In this role, the selected candidate will provide systems engineering service support/advisement in the deployment and integration of mission, enterprise, and Intelligence Community (IC) capabilities into the customer baseline.
In this role, the selected candidate will provide leadership and technical guidance in the area of Telecommunications and IT infrastructure including but not limited to management of projects, developing/maintaining technical standards to support reliable, secure communications services to electrical substations, distribution line devices, and field resources.
In this role, you will provide Information Assurance (IA) support to a large federal client. Function as an IA network security subject matter expert and provide Assessment and Authorization (A&A) support.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis
In this role, the selected candidate will provide technical guidance to software testers to help them embrace change as new test automation tools are introduced; lead key technical testing areas that require expertise beyond functional software testers.
In this role, you will manage the approved repository workflow and ensure the proper working groups are assigned to appropriate workflow roles by proactively shepherding requests through the process to ensure timely completion.
The Security Engineer will be responsible for implementation, operations, and maintenance of information security interfaces in complex security systems and applications; evaluates Internet-wide security threats in relation to internal systems.
In this role, the selected candidate will ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
In this role, the successful candidate will develop and maintain automated information technology security monitoring and reporting mechanisms; develops and maintains various network security control systems such as firewalls, intrusion detection/protection systems, wireless networks, remote access, proxy servers, anti-virus solutions, and network account access.
In this role, the selected candidate must have expertise and experience in performing security assessment of network devices (router, switch, firewall configuration), servers, workstations, Web applications and databases.