In this role, the selected candidate will provide systems engineering service support/advisement in the deployment and integration of mission, enterprise, and Intelligence Community (IC) capabilities into the customer baseline.
In this role, the candidate will develop automated solutions with using various automation platforms and Oracle APEX in order to increase test coverage and improve efficiencies across the organization.
In this role, the selected candidate will ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
This position also requires an understanding of business systems and industry requirements. Duties include planning, gathering requirements, developing reports, conducting and executing the analysis of complex problems to be solved with improved business processes and/or system enhancements/automation.
In this role, the selected candidate will provide technical guidance to software testers to help them embrace change as new test automation tools are introduced; lead key technical testing areas that require expertise beyond functional software testers.
In this role, you will manage the approved repository workflow and ensure the proper working groups are assigned to appropriate workflow roles by proactively shepherding requests through the process to ensure timely completion.
In this role, the selected candidate performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and software specifications.
In this role, the selected candidate will evaluate and audit critical training and inspection processes, policies and procedures to ensure that performance and quality standards conform to established requirements.
In this role, the selected candidate must have expertise and experience in performing security assessment of network devices (router, switch, firewall configuration), servers, workstations, Web applications and databases.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis