Management Information System Job Vacancies

926 to 950 of 4,940 Management Information System Jobs

Security Classification Assessor Test Engineer I - Red Team with Security Clearance

Chantilly, Virginia, United States
LV8D Solutions
Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … 3+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • ICD 503 and the Government's certification and accreditation process • Networks, computer components, system protocols, and COTs technology • System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers • Software integration of … Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration managementSystem maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Technical Writer with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
UICGS and Bowhead Family of Companies
undergoing cloud migration, responsible for creating, maintaining, and managing comprehensive technical documentation that meets stringent government standards. Responsibilities Lead the development and maintenance of comprehensive technical documentation suites including system specifications, user manuals, installation guides, and operational procedures Manage and coordinate documentation projects across multiple concurrent cloud migration initiatives Establish and enforce documentation standards, style guides, and quality assurance … processes Conduct complex technical interviews with subject matter experts, engineers, and system administrators to gather detailed information Create and maintain documentation templates, standards, and best practices for the organization Review and edit technical documents produced by junior staff, ensuring accuracy, clarity, and compliance Collaborate with cross-functional teams including developers, system architects, and project managers to … version control, and configuration management Advanced proficiency in technical writing tools including Microsoft Office Suite, Adobe Creative Suite, and documentation platforms Strong understanding of software development lifecycle, system architecture, and cloud computing concepts Proven leadership experience managing technical writing teams and complex documentation projects Excellent project management skills with ability to handle multiple concurrent deliverables More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Classification Assessor Test Engineer (SCATE) Level 2 with Security Clearance

Chantilly, Virginia, United States
LV8D Solutions
Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 3+ years of relevant experience Clearance: TS/SCI with CI Polygraph Requirements/Responsibilities: ICD 503 and the Government's certification and accreditation process Networks, computer components, system protocols, and COTs technology System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers Software integration … Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Classification Assessor Test Engineer (SCATE) Level 3 with Security Clearance

Chantilly, Virginia, United States
LV8D Solutions
Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 5+ years of relevant experience Clearance: TS/SCI with CI Polygraph Requirements/Responsibilities: ICD 503 and the Government's certification and accreditation process Networks, computer components, system protocols, and COTs technology System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers Software integration … Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer 6 with Security Clearance

Chantilly, Virginia, United States
M.C. Dean
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities Information System Security Engineer Position Summary In this position you will work on developmental and operational teams responsible for system security engineering services of developmental and operational systems for our … Technology (IT) and Operational Technology (OT) systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer (ts/sci W/ci Poly)-chantilly, Va with Security Clearance

Centreville, Virginia, United States
iSenpai, LLC
SCI w/CI Poly Description: We are seeking an experienced Cyber Security Engineer to conduct systems security analysis and implementation, Risk Management Framework (RMF) and accreditation, system engineering, system design and assurance, testing, software engineering, program design, configuration management, integration, and testing of cybersecurity products and techniques. This role provides technical knowledge and … or risk management Active TS/SCI security clearance with CI Poly Active technical certification compliant with DoD 8140 (e.g., CYSA+) Experience with Automated Information System (AIS) security with multiple IC SCI Control Systems, DoD Special Access Program (SAP)/Special Access Required (SAR) activities, and SCI Special Handling Experience in scripting languages, Linux/… Systems Manager (CISM) certification Understanding of NIST controls and logging tools Experience with DISA Security Technical Implementation Guide (STIG) application Possess a working knowledge of administrating servers, system and application security threats and vulnerabilities Experience with cyber security tools in areas such as cyber security, monitoring, automation, development, and deployment Experience with vulnerability scanning and malware remediation. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SCA Level IV/SME with Security Clearance

Chantilly, Virginia, United States
Arcfield
performing comprehensive INFOSEC assessment of management, operational, and technical security controls to determine overall effectiveness of the controls for A&A determination throughout our customer's program system lifecycle. SCAs provide an assessment of the severity of weakness or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. … and assess information systems (IS) for compliance with IC, DoD, and ND guidelines Provide security advice and guidance to government and industry partners Advise Information System Owners (ISO) on confidentiality, integrity, and availability impact values Offer technical guidance for Authorization and Accreditation (A&A) responses Evaluate IS threats and vulnerabilities, recommending additional safeguards as needed … and assessments, prepare written reports for government approval Ensure completion of security control assessments for each IS Support RMF process-related presentations, briefings, and reports Utilize customer's RMF system of record for workflow duties and documentation Track and report on RMF process workflow activities and metrics Prepare Security Assessment Reports (SARs) and Authorization Recommendations Collaborate on Plans of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor Level 2 with Security Clearance

Chantilly, Virginia, United States
System High Corporation
security Assessment and Authorization (A&A) support throughout a customer's programs lifecycle to Contractor and Government facilities processing customers information. SCAs enhance the Information System (IS) security awareness of Directorates' & Offices' staffs, ensure that proper IS security resources are appropriately applied, and act as an IS liaison between the Directorates & Offices and OS&CI. … information about Government and industry IS status and representative contact information. Prepare, review, and record notification and status messages to indicate A&A state of systems to system owner or programs in a format approved by the Government. The contractor shall ensure that appropriate IS security requirements including applicable DCID, ICD, and customer directives and guidance are … addressed and applied, and that appropriate documentation is prepared by the system owners or programs. The documentation will be contained in the Security Assessment Package, including, but not limited to the Concept of Operations (CONOPS) Plan, System Security Plans, System Requirements Traceability Matrix, Risk Management Matrix, Test Results, interface control documents, requests for changes, test More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor (SCA) Professional- Level III with Security Clearance

Chantilly, Virginia, United States
Arcfield
performing comprehensive INFOSEC assessment of management, operational, and technical security controls to determine overall effectiveness of the controls for A&A determination throughout a customer program's system lifecycle. SCAs provide an assessment of the severity of weakness or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. … assess information systems (IS) for compliance with IC, DoD, and ND guidelines Provide IS security advice and guidance to government and industry partners Advise Information System Owners (ISO) on confidentiality, integrity, and availability impact values Offer technical guidance for Authorization and Accreditation (A&A) responses Evaluate IS threats and vulnerabilities, recommending additional safeguards as needed … visits and assessments, prepare written reports for government approval Ensure completion of security control assessments for each IS Support RMF process-related presentations, briefings, and reports Utilize customer RMF system of record for workflow duties and documentation Track and report on RMF process workflow activities and metrics Prepare Security Assessment Reports (SARs) and Authorization Recommendations Collaborate on Plans of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sensors Technical Lead (CSA - Senior) with Security Clearance

Annapolis Junction, Maryland, United States
Gormat, LLC
Program of Record or Rapid Capability Office Knowledge of Agile software development and DevSecOps environments Understanding of JCIDS, DoDAF, and DoD IT architecture standards Experience with cybersecurity compliance and system accreditation Familiar with SAFe and JIRA Ability to clearly communicate complex technical concepts to both technical and non-technical audiences Hands-on personality, get entrenched with product and constant … technical requirements and product specifications Support the full lifecycle of product development, including concept development, prototyping, integration, testing, deployment, and sustainment Guide engineering teams in technical decision-making and system architecture Validate and assess system designs for performance, security, and mission suitability Participate in and support technical reviews (e.g., PDR, CDR, TRR) and readiness assessments Collaborate closely with … users to ensure alignment with mission objectives Provide expert recommendations on product upgrades, obsolescence mitigation, and lifecycle improvements Review and contribute to technical documentation, including Interface Control Documents (ICDs), System Requirements Specifications (SRS), and Test Plans Support accreditation and certification processes (e.g., Risk Management Framework (RMF), ATOs) Monitor performance metrics and user feedback to inform future product More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Principal Project Manager

Rockville, Maryland, United States
Calibre Systems
dynamic team supporting a federal client. This position will be a principal role and will serve as a subject matter expert to a team that provides enterprise-wide information technology service management. The budget for this position is $160K-$185k. This is a hybrid position. Responsibilities include, but are not limited to: Oversee all aspects of the project … of large and complex projects. Analyze new and complex project-related problems and create innovative solutions that normally involve the schedule, technology, methodology, tools, solution components, and financial management of the project. Provide applications systems analysis and long and short-range plans for application selection, systems development, systems maintenance, and production activities for necessary support resources. Lead and … with AWS, AWS ECS (Elastic Compute) and cloud hosting Experience with Microsoft Windows Server, RedHat Enterprise Linux Experience with Risk Management including Authority to Operate (ATO) support, system security documentation maintenance/review, risk management, incident management, account/access control management, security consulting, systems Plan of Actions and Milestones (POA More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Windows Engineer (FS Polygraph Required) with Security Clearance

Fort George G Meade, Maryland, United States
COMSO, Inc
and COTS developers, and consumers and owners of the mission data. Conduct and analyze site surveys and prepare site preparation requirements and installation plans. Build, configure and test each system and hardware suite prior to shipment and implementation. Create and update documentation to include post installation documentation packages, installations guides, configuration guides, user guides test plans and procedures, technical … a Windows specialist you will focus on mission capabilities and Windows based COTS applications and servers. The Level 2 ITE Windows shall possess the following capabilities: Develops and reviews system architecture, including relevant use cases. Manages and tunes technology to ensure expected availability and performance levels are achieved. Leads major portions of large or medium complex IT projects, and … leads small projects autonomously. Develops models for future architectural enhancements to system hardware and software. Develops and conducts training programs. Assist and advises in the development or modification of complex hardware and software solutions to enhance a commodity or specialized IT infrastructure or environment. Interfaces with multiple levels of the organization and aspects of a team to resolve system More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Principal Financial Associate with Security Clearance

Springfield, Virginia, United States
Quantech Services, Inc
and implementing process improvements. Performing in-depth analysis to understand the links between business processes, data inputs, information requirements (outputs), and potential solutions. Coordinating and participating in system engineering and technical exchange meetings to support quick resolution of architectural, design, system interoperability and policy issues. Coordinating and participating in milestone events to include requirement reviews, design … reviews, and program management reviews. Collaborating with other FM stakeholders to load quarterly budget authority. Developing and implementing financial business system enhancements for GEO-F After operational needs for enhancements or system changes are assessed, define and develop technical requirements and specifications for development and test. Leverage knowledge of financial management processes, software, applications … field such as Business, Finance, Accounting, Management, Computer Science, Economics. 12 years of total experience in assessing federal financial business processes, developing financial systems options, and implementing system solution to include demonstrated experience with federal financial management including all aspects of programming, planning, budgeting, execution and/or accounting. In addition to above, specialized demonstrated More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Technical Specialist IV with Security Clearance

Aberdeen Proving Ground, Maryland, United States
Caelum Research Corporation
Patching and hardening of systems in accordance with Army DOD security related technical guidance. - Applying DISA Security Technical Implementation Guides (STIGs) and other security related technical configurations at the system environment level. - Manual scanning of systems supporting standalone system environments, CRNs, and classified enclaves. - Building software deployment packages using PDQ Deploy, Microsoft MECM, or other Windows patch management tools. - Provide recommendations for remediation of systems on a large-scale network. - Evaluating technical risk and understanding how changes in system configuration and/or network architecture affect a system's security posture. - Diagnose system configuration issues involving compliancy controls and work through to resolution. - Often providing technical assistance to end users and working across … IT technical teams to resolution. - Preparing documentation for RMF eMASS submission as artifacts upon request. - Information security or network/system administration - IT audit, IT compliance, enterprise risk management, creating/updating/implementing policy, etc., using cybersecurity/IT tools such as ACAS, HBSS/ESS, eMASS, and applying STIGs - Configuration management More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Delegated Authorizing Official Representative (DAO) () with Security Clearance

Annapolis Junction, Maryland, United States
Acclaim Technical Services
Unit in Annapolis Junction, MD Individual will be responsible for assisting in identifying the overall security requirements for the protection of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Will …/RDT&E environment and building Cybersecurity into systems deployed in operational environments. Prepare security authorization documentation. Qualifications: Four to eight years of experience as an IT Risk Assessor, System Security Engineer, Information Systems Security Manager or DAO in programs and contracts of similar scope, type and complexity is required. A bachelor's degree in computer science … college or university. In lieu of a bachelor's degree, an additional four (4) years of experience may be substituted. Must have working knowledge of the following is required: system security design process, defense-in- d epth/breadth, engineering life cycle, information domains, cross-domain solutions, controlled interfaces, identification, authentication and authorization, system integration, ICD More ❯
Employment Type: Permanent
Salary: USD 230,000 Annual
Posted:

Cyber SETA - Delegated Authorizing Official Representative with Security Clearance

Chantilly, Virginia, United States
Arcfield
prestigious National customer. Note: An offer for this position is contingent upon contract award. In this role, working under only general directions, you'll contribute to enhancing the Information Assurance (IA) posture through: IA Management Federal Information Security Management Act (FISMA) coordination and reporting Risk Management Framework (RMF) application IA … and milestones (POAMs) by working with various security stakeholders (ISSO/ISSE/ISSM/SCA) post authorization Screening new asset requests to ensure sponsorship and information system owner identification Facilitation support to the System Review Team to ensure that new/existing customer sponsored assets have the correct project regulation, data type/C-I … Innovative problem-solving skills for complex technical challenges Holistic approach to end-to-end systems development and lifecycle management Familiarity with translating high-level strategies into detailed system specifications Experience in customer liaison and business development support Experience in system conceptual design and multi-discipline engineering collaboration Knowledge of requirements verification and customer acceptance testing EEO More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Assessment Analyst

Springfield, Virginia, United States
Calibre Systems
(e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ). Knowledge of programming language structures and logic. Knowledge of system and application security threats and … attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of system administration, network, and operating system hardening techniques. Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). … e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). Knowledge of ethical hacking principles and techniques. K0210: Knowledge of data backup and restoration concepts. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of infrastructure supporting information technology (IT More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Manager, Cyber Intelligence with Security Clearance

San Diego, California, United States
L3Harris Technologies
Security Manager (ISSM) is responsible for implementing and maintain the cybersecurity/information assurance program for the site. This includes writing and maintaining all Information System Security policies, standards, and directives to ensure authorization and accreditation of information systems processing U.S. Government classified information. This position requires hands-on experience developing and implementing … fills this position will be required to be hand-on with the systems to include routine security auditing. Essential Functions: Establishes, documents, implements, and monitors the Information System (IS) Security Program and related procedures for the facility and ensures facility compliance with requirements for classified IS. Authors and maintains documentation supporting the Assessment & Authorization (A&A) of … to effectively manage all security authorizations for systems under their purview. Oversees configuration management of assigned systems; works and collaborates with IT organization to develop device and system hardening guides following DISA and NIST guidelines; audits systems to ensure maintenance of security posture integrity. Conducts periodic hardware/software inventory assessments as stipulated and required by governing More ❯
Employment Type: Permanent
Salary: USD 232,000 Annual
Posted:

IT Security Developer - Senior with Security Clearance

Washington, Washington DC, United States
DecisionPoint Corporation
the development and maintenance of GPO's Technical Reference Model (TRM) by aligning architectural designs with cybersecurity requirements. Produce project documentation such as technical research reports, risk analyses, and system architecture diagrams. Define technology roadmaps that incorporate evolving security controls and enterprise capabilities. Partner with ITOps branches (Infrastructure, Network Messaging, Enterprise Services, Customer Support) to embed security controls in … system design and operations. Contribute to security design reviews, risk assessments, and secure configuration baselines for enterprise systems. Lead the development and maintenance of RMF Authorization to Operate (ATO) packages in alignment with NIST SP 800-37 and SP 800-53. Create, update, and manage RMF artifacts, including Security Assessment Reports (SARs), System Security Plans (SSPs), POA … Ms, and security control implementation summaries. Ensure system security documentation aligns with FISMA requirements and passes audit and compliance reviews. Qualifications Ability to obtain a Public Trust clearance. 8 years of experience in IT security architecture, system development, or cybersecurity engineering within a F ederal or regulated environment. Bachelor's degree in Computer Science , Information Systems More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Carrier Strike Group (CSG)/Carrier Airwing (CVW) Embarkables Int with Security Clearance

San Diego, California, United States
Athena Technology Group
solutions. ATG is a premier provider of cybersecurity, risk management framework (RMF) and communications cybersecurity solutions as well as information technology (IT) and communications consulting, system engineering, integration, deployment and operation of state-of-the-art command and control and information systems that deliver critical network centric solution to the warfighter. We are … and approximately 90 air squadrons and ashore units Key Responsibilities Coordinate the deployment and integration of Carrier Air Wings (CVWs), deployable Information Systems into a Shipboard Network System, Consolidated Afloat Networks, and Enterprise System (CANES), etc.) and non-Navy network environments. Coordinate the deployment and migration of CVWs organizational and personnel data using external hard drives. … Manage, monitor, and troubleshoot deployable Information System hardware and software requirements. Maintain the IT Lifecycle Management tracker for deployable Technical Training Equipment (TTE), applications, databases, legacy networks and servers. Coordinate the Inventory of all Embarkable NMCI and follow-on systems and networks and ONE-NET assets which embarked on CVN. Monitor and Validate all 3rd More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Analyst (SOC) with Security Clearance

San Diego, California, United States
Clark Creative Solutions
endpoints, user permission and authentication audits, log analysis, and malware identification/triage. An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security … persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators … Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions. Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency. Conduct comprehensive technical analyses of computer evidence, research and integrate More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ServiceNow SME with Security Clearance

Chantilly, Virginia, United States
Dexian Signature Federal
that powers our operations. Your expertise will ensure the stability, security, and efficiency of our IT systems. This role requires a proactive problem-solver with a deep understanding of system architecture, network management requirement management processes. The ideal candidate will have prior experience with capturing customer requirements, designing and implementing enterprise level system such … as ServiceNow. Responsibilities: • Design and develop ServiceNow system architecture, including hardware and software components, to meet functional requirements. • Collaborate with cross-functional teams to gather, analyze, and manage system requirements, ensuring alignment with business objectives. • Document system requirements, configurations, procedures, and best practices. • Install, configure, and deploy server resources provided by third-party cloud services. and software … updates. • Create technical documentation for system configurations and maintaining system-related reports. • Prepare and document standard operating procedures and protocols for all designed and developed that ensures detailed project documentation. • Document all system configuration changes in accordance with Information Systems Security best practices. Required Qualifications: • Active TS/SCI with Poly. • 4+ years of ServiceNow More ❯
Employment Type: Permanent
Salary: USD 300,000 Annual
Posted:

Cybersecurity Certification and Accreditation Analyst with Security Clearance

Dayton, Ohio, United States
Hybrid / WFH Options
Amyx Inc
Amyx is seeking to hire a Cybersecurity Certification and Accreditation (C&A) Analyst for a remote position supporting Defense Operation Technology environments with regards to Authorization of information systems and all associated cybersecurity policies and procedures. The C&A Analyst should possess an understanding of how the security controls identified in the NIST 800-53 apply to the … The C&A Analyst will assist in the determination of the applicable severity value for an identified vulnerability (e.g., non-compliant security control), determine the possible ramifications on the system's current or future authorization, and be required to brief senior management on the progress or results of an information system undergoing the authorization … maintain continuous monitoring programs for OT environments. Conduct security control assessments to evaluate the effectiveness of security controls in place for OT systems. Prepare and review accreditation packages, including system security plans (SSPs), risk assessments, and security control assessments Must have the ability to communicate accurate information Qualifications Required: • Secret Clearance • Must be eligible for IT-II More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Army Data and Analytics Platform Effort with Security Clearance

Alexandria, Virginia, United States
UICGS and Bowhead Family of Companies
professionals advising executive level personnel on financial, technical, and other high-level policy areas. Responsibilities Positions available include, but not limited to: Ammunition Functional Analyst ARDAP Financial Operations Management Cloud Architecture Engineer Computer Network Architects Cyber Security Engineer Cybersecurity Information Systems Security Manager (ISSM) Data Architect Data Scientists Data/Program Management Analyst Enterprise … Architect/Radio Frequency Identification (RFID) (Computer Network Architect) Information Security Analyst Information Systems Security Engineer (ISSE) Information Technology Specialist IT Architecture … and Cyber Network and Computer Administrator Power BI- Platform Developer Product Manager Program Manager Lead Project Manager Project/Program Manager SAAS Functional Team Lead Senior Plans and Ops System Analyst Software Developer Software Quality Assurance Engineer Technical Solution Architect Test Engineer Qualifications Education & years of experience will depend on position. Intermediate to advanced level skills in Microsoft Office More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor (SCA) with Security Clearance

Chantilly, Virginia, United States
VTG
Do you have what it takes? Requirements: All positions require: TS/SCI with Poly Level 2 SCA: Bachelor's degree relevant to computer engineering, INFOSEC, cyber security, information management, and/or computer science Level 2 SCA: BS Degree + 3 years OR High School + 5 years OR Associates + 4 years OR Masters … Degree + 2 years Experience in technical project management Familiarity with IA concepts Ability to review and recommend vulnerability and risk levels associated SW and HW products Ability to provide basic IA support to SCA Level 2 -4 personnel in the conduct of assessment actions Practical experience performing ISs A&A as defined in applicable ICDs and guidance … security related directives and guidance for IT-IA-IM Practical experience utilizing risk management strategies for IT solutions Understanding of emerging technologies and their implementation within Government system and network environments Knowledge of IT concepts used in the evaluation of security performance and integrity of state-of-the-art applications, communications systems, HW, SW, satellite control systems More ❯
Employment Type: Permanent
Salary: USD 210,000 Annual
Posted:
Management Information System
10th Percentile
£26,250
25th Percentile
£33,670
Median
£48,924
75th Percentile
£73,602
90th Percentile
£92,500