a thought leader for technical … business processes, designing system prototypes that enhance efficiency and productivity across multiple levels. Develop and execute detailed management plans for each project, ensuring clear communication at all levels. Conduct thorough quality assurance at every stage of system development, evaluating and communicating results. Identify and define user requirements for systems in production to ensure optimal usability. Required More ❯
integration. Assist the Government team with annual budget loads, Continuing Resolution (CR) adjustments, and special budget requirements. Troubleshoot, resolve, and mitigate reported technical issues. Design and maintain the overall system architecture, including back-end database structures. Develop and optimize application functions and procedures. Build dynamic, data-driven web applications using Oracle APEX. Conduct development-level testing and support system demonstrations and training activities. Administer the production database, monitor system errors, and address bug reports. Design and develop prototype applications to demonstrate new features and enhanced functionality. Collaborate with subject matter experts (SMEs) to enhance system capabilities and develop policies and procedures that improve financial management for the client. Requirements: Qualifications/Requirements Must be … development methodology. Demonstrated understanding of application development, testing, and troubleshooting. Experience designing and implementing data-driven web applications. Experience conducting development-level testing, debugging, and validation. Ability to support system demonstrations, user training, and documentation. Strong problem-solving skills with the ability to troubleshoot and resolve issues efficiently. Ability to work with client SMEs, stakeholders, and technical teams to More ❯
analyze, and document both functional and technical requirements, ensuring new enterprise systems meet core mission and user needs. You will translate complex legacy documentation, perform gap analysis, and validate system solutions to deliver the next generation of DoD technology. Key Responsibilities: • Elicit and document requirements via interviews, document analysis, site visits, use cases, and workflow analysis • Analyze, interpret, and … translate customer business needs, including reading and understanding dense legacy system documentation (e.g., COBOL) • Decompose high-level information into actionable detail, develop user stories and process flows using BPMN standards • Communicate and collaborate with internal/external teams to ensure Agile requirements are implemented, and technical information is clear to all audiences • Support validation and … and requirements efforts Qualifications: • BA/BS/MS in a relevant field (e.g., engineering, computer science, business) • Minimum 3 years' experience as a requirements analyst for software/system implementations • Analytical, project management, and collaborative skills; experience supporting Agile or Scrum teams • Highly skilled in stakeholder communication, documentation, and translating technical concepts • Familiarity with BPMN, Agile More ❯
Position Title: InformationSystems Security Officer (Junior to Mid-Level) Job Category: Corporate Security Work Location: Fairfax, VA Minimum Clearance: TS SCI w/CI Poly Zeta Associates, Inc. (a Lockheed Martin Company) is looking for a highly motivated individual to serve as an InformationSystems Security Officer (ISSO) in our Fairfax location. The individual will … from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). Develops documentation in support of Risk Management Framework (RMF) processes; operating procedures, and policies; Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Operating within cleared environments performing Information Assurance … coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits; Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed; Perform Media management activities, handle and have familiarity with controlling, labeling, virus scanning solutions-software and More ❯
Street Norfolk, Virginia 23511 Clearance Level: Active DoD - Secret Required Certification(s): DoD IAM Level II Certification. Certified Authorization Professional (CAP), CompTIA Advanced Security Practitioner (CASP+) CE, Certified Information Security Manager (CISM), Certified InformationSystems Security Professional (CISSP) or Associate, GIAC Security Leadership Certification (GSLC) or Higher-level certification. SUMMARY Provide the Military Sealift Command (MSC … is being collected, processed, transmitted, stored, or disseminated. JOB DUTIES AND RESPONSIBILITIES The ISSO Team Lead support includes: Managing the security of all IT through the complete system development life cycle, that is acquired, developed, or used. Managing the security of all informationsystems in a cost-effective manner, guided by the application of sound … risk management processes that ensure a level of confidentiality, integrity, and availability of information in each phase of the system development life cycle. Conducting periodic assessments and reviews to verify compliance with applicable DoD, DoN and MSC policies that process, store, or transmit MSC Business Systems data. Investigating information security incidents through incident More ❯
enterprise data systems and reporting solutions to support strategic decision-making, operational efficiency, and compliance with organizational and regulatory standards. This role combines deep technical expertise in data modeling, system interoperability, and business intelligence with strong analytical, communication, and stakeholder engagement skills JOB RESPONSIBILITIES: Data Modeling and Repository Architecture: Design, implement, and maintain logical and physical data models, database … and functionality. Data Governance and Compliance: Ensure compliance with organizational, NATO, industry, and regulatory standards for data storage, reporting, and access control. Stakeholder Engagement: Collaborate with business analysts, developers, system administrators, and end users to capture requirements and translate them into technical specifications. Process Automation: Identify opportunities for automating repetitive data preparation, reporting, and integration tasks to improve efficiency … and reduce manual effort. Cross-System Reporting: Integrate data across multiple systems to deliver unified, cross-domain analytics and reporting solutions. User Training: Deliver training sessions, documentation, and user guides to ensure effective adoption and utilization of BI tools, database systems, and reporting solutions. Technical Support: Provide ongoing technical support and troubleshooting for data systems, BI tools, and associated More ❯
Navy, Norfolk, Virginia. Experience Requirements: Must have experience in a Quality Assurance role. Ten (10) or more years of experience in a managerial role in work involving Quality Management and Quality Audits. Must have some managing experience. Must have requirements analysis and software programming experience. Must establish and maintain a process for evaluating software and associated documentation. Must … Digital Program Office (DPO) SDLC tools like Service Now, Azure Dev Ops, Mendix, UIPath, Katalon and Database Programming - schema design, architecture, performance tuning, SQL scripting, database consolidation, database migration, system backups and database admin. Application Test and Evaluation, particularly unit testing and integration testing. Asset Management: government documents, hardware, software (to include license agreements) Modification/maintenance … integration of an interfaced enterprise solution of GOTS software products Information Assurance - DoD/DoN IA requirements and industry best practices. IT Infrastructure Support - hosted environment operations. System Administration - sys admin, help desk support, trouble ticket resolution. Scaled Agile Framework (SAFe) certifications Project Management Professional (PMP) certification Educational Requirements: Master's Degree preferred in an More ❯
This position is contingent on contract award Description: Responsible for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide … level corporate officers to assist in defining and achieving required risk management objectives for the organization Qualifications: Eight (8) years of experience as an IT Risk Assessor, System Security Engineer, InformationSystems Security Manager or DAO in programs and contracts of similar scope, type and complexity is required. A Bachelor's Degree in Computer Science … Engineering. In lieu of a Bachelor's degree, an additional four (4) years of experience for a total of twelve (12) years. Working knowledge of the following is required: system security design process, defense-indepth/breadth, engineering life cycle, information domains, cross-domain solutions, controlled interfaces, identification, authentication and authorization, system integration, ICD 503 (formerly More ❯
One of our premier clients is is looking for a highly motivated individual to serve as an InformationSystems Security Officer (ISSO) for a Full-Time role in their Fairfax, VA. headquarters. The individual will be responsible for assisting the ISSM/ISSO within Zeta's facilities to ensure compliance with Intelligence Community (IC) and Department of Defense … from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). • Develops documentation in support of Risk Management Framework (RMF) processes; operating procedures, and policies; • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities • Operating within cleared environments performing Information Assurance … coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits; • Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed; • Perform Media management activities, handle and have familiarity with controlling, labeling, virus scanning solutions-software and More ❯
PACS) Install, configure, and maintain PACS hardware, controllers, readers, and associated devices. Deploy PACS software platforms and integrate with enterprise systems (e.g., identity managementsystems). Conduct system testing, troubleshooting, and validation of access control deployments. On-Premises Infrastructure Design, build, and manage virtualized server environments (VMware, Hyper-V, or equivalent). Configure networking, storage, and compute … resources for lab and test environments. Maintain system documentation, including as-built configurations and architecture diagrams. Cloud Environments Deploy, configure, and administer test and development workloads in Microsoft Azure and Amazon Web Services (AWS). Implement cloud-native tools for automation, monitoring, and scaling. Support hybrid integration between on-prem and cloud-based systems. General Lab Support Maintain a … vSphere, Hyper-V, or similar). Cloud platforms: Microsoft Azure and AWS (certifications preferred). Strong understanding of networking fundamentals (TCP/IP, VLANs, firewalls, VPNs). Experience with system integration, troubleshooting, and technical documentation. Preferred: Experience working with PACS vendors (e.g., Lenel, CCURE 9000, Identiv, HID). Familiarity with enterprise identity and access management (IAM/ More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
provides functional and strategic support for Watermark Faculty Success and associated systems and processes. This position plays a critical role in supporting faculty data management, reporting, and system administration for Academic Affairs. Reporting to the Associate Provost of Analytics and Assessment, the Analyst works collaboratively with University Information Technology, Academic Human Resources, the Office of … of Watermark Faculty Success and associated faculty activity systems to support institutional needs, data integrity, and reporting capabilities. Gathers, analyzes, and documents business requirements, current and future workflows, and system specifications. Partners with stakeholders to recommend and implement process improvements. Coordinates and executes testing of new features, data elements, and system upgrades to ensure alignment with UMass Amherst … quality assurance, and documentation of outcomes. Collaborates with technical leads and developers to design and maintain scalable, supportable technical solutions aligned with university IT standards. Develops and maintains comprehensive system documentation, including setup specifications, interface definitions, business logic, and training materials to ensure continuity and effective onboarding. Serves as the primary support contact for users of Watermark Faculty Success More ❯
experience with ITIL framework and ITIL-based processes, to include continual service improvement, change management, and problem investigation. Have previous work experience as a Windows/Linux System Administrator supporting a large Enterprise with knowledge of Microsoft Active Directory, Windows 2008/2012, Linux/UNIX Operating Systems, EMC Storage, Symantec NetBackup and SCCM Patch Management … cryptographic devices. Have experience with Cyber-defense or information assurance, including experience with DISA mandated security tools to include Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), analyze results and create reports Have Network Operations experience in a network operations center or other 24x7x365 IT Operations environment. Have knowledge of IT Network Operations and connectivity … devices that inter-relate with Public Key Infrastructure authentication and Information Security practices. Have knowledge of Cybersecurity principles and how to execute system/network security analysis. Have a working knowledge of Tier III Information Assurance practices, IT security governance, security administration, project management, logistics, and Cybersecurity compliance requirements. This position is expected More ❯
This position is contingent on contract award Description: Identify overall security requirements for the protection of data to ensure the implementation of appropriate information security controls. Provide analysis of customer mission needs to determine functional testing requirements. Work with security control assessors on systems … testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for InformationSystems or programs to ensure InformationSystem Security policies, standards, and procedures are followed. Enable System Security Planning and collaborate with engineers on system integration. Perform functional analysis to identify critical Cybersecurity tasks required … and their interrelationships. Analyze customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of System Security Plans (SSPs) in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation that affect Cybersecurity requirements Collaborate with Security Control Assessors to identify and execute systemMore ❯
leveraging the latest technologies to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in multiple disciplines including program management, system integration, system design, system development, cybersecurity, infrastructure, and data analytics. LTS is committed to offering eligible employee's comprehensive benefits that will provide them with options intended … artifacts and services are delivered as they were designed. • Provides and delivers ad-hoc presentations and briefings, including development of agendas and capturing minutes for these events. • Provide monthly system performance metrics, such as: o Remedy tickets aging report with the following status: resolved, pending, and open. o Response time (best, worst, average) o Peak concurrent number of end … users o Total number of end-user population at the end of the month o System availability (uptime hours, scheduled outage, unscheduled outage, and percent availability) Required Skills & Qualifications: • Eight (8) or more years of relevant experience in an Enterprise IT environment. • Certified Scrum Master (CSM) or Professional Scrum Master I (PSM I) certification with 3+ years of experience More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Columbia Technology Partners
requirements and documents test results. Resolves software problem reports. Utilizes software development and software design methodologies appropriate to the development environment. Provides specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development, and … requirements analysis and synthesis from system level to individual software components. Analyze user requirements to derive software design and performance requirements Debug existing software and correct defects Provide recommendations for improving documentation and software development process standards Design and code new software or modify existing software to add new features Integrate existing software into new or modified systems or … operating environments Develop simple data queries for existing or proposed databases or data repositories Write or review software and system documentation Serve as team lead at the level appropriate to the software development process being used on any particular project Design or implement complex database or data repository interfaces/queries Develop or implement algorithms to meet or exceed More ❯
systems Digital architecture (physical storage vs cloud, the role of operating systems and servers) Maintaining end-user systems (software, hardware and operating systems) Information security principles System security Account management (optional) Managing & analysing data Digital marketing This apprenticeship offers blended learning, combining online training with practical workplace experience, setting you up for a successful … the following knowledge and skills. Non-technical skills • Critical thinking • Effective communication • Customer service • Problem solving • Managing risk and decision making • Coaching and guiding Technical skills • Operate digital information … systems • Digital architecture (physical storage vs cloud, the role of operating systems and servers). • Maintaining end-user systems (software, hardware and operating systems) • Information security principles • System security • Account management (optional) • Managing & analysing data • Digital marketing The right candidate has the opportunity to be taken on permanently and cross train in other departments. Apprenticeship More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Koniag Government Services
Koniag Professional Services is seeking an experienced Data Architect/Data Analyst to support our client, the Department of Health and Human Services (DHHS), Office of the Chief Information Officer (OCIO) in developing a secure, scalable, and integrated Human Capital Management solution built on PeopleSoft or other identified technologies that consolidates core HR functions into a … Employee/Manager/HR Self-Service, and Enterprise Business Intelligence capability. The solution will be compliant with federal cybersecurity, records management, and accessibility standards, to improve system performance, user satisfaction, and long-term sustainability of HR services. This role is critical for maintaining, enhancing, and optimizing HCM applications that support essential administrative and operational functions across … solutions to support business intelligence and operational insights. Create and maintain technical documentation for all configurations, customizations, and integrations. Collaborate with functional analysts, DBAs, and infrastructure teams to optimize system performance and reliability. Support upgrades, patches, and maintenance activities with minimal operational disruption. Apply federal compliance best practices, including security (NIST), accessibility (Section 508), and records management. Provide mentorship More ❯