in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy and manage machines with VMware, vCenter, Kickstart, Puppet … Foreman, and CIS-CAT Manage and configure host-based security systems. Experience with DevOps methodologies and tools, supporting Infrastructure as Code (IaC) within RHEL containers. Use monitoring and logging tools, such as Prometheus, Grafana, ELK, IBM NetCool, and Solarwinds. Patch and manage systems using Red Hat Satellite Server. Provide hardware support for servers and workstations. Experience/knowledge More ❯
analysis of SIGINT sensor systems. You will work with team leads to integrate AI/ML capabilities into enterprise architectures, ensuring performant processing while considering aspects of accuracy, security, and maintainability. This also includes enabling autonomous decision-making systems that can operate with minimal human intervention, creating adaptive processing systems for dynamic environments, and discovering features and inferring … Experience with model monitoring, A/B testing, and performance optimization Experience with real-time inference systems and low-latency model serving Knowledge of adversarial ML and AI security/robustness techniques Experience with graph neural networks for network analysis Experience in design, deployment, support of AI or ML model for significant real-world applications More ❯
on workstations. • Integrate new hardware and software into existing infrastructure. • Collaborate with other teams and team members to develop automation strategies and deployment processes. • Develop, implement and maintain security controls and supporting documentation as required for risk management framework (RMF). • Fault finding, analysis and of logging information for reporting of performance exceptions. • Support security incident … evaluations and certifications. • Facilitate the creation and maintenance of Identity and Device Management • Provide platform administration for Linux based applications. • Provide input on ways to improve the stability, security, efficiency, and scalability of the environment. • Maintain best practices on managing systems and services across all environments. Requirements • Associate or bachelor's degree in a related field, or two More ❯
highly technical engineer to provide hands-on support for the NGA Infrastructure areas which include but are not limited to identity management, servers, virtualization storage, cloud computing, enterprise security compliance, System monitoring, and backups/recovery. Candidate MUST be flexible and available when after-hours remote and/or offsite support for emergency break-fix is required. The … right candidate will serve as technical lead on enterprise compliance, interpret security compliance reports, develop solutions to security findings, ensure systems baseline compliance, and serve as subject matter expert in case of complex compliance issues for endpoint computing services supported by Tier 3. Responding to and mitigating security findings resulting from internal/external … security audits. ESSENTIAL DUTIES AND RESPONSIBILITIES: Provide day-to-day maintenance of servers in a hybrid environment which consists of on-premises, physical, virtual, and cloud-based systems. This maintenance includes but is not limited to admin support, patching, and troubleshooting of the system environments. Perform system and application upgrades as new major and minor releases become available. More ❯
for overseeing all testing and quality control efforts for the DMA Next Generation Adobe Experience Manager (AEM) platform. This role ensures that all deliverables meet defined functional, performance, security, and accessibility standards. The QA Lead collaborates closely with developers, designers, product owners, and Stakeholders to implement and maintain a structured testing framework that supports agile delivery and continuous More ❯
modify, operate, integrate, test and maintain software systems or platforms Analyze user needs and develop software solutions May analyze and design databases or perform analysis of data Ensure security of software and systems Work with Agile teams in high-level design, development, implementation, integration and verification of software components Attend and Participate in Periodic Large Scale Agile Planning … Experience with Java, C++, Eclipse/IntelliJ IDEs, JUnit, etc. Experience developing micro-services and working with containerization Experience with agile software development process IAW USG defined requirements SECURITYCLEARANCE: Minimum Active Secret SecurityClearance required - Top Secret is preferred EDUCATION & CERTIFICATIONS: Bachelor's Degree preferred Actual salary will be based on a variety of factors More ❯
presentation and communication skills Experience collaborating with cross-functional teams Ability to translate complex data insights into actionable business recommendations Must be able to acquire a Public Trust securityclearance Desired Skills: Additional certifications in data analysis or business intelligence Experience with specific industry domains Advanced statistical analysis experience Experience with cloud-based analytics platforms Salary More ❯
Responsibilities: • Develop and maintain Java microservice web applications. • Work closely with tech lead on technical decisions and product roadmap. • Resolve challenging software engineering design problems. • Interact with the customer to resolve issues and propose new features. • Support testing and deployment More ❯
Job Duties You'll be responsible for designing, developing, and maintaining scalable database loading systems that efficiently ingest large volumes of data from various sources within an on-premises cloud environment. You'll also be implementing real-time data processing More ❯
maintains integrity and configures network components along with implementing operating systems enhancements to improve reliability and performance. Location: Columbia, MD Travel Required: No Shift: Day Remote Type: Onsite SecurityClearance: Current TS/SCI Polygraph: Required Salary Range The projected compensation range for this position is 179K to 215K (annualized USD). Salary is determined by various factors More ❯
cyber-physical solutions for the nation's most mission-critical facilities, secure environments, complex infrastructure, and global enterprises. With over 7,000 employees, our capabilities span electrical, electronic security, telecommunications, life safety, automation and controls, audiovisual, and IT systems. Headquarters in Tysons, Virginia, M.C. Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and … Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Network Engineer 5 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security … Work closely with the field engineers to simulate expected system level performance and provide quick feedback on potential improvement Assist senior network engineers to identify and resolve network security issues. Develop network designs for each SLA classification. Originates design documents for small projects and in support of large programs Assists Senior Engineers in preparation of Designs, including: Narrative More ❯
Learning Engineer to create cybersecurity solutions working with cloud-based architecture (AWS Services). You will work directly the stakeholders to understand requirements and work with Army's Security teams to ensure the technologies available to the Government can be turned into solutions that they can use. Liaise with government software vendors and other asset creators; lead coordination More ❯
enabling technologies. • The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk assessor … effectively manage a case load • The Contractor shall track, document, and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture. Required Skills: 1. Cyber Security Support: 2. Demonstrated experience analyzing IT systems for cyber security vulnerabilities. … Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities. 5. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. 6. Demonstrated experience with multiple OS's, including Windows More ❯
Oriented Architecture (SOA) Analyze and resolve complex problems associated with server hardware, applications and software integration Salary Range: $120,000 - $200,000 annually, commensurate with skill set, experience, securityclearance level, and educational qualifications. At SNS One, Inc., we are committed to providing an environment of mutual respect where equal employment opportunities are available to all applicants and More ❯
Responsibilities: • Develop and maintain Java microservice web applications. • Work closely with tech lead on technical decisions and product roadmap. • Resolve challenging software engineering design problems. • Interact with customers to resolve issues and propose new features. • Support testing and deployment of More ❯
corporate research deliverables for clients. Enter and manage data and findings into a proprietary research database to deliver on demand insights for customers. Basic Qualifications Active US Government SecurityClearance (TS or higher) Keen attention to detail for editing/reviewing written products and presentations Supervisory, managerial, and/or mentoring experience in a professional setting BS/ More ❯
Software Engineer Location: Merrifield, VA Type: Full Time Complete Data Solutions (CDS) is a leading data engineering and analytics company focused on providing our federal government clients with innovative solutions to complex data engineering and analytics problems. CDS is proud More ❯
Subject Matter Expert supporting this government program, you will lead the advancement and implementation of cutting-edge Zero Trust Architecture and data-driven cybersecurity solutions that protect national security interests. By leveraging deep technical expertise, strategic vision, and emerging technologies such as AI, big data analytics, and cloud platforms, the Zero Trust Data Analytic SME will drive innovation … capability maturation roadmaps, and modernization strategies. Design and support analytics and data platforms that drive Zero Trust decision-making and continuous diagnostics. Ensure solutions meet enterprise compliance and security standards through expert knowledge in cybersecurity operations and engineering. Deliver compelling presentations, briefings, and whitepapers to senior stakeholders, effectively communicating complex, technical concepts in business terms. Leverage advanced cloud … and cloud-native security. Hands-on experience with cybersecurity compliance, operations, or engineering. Expertise in innovative cybersecurity capabilities, including NGFW, AI/ML, Big Data analytics, and automated security orchestration. Strong experience working with AWS, Azure, or GCP environments. Ability to effectively brief and communicate complex technical topics to senior-level DoD officials and executive stakeholders. Excellent verbal More ❯
be able to Join the ELEVI you will need- You must be willing to work in the Annapolis Junction, MD area. You must have a current or active securityclearance with a polygraph. Over the last 20+ years, you have gained demonstrated experience in planning and leading Systems Engineering efforts. Bachelor's degree in System Engineering, Computer Science More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
AltView Analytics
Location: Redstone Arsenal Currently on-site with the potential for hybrid work (at the discretion of the customer) Clearance: Active Secret Clearance required Job Overview: AltView Analytics is seeking a highly skilled Financial Business Analyst with strong critical thinking skills More ❯
degree in science, Technology, Engineering, or Mathematics (STEM), and a minimum of 5 years of prior relevant experience, unless prohibited by local laws/regulations Have a CompTIA Security + Certification - Linux Demonstrated system engineering lifecycle experience developing or testing large software systems Leading test events, customer demos, test team coordination, modifying and creating test procedures, ad hoc More ❯
SecurityClearance: Active TS/SCI with FS Polygraph Required Position Seeking a Data Analyst to support an Intelligence Client. Required Demonstrated experience in two or more of the following disciplines: Business analytics Statistics Data verification and validation Data visualization Experience in applying qualitative and quantitative data analysis methods to business analytics problems Experience creating data visualization mockups More ❯
We have proven track record of successfully providing innovative technology services and solutions on highly mission-focused programs; all while enjoying what we do at the same time. Security is our priority; together, we will make the nation a safer place. Benefits at Navstar Highly Competitive Health Care Premiums, including 100% employer paid for employee Flexible Spending Accounts More ❯
in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy and manage machines with VMware, vCenter, Kickstart, Puppet … Foreman, and CIS-CAT Manage and configure host-based security systems. Experience with DevOps methodologies and tools, supporting Infrastructure as Code (IaC) within RHEL containers. Use monitoring and logging tools, such as Prometheus, Grafana, ELK, IBM NetCool, and Solarwinds. Patch and manage systems using Red Hat Satellite Server. Provide hardware support for servers and workstations. Experience/knowledge More ❯