Build security into the fabric of your digital enterprise. Our industry-leading security solutions help you predict attacks, proactively respond to threats, ensure compliance, and protect data, applications, infrastructure and endpoints.
conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/nontechnical assessment and management as well as end-to-end flow analysis.
Coordinating, as a key participant, periodic TESPR reviews with appropriate stakeholders to discuss test issues, highlighting trends, developing recommendations and methodologies to improve T&E processes, supporting T&E innovation, and identifying lessons learned.
Provides technical direction for the development, engineering, interfacing, integration, and testing of all components of complex hardware/software systems to include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis.
Design, develop, and implement test and evaluation strategies, plans and methods to assure reliability of warfare systems in conjunction with system specifications and defined system of system capabilities.
Plan, design, develop, verify, deploy and maintain IaaS components and custom software. Verify component, system integration and application level features and functionality to ensure reliability, accuracy and performance reaches quality standards.
Design, deploy, and maintain Cloud-based infrastructures for federal clients. Leverage comprehension of Cloud service offerings and customer service expertise. Apply experience in an enterprise DevOps environment.
Develop and identify technical solutions responsive to the needs of the customer; participate in the planning and execution of software installations and hardware upgrades Architecture design and systems management skills.
The Information Systems Security Engineer shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.