In this role, the selected candidate will be responsible for collaborating with sharp engineers and highly-engaged customers to secure the infrastructure, tackle complex problems, and operate a complex and mission critical system that protects and our customers.
This candidate will be responsible for working with key business stakeholders to map processes for further functionalities and translate them into technical design. Responsibilities will include leading meetings for training purposes, designing solutions for enhancements of the system as well as for operationalizing data from multiple legacy systems.
As a Technical Program Manager, you will be the primary point of contact for internal customers and partners. You will engage customers to understand and document business requirements, drive solution design and manage implementation programs.
The Technical Project Manager will manage multiple projects with highly talented, cross-functional engineering teams in delivering enterprise application software and systems primarily focused on Signal Intelligence (SIGINT) and RF geolocation applications supporting multiple Department of Defense (DoD) and other Intelligence Community customers.
As a Technical Program Manager, you will be the primary point of contact for internal customers and partners, engage customers to understand and document business requirements, drive solution design and manage implementation programs.
PM will work with higher level program/project manager(s) while directing the telephone system replacement to include all required surveys, assessments, deliverables throughout the project life cycle, and transition the program to maintenance support.
To help you find the most relevant
jobs, we've come up with an approximate compensation for this
position. This is based on similar jobs with compensation
$90K to $120K -Austin, TX
In this role, you will work independently, seeking guidance as needed. You partner with the manager and other engineering teams to deliver complex/cross-functional projects in the information security field.