In this role, the selected candidate will assist on activities such as site surveying, system drawing development, technical write ups, equipment and software identification, quality control, and system testing.
In this role, the selected candidate will design, develop and implement database designs from the ground up to stage, modify and load data received from various sources; create stored procedures for and with development group for use in enterprise application.
In this role, you will provide on - site Information Assurance and systems engineering support to the U.S. Army Program Manager, Unmanned Aircraft Systems ( PM UAS ) under the Common Systems Integration ( CSI ) Product Manager.
In this role, you will be rsponsible for the design, development, implementation, and/or integration of a DOD IA architecture, system, or system component for use within CE (computing environment), NE (network environment), and/or enclave environments.
In this role, the candidate will participate in attack and penetration testing exercises of company infrastructure and assets to improve and ensure confidentiality, integrity and availability of all company infrastructure and data.
In this role, you will artifact generation, requirements analysis, Security Test and Evaluation ( ST & E ) plans and execution, risk assessments, systems analysis and hardening, incident response and policy analysis, trusted product evaluations, and security posture presentations.
In this role, you will test any commercial-off-the-shelf (COTS) items to ensure they are compliant with an appropriate collaborative protection profile (cPP) aligned with the National Information Assurance Partnership (NIAP) certification Common Criteria Evaluation.
In this role, you will perform assessments of operating systems, applications, databases and network infrastructure components to detect and classify vulnerabilities for the purpose of trend analysis and reporting to Enterprise customers through the use of tools and methodologies.
In this role, you will assist in the attack and penetration testing of company owned assets to perform information gathering, vulnerability detection analysis and exploitation planning, and results reporting to remediate exploits and ensure confidentiality, integrity and availability of mission critical information assets.