support other cybersecurity professionals in the execution of information assurance programs and will support other IT teams in implementing security measures. This is accomplished in compliance with CMMC and RiskManagement Framework policies and procedures such as System Security Plans, Risk Assessment Reports, Plans of Actions and Milestones, Assessment & Authorization packages, and Security Control Traceability Matrices. The … ISSM will maintain an operational security posture and ensure security policies, standards, and procedures are established and followed. The ISSM will perform vulnerability and risk assessment analyses to support Assessment & Authorization and will provide configuration management for security software, hardware, and firmware. This position is based on multiple DoD Directives; including DoD 5205.07 volumes 1-4; DoDD 5205.02E … Skills 5-7 years cybersecurity experience. 3 years as an ISSM or equivalent duties in a supervisory capacity. Experience in TS SCI environments. An in-depth knowledge of the RiskManagement Framework. CISSP, CISM, or equivalent cybersecurity certification. Experience with eMASS, XACTA, or similar government systems of record. Familiarity with performance metrics and the ability to monitor and More ❯
Position Description: The Cyber Systems Engineer - Vulnerability Management provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to: Support the IT vulnerability management lifecycle. Support government activities and reporting to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC). Assesses and manages the implementation of identified corrections associated … Favorably adjudicated Polygraph Bachelor of Science Degree in Science, Technology, Engineering or Mathematics (STEM) or an advanced IA certification DoD 8570 certification in IAT or IAM Strong analytic and riskmanagement skills Strong attention to detail and organizational skills Excellent communications skills Self-starter requiring limited direction and supervision Experience implementing RMF Process and NIST 800-53 technical … controls, as well as developing and maintaining associated certification and accreditation documentation Desired: Experience supporting IT domain or IC Experience with acquisition and project management Experience briefing senior customer personnel Ability to organize and prioritize numerous customer requests in a fast-paced deadline driven environment Familiarity with customer's IA processes Experience with SNOW and Splunk Familiarity with Cross More ❯
on-site work in Alexandria, VA, or Kearneysville, WV. Must be able to work in a secure, classified environment and adhere to DoD security protocols. Key Responsibilities: ATO Process Management: Lead and support the end-to-end ATO process for DoD systems, ensuring compliance with RMF (RiskManagement Framework) and DoD policies. Prepare, review, and maintain ATO … packages, including supporting artifacts such as System Security Plans (SSPs), Security Assessment Reports (SARs), and Risk Assessments. Artifact Creation and Maintenance: Develop and maintain supporting documentation, including boundary diagrams, data flow diagrams, and hardware/software inventories. Ensure all artifacts align with DoD standards and meet audit requirements. STIG Compliance and Reporting: Conduct Security Technical Implementation Guide (STIG) assessments … using tools like SCAP and STIG Viewer. Generate and review STIG compliance reports, identifying vulnerabilities and recommending remediation actions. POA&M Creation and Management: Develop and manage Plans of Action and Milestones (POA&Ms) to address security control deficiencies. Track and report on POA&M progress, ensuring timely remediation and compliance. eMASS Administration: Manage system records and workflows in More ❯
with existing vehicle platforms and subcomponents. Proficient in Agile System Development and Rapid Prototyping, supporting iterative testing and refinement of integrated capabilities across the engineering lifecycle. Familiarity with the RiskManagement Framework (RMF), Information Assurance (IA), and Program Protection processes to ensure security compliance and data integrity across systems. Strong understanding of Technology Readiness Levels (TRLs) and their … application to system development milestones and technical risk assessments. Possess technical knowledge to support test planning and execution, including the development, review, and conduct of test plans, operational test events, system validation, and verification in lab and field environments. Experienced with System-of-Systems (SoS) architectures and systems integration, including supporting configuration, validation, and troubleshooting of multiple hardware/… integration and testing in tactical environments. Understanding of vehicle dynamics and how they impact system performance and integration. Ability to use FMEA (Failure Modes and Effects Analysis) or other risk assessment tools for system validation. Familiarity with project management tools like MS Project or JIRA for tracking integration timelines and milestones. Ability to create automated test scripts for More ❯
done by solving the most daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview Provides IC data management support to modernize mega data repositories, dataflow management, data provenance and compliance validation, and streaming solutions. About The Role Position Title: Cyber Systems Engineer Location: Annapolis Junction, MD … agency security policies and frameworks. Enforce secure connections and trusted relationships between external systems and environments. Assess and mitigate security threats throughout the system lifecycle. Provide technical guidance on risk analysis, security planning, certification, and accreditation. Review and improve C&A documentation, ensuring completeness and compliance. Apply advanced knowledge of system security engineering, including areas such as: Security design … lifecycle Authentication, authorization, and access control Intrusion detection, incident response, and auditing Cryptography and cross-domain solutions Riskmanagement and change control Support system authorization efforts in line with DoD RMF, NIST RMF, and related government compliance processes.Who You Are: You have proven experience securing systems and driving them through successful A&A or RMF processes. You understand More ❯
the critical center of our business, and our dynamic environment requires innovative strategic thinking and immediate, real solutions. Goldman Sachs Engineers are innovators and problem-solvers, building solutions in riskmanagement, big data, mobile and more. We look for creative collaborators who evolve, adapt to change, and thrive in a fast-paced global environment. Want to push the … both for external clients and internal business users. In addition, you will oversee every component of the production system to identify and resolve production problems as well as assess risk of systems changes. Job Summary Technical and operational riskmanagement of a fast-paced, multi-asset electronic trading business Software development focused on creating sustainable systems and … automation Finding opportunities for efficiency and cost savings in support process and physical environment Partnering with software and infrastructure owners to solve hardware/network issues Incident and crisis management Significant business interaction across FICC front office Participation in system design consulting, platform management, and capacity planning Basic Qualifications 3 years or more of relevant work experience Proficiency More ❯
major U.S. Air Force radar acquisition program. This high-visibility program will deliver multiple radar system variants across several operational sites, supporting critical USAF missions including air surveillance, battle management, and integrated air and missile defense. The Chief Engineer will serve as the authoritative technical leader, guiding system design, integration, and verification efforts across a multi-site, multi-contractor … technical baseline with USAF mission objectives, capability documents, and interface requirements. Manage the system architecture and technical configuration across multiple radar variants and geographic locations. Drive system-level trades, risk assessments, and design decisions that impact performance, schedule, and cost. Coordinate with government engineering leads, site activation teams, logistics elements, and operational users. Represent the program at all major … technical reviews (PDR, CDR, TRR) and milestone events. Oversee the development of program artifacts including the Systems Engineering Management Plan (SEMP), Interface Control Documents (ICDs), verification plans, logistics data products and cybersecurity compliance documentation (RMF). Support developmental and operational test planning with the Air Force Test Center (AFTC), AFOTEC, and other stakeholders. Lead or contribute to working groups More ❯
Union City, Ohio, United States Hybrid / WFH Options
CompTech Computer Technologies
auditors, and ensuring timely completion of audit tasks. The role also includes overseeing Provided-By-Client (PBC) requests, exception reporting, and corrective action plans, as well as contributing to riskmanagement documentation and SharePoint control processes. The ideal candidate is a proactive team leader with a strong focus on quality assurance and the ability to manage time-sensitive … Logistics Agency (DLA), providing subject matter expertise, process improvement recommendations, and industry best practices to enhance audit workflows, business rules, and guidance. • Perform audit operations and analytics, including the management of Provided-By-Client (PBC) requests, Notifications of Findings and Recommendations (NFRs), Corrective Action Plans (CAPs), and exception reporting. • Lead the end-to-end management of PBCs and … designated audit response tools, ensuring timely and accurate documentation in collaboration with stakeholders. • Collaborate with audit leads and internal contacts to maintain and update key documentation such as the Management Description of the System (MDS), Standard Operating Procedures (SOPs), Complementary User Entity Controls (CUECs), and Complementary Subservice Organization Controls (CSOCs). • Conduct SOC 1 analyses for Subservice Organizations (SSOs More ❯
and executing programs. Performs systems integration activities. Conducts Analysis of Alternatives (AoAs), Course of Actions (CoAs), Trade Studies, and Engineering Assessments. Assists the Government in strategic technical planning, project management, performance engineering, riskmanagement and interface design. Operates at the level of integrating multiple systems, services, processes, and interfaces within a Major Systems Acquisitions across organizational and … boundaries. Skills and Experience: Required: Bachelor's degree or higher in Systems Engineering or in a related technical or scientific field such as Engineering, Physics, Mathematics, Operations Research, Engineering Management, Computer Science, Information Technology, Management Information Systems, or related STEM degree program, or related equivalent additional experience. Senior-level or higher experience working in government or industry in … and understanding of systems engineering lifecycle. Desired: Master's degree in Systems Engineering or in a related technical or scientific field such as Engineering, Physics, Mathematics, Operations Research, Engineering Management, Computer Science, Information Technology, Management Information Systems, or related STEM degree program. Working knowledge of Model-Based Systems Engineering, processes, tools and languages. Working knowledge of Digital Engineering More ❯
implementations Interface with flag-level officers and senior government executives Establish strategic partnerships with industry and government leaders Drive innovation in training system acquisition and delivery Lead organizational change management initiatives Represent organization at national defense forums May be requested and required to participate in Proposal Support functions due to expertise Competencies Executive-level program management expertise Comprehensive … knowledge of Navy Training Systems Advanced expertise in Surface Training Acquisition Strategic vision for training innovation Superior leadership and organizational skills Expert stakeholder management at executive level Financial acumen for large-scale program managementRiskmanagement for mission-critical programs Change leadership and transformation expertise Project Management Professional (PMP) certification Supervisory Responsibility This position involves … executive oversight of multiple program portfolios and senior management teams. Work Environment This job operates in executive settings with frequent engagement at the highest levels of Navy leadership. This role uses executive office equipment and classified communication systems. Physical Demands The physical demands are typical of executive positions, with extensive travel and high-stress decision-making requirements. While performing More ❯
with expertise in cloud infrastructure possesses specialized skills in evaluating the security controls of systems hosted in cloud environments. Their technical functions encompass a range of tasks aimed minimizing risk while also ensuring the integrity, confidentiality, and availability of data within the domain. Here are the technical functions typically associated with this role: Support the Assessment and Authorization (A … A) RiskManagement Framework (RMF) for client-managed systems, networks, and enclaves across security domains. Validate and review security documentation, ensuring accuracy and compliance with regulatory standards. Advise ISSOs on security categorization and control selection (RMF Steps 1 and 2) and conduct Technical Exchange Meetings (TEMs) with security professionals. Develop test reports, assessment artifacts, and Plan of Action … wireless network assessments, and social engineering exercises. Validate security configurations for compliance with policies and industry best practices. Assess regulatory compliance (e.g., GDPR, HIPAA, PCI DSS, SOX) and develop risk mitigation strategies. Prepare detailed assessment reports and communicate findings to stakeholders. Contribute to continuous improvement initiatives for security assessment methodologies and tools. Share cybersecurity knowledge through training, mentoring, and More ❯
of a degree) • Knowledge of: security system design tools, methods, and techniques new and emerging information technology (IT) and cybersecurity technologies specific operational impacts of cybersecurity system life cycle management principles, including software security and usability capabilities and requirements analysis basic system, network, and OS hardening techniques background in supporting: Linux/UNIX, Python/PowerShell/Javascript, vulnerability … scanning & patching, firewalls, and networking background in administering: Windows, Archer, ThreatConnect, FireEye, Tenable/Nessus, WebInspect, SCCM, VMWare, FreeNAS/Pure/NetApp storage, and PKI certificate management • Skills in: conducting vulnerability scans and recognizing vulnerabilities in security systems identifying systemic security issues based on the analysis of vulnerability and configuration data troubleshooting and diagnosing cyber defense infrastructure and … the proposed solution independently making configuration updates to ensure system availability needs • Ability to share meaningful insights about the context of an organization's threat environment that improve its riskmanagement posture • Ability and drive to quickly learn new software and IT concepts • Comprehension of accepted security practices, troubleshooting issues, attack vectors, and customer support Preferred Qualifications: • Demonstrated More ❯
world. We work with the companies that are Britain's economic engine - ambitious, entrepreneurially-spirited and high growth businesses that fuel the economy - and directly advise the owners and management teams that lead them. We'll broaden your horizons To ensure our services and applications are fit for the modern market, our IT team collaborates with every department. They … At BDO, the IT Governance Team is responsible for acting as a second line of defence in the IT Department and for various methods and practices around assurance and risk, shaping activities, processes and systems. In this role you will work across team and department boundaries, engaging with IT, Internal Audit and Information Security to ensure that controls are … effective working and continuous improvement Act as a first point of contact for any internal assurance stakeholders (e.g., Internal Audit team) for their enquiries relating to assurance, audit and risk issues Provide professional guidance to stakeholders on audit, assurance, risk and control Work closely with key IT stakeholders assuring adherence to standards and practices Identify opportunities for improved More ❯
Focused and Solutions Led. We deliver end-to-end (E2E) and emerging solutions to drive customer satisfaction, increase profitability and growth. Our success is enabled by our world-class management consulting, delivery excellence and engineering brilliance. We embody the OneWWT mindset by bringing the right talent at the right time from anywhere within WWT to solve our customer's … and configurations of platforms managed by service provider(s). Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization). Implement RiskManagement Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them. Assist in … hardware. Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure. QUALIFICATIONS: Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of riskmanagement processes (e.g., methods for assessing and mitigating risk). Knowledge of applicable international laws, regulations, policies, and ethics as they relate to cybersecurity. Knowledge of cybersecurity More ❯
so when the unexpected happens it is not catastrophic for their business. • We think of ourselves as enabling resilience in an uncertain world. • We look at the world of risk from different perspectives, working with our clients at each stage of the risk identification, risk mitigation and risk transfer process. • We make sure they have the … extreme events and respond in a prepared, disciplined and organized fashion. The Team: Catastrophe Analytics • The Catastrophe Analytics team, embedded into the broking unit, assists clients in analysing the risk to their business from all aspects of natural perils and catastrophes. The Role: Catastrophe Analyst • The position is for a catastrophe analyst, based in London, to join the UK … engaging on developing and deploying service offering to clients alongside our research teams and external academic partners.• The role will incorporate year-round client engagement on topics such as risk profiling, model interpretation, portfolio management and bespoke analytical projects in collaboration with the local brokers in London. • As part of our agile team, there is also opportunity to More ❯
project leads. Job Description: To be successful in this role, the candidate should have experience with performing all areas of Project Scheduling, including planning & Scheduling, Negotiation skills, change control, riskmanagement and validation and verification for multiple product baselines. The candidate should possess a general familiarity with IT systems and systems integration projects. Additionally, the candidate should have … Secure Web Services (SWS) environment, which provides secure information sharing to the community, into a more mature service offering to meet the DoD and intelligence communities. Responsibilities: Utilizing program management tools to identify and track key program milestones across multiple programs including contract deliverables Assisting multiple program teams in maintaining planned schedules Assessing a variety of program metrics and … providing reports to Program Managers to ensure support requirements and objectives are being met Managing schedules across multiple programs to forecast staffing requirements. Assisting Program Managers with shaping program management tools to meet program needs. Serving as key point of contact for scheduling internal Program Management meetings in support of multiple programs Participating in special projects as required More ❯
all networks. This includes: establishing or utilizing existing access control mechanisms; defining and configuring the appropriate firewall settings; conducting intrusion detection and prevention; conducting vulnerability scanning; conducting anti-virus management; and conducting the necessary incidence response actions in accordance with client security policies. Exercise robust network oversight that incorporates rigorous compliance, privacy and data security standards and achieves the … years of experience providing support in the respective discipline. Candidate should have experience in several of the following areas: Securing mission systems through the ICD 503 process for security riskmanagement, certification, and accreditation. Securing and monitoring Microsoft Windows desktop and server in a secure IT environment including one or more of Windows 7, Windows 10, Windows Server … R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016. Securing and monitoring Linux & Microsoft Windows desktops, servers, and other devices. Securing and monitoring Macintosh devices. Applying RiskManagement Framework controls to systems with successful authorization of those systems Use of system authorization workflow tools including advising on how to navigate those tools and assisting projects with More ❯
with analysis, evaluation and with the preparation of recommendations for system improvements, optimization, development, and maintenance efforts in the following specialties: information systems architecture; networking; telecommunications; automation; communications protocols; riskmanagement/electronic analysis; software; life-cycle management; software development methodologies; and modeling and simulation. The Level 5 Subject Matter Expert (SME) shall possess the following capabilities … and use cases that accurately reflect end users' needs. Assist in the development, organization, and articulation of Mission expectation to support test planning and operational evaluation activities. Support information management transformation. Maintain cognizance of all operational requirements, ensuring that the spirit of the requirements is preserved across programmatic and acquisition activities. Articulate/white board ideas to all levels … of management. Provide lifecycle sustainment support If assigned to Directory Services TTOs, experience with Active Directory, Identity Management, SCCM, DNS, Group Policy, Active Role Servers, Privileged Account Management (PAM) Services, and MS Exchange are required. If assigned to Desktop & Enclave Services TTOs, understanding of the concepts of mission islands, Trusted Thin Client, and enhanced VDI (e.g., remote GPU More ❯
fast-paced environment, the ideal candidate is an key decision maker, leader, mentor and motivator to their engineering team. Essential Functions: Key interface between the Engineering team and Program Management Ensures all technical performance, cost and schedule goals on the program are met Acting as an advisor to senior management and customers on advanced technical studies and/… Degree and a minimum of 4 years of prior related experience. Experience and knowledge in developing, proposing, managing, implementing, testing products and system solutions in Cyber defense, Cyber exploitation, Riskmanagement framework and/or Intelligence, Surveillance & Reconnaissance (ISR) systems including: Security protocols and algorithms System Security certification processes such as FIPS, NIAP, NSA, or similar Rugged embedded More ❯
revenue through specialist methods from mathematics, science, and engineering. Working closely with the Agriculture trading desk, you will be part of a global team that focuses on derivative valuation, risk, automated trading, and data-driven decision making. At Macquarie, our advantage is bringing together diverse people and empowering them to shape all kinds of possibilities. We are a global … you play? Press space or enter keys to toggle section visibility As a junior Quantitative Analyst, you will expand our derivative products by implementing new pricing models for valuation, risk analysis, and trading. You will assist with day-to-day trading operations and maintain our Quant Strat analysis platform and library for risk and pricing. Your role will … you to apply. About Commodities and Global Markets Press space or enter keys to toggle section visibility Commodities and Global Markets is a global business offering capital and financing, riskmanagement, market access, physical execution and logistics solutions to its diverse client base across Commodities, Financial Markets and Asset Finance. Our commitment to diversity, equity and inclusion Press More ❯
Navy Afloat programs throughout all stages of acquisition, systems engineering and maintenance processes. Be familiar with Information Systems Security Engineer (ISSE) responsibilities in accordance with the US Navy's RiskManagement Framework (RMF) Process Guide as follows: Oversee the development and maintenance of a system's cybersecurity solutions. Identify areas of operation and Service Contract Act (SCA) cognizance … control baseline with applicable overlays. Assist with development, maintenance and tracking of the System Security Plan (SSP). Lead the security control implementation and testing efforts. Perform vulnerability-level risk assessment on the Plan of Action and Milestones (POA&Ms). Ensure the execution of any security testing required as part of A&A or annual reviews. Ensure the … engineering process to ensure the systems security and cybersecurity requirements, design and testing are properly addressed throughout the system lifecycle. Provides guidance and recommendations to government leadership on the management of cybersecurity risks of IT systems and Navy-specific processes in accordance with the RMF Process Guide (RPG). The physical demands and work environment described here are representative More ❯
and executing programs. Performs systems integration activities. Conducts Analysis of Alternatives (AoAs), Course of Actions (CoAs), Trade Studies, and Engineering Assessments. Assists the Government in strategic technical planning, project management, performance engineering, riskmanagement and interface design. Operates at the level of integrating multiple systems, services, processes, and interfaces within a Major Systems Acquisitions across organizational and … boundaries. Skills and Experience: Required: Bachelor's degree or higher in Systems Engineering or in a related technical or scientific field such as Engineering, Physics, Mathematics, Operations Research, Engineering Management, Computer Science, Information Technology, Management Information Systems, or related STEM degree program, or related equivalent additional experience. Senior-level or higher experience working in government or industry in … and understanding of systems engineering lifecycle. Desired: Master's degree in Systems Engineering or in a related technical or scientific field such as Engineering, Physics, Mathematics, Operations Research, Engineering Management, Computer Science, Information Technology, Management Information Systems, or related STEM degree program. Working knowledge of Model-Based Systems Engineering, processes, tools and languages. Working knowledge of Digital Engineering More ❯
and issues, escalatingwhereappropriate. Comply, and ensure team members comply, with allconfidentiality and non-disclosure policies and agreements and ensure the security of information,at all times. Business Development & Account Management Support future growth by working closely with Sales, Account Leads & Account Managementteams,assistingwhere requiredwiththe sales/procurement cycleto best positionKainostowinprofitablenew business. Promote successes Kainos-wide,toour customers andto the … tweets etc. Understandthe contracts and commercial terms applying toour projectsand ensure that Kainos is not compromised by non-compliance. Professional Developmentand Growth Contribute to continuous improvement initiatives within the Management Capability. Understandcurrent thinking fromthe Technology, Experience Design and Consulting capabilitiesand drive alignment accordingly. Encourage innovation in technology and process both within the project and outside the project. Proactivelyassistwithrecruitmentactivitiestoenable stableorganisational … ll manage all aspects of your projects, which will typically be either one large, complex project or multiple smaller projects. This will include project planning, staffing, milestone tracking, commercial management and customer satisfaction. Your key responsibilities include: Commercially managing the implementation of solutions from pre-sales through implementation to hand over to AMS (Application Management Services). Acting More ❯
overseeing projects within the organization, ensuring they are completed on time, within budget, and to the specified quality standards. The role requires a minimum of five years of project management experience. Roles & Responsibilities: Lead the planning and implementation of IT focused projects. Coordinate internal resources and third parties/vendors for the flawless execution of projects. Ensure that all … to track progress. Use appropriate verification techniques to manage changes in project scope, schedule, and costs. Measure project performance using appropriate systems, tools, and techniques. Report and escalate to management as needed. Manage the relationship with the client and all stakeholders. Perform riskmanagement to minimize project risks. Establish and maintain relationships with third parties/vendors. … Create and maintain comprehensive project documentation. Skills & Qualifications: Bachelor's degree in Information Technology, Computer Science, or a related field. Minimum of five years of experience in project management, in similar environments Proven track record of managing all aspects of a project lifecycle. PMP/PRINCE II/SaFE/SCRUM certification is a plus. Strong working knowledge of More ❯
and procedures. Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensures compliance throughout the organization; Provides RiskManagement Framework, circuit/system accreditation and certification policy services; Participates in the development or modification of the computer environment IA security program plans and requirements; Develops procedures … functions. Education/Experience/Certifications Bachelor's Degree in Computer Science, Cybersecurity, Computer Engineering, or related discipline preferred 7+ years of experience performing Information Assurance functions and using RiskManagement Framework (RMF) IT security controls and policies preferred Abilities Ability to organize, prioritize and meet deadlines Capable of conveying complex information in a simplistic manner Strong critical … 8a Business Development Program Participant specializing in global information technology and offering professional solutions in IT Design & Installation, Cybersecurity Engineering & Support, Application Integration & Development, Software & Hardware Engineering, Network & Systems Management, Information Systems Security, and Business Management Services. Leveraging over 30 years of providing IT services to the federal & commercial market with projects located around the world, our team More ❯