In this role, you will be responsible to manage projects to ensure successful design and delivery of it services. Lead user acceptance testing and testing of new system functionalities. Create and maintain system and user documentations, develop procedures and perform end-user training/support.
In this role, you will determines resources available to support enforcement of security processes in conformance with applicable information security policies, standards, procedures and controls. Identifies information security opportunities and recommends process or technology enhancements.
In this role, the selected candidate will serve as liaison with representatives of the Services and other DHA agencies in order to obtain expert input, validate requirements and promote understanding of PHP program initiatives and outcomes, in particular with regards to suicide prevention.
In this role, you will provide subject matter expertise for military test events and real world scenarios by conducting research, studies, and interoperability analyses to provide supporting data and associated recommendations to advise our Sponsors.
In this role, you will be responsible to lead or participate in analyses to evaluate undersea warfare system performance against diverse threats to identify impacts on mission, operations effectiveness or survivability. Explore alternative solutions utilizing technology, operational behavior, materiel, tactics or doctrine.
In this role, you will be responsible for assessing disn subscriber environment security posture and topology, reviewing security relevant documentation, and preparing technical papers discussing the results of this analysis.
In this role, you will contribute to the development and analysis of the next generation Airborne Collision Avoidance System (ACAS), to be fielded into the US and European air traffic control systems within 10 years.
This position will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, the selected candidate will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
In this role, you will document and communicate effectively with customers and internal teams, assist in the investigation of events and follow-up with corrective actions and reporting. recognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
In this role, the selected candidate will perform analyses to identify, define, and document technical data for weaponing, NATOPS, and NTRP (NATIP) products for naval tactical aircraft and associated weapons systems.
In this role, you will provide business application support and plans for rollout of enhancements to existing applications. Defines system requirements, priorities, and recommends viable alternatives. Coordinates the efforts of internal and external team members to locate, assess, install, test, and maintain applications.
In this role, the selected candidate will develop and document policy and support as it relates to Service Desk operations; verify with the end-user that the issue(s) has been resolved and update the ticketing system with triage/resolution specifics.
In this role, you will monitor subcontractor configuration control, requirements management, technical challenges, and cost changes which could negatively impact both the subcontractors and Prime's cost and schedule performance.