Welcome to the TekSynap careers page! At TekSynap, we are Doing IT Different! Our mission is to challenge norms, redefine innovation, and create unique solutions that transform the technology landscape. We embrace the mission in order to inspire change and deliver unparalleled value to our clients and partners.
After applying, you can expect to hear from an employment manager within 48 hours. If you are considered for a position, an initial interview will be requested. During the conversation, the employment manager will review your background, qualifications, TekSynap benefits and answer your questions. Most roles also involve at least one additional conversation with the hiring manager.
Are you a current employee? Visit our internal portal via TekJobs.
Click column header to sort
RESPONSIBILITIES
- Design, implement, and maintain secure network infrastructure, enforcing security controls across hardware, software, and network components.
- Conduct STIG implementation to ensure systems meet DoD security compliance standards.
- Configure and manage Active Directory environments to support secure...
RESPONSIBILITIES
-
Apply expertise in computer security, military system specifications, and DoD cybersecurity policies to secure classified and unclassified networks.
-
Lead the implementation of the Risk Management Framework (RMF) and develop boundary defense strategies using various IA-enabled appliances, including:
-
RESPONSIBILITIES
- Perform system hardening on DoD information systems in compliance with DoD cybersecurity policies.
- Apply and validate Security Technical Implementation Guides (STIGs) to ensure secure configurations.
- Conduct vulnerability assessments using the Assured Compliance Assessment Solution (ACAS)...
RESPONSIBILITIES
- Support the system hardening of DoD systems through secure configuration and implementation of best practices.
- Apply and validate Security Technical Implementation Guides (STIGs) to ensure system compliance.
- Conduct vulnerability scans using the Assured Compliance Assessment Solution (ACAS)...
RESPONSIBILITIES
- The preparation of equipment configurations and validation of configurations for new installations, changes within the network, software upgrades for Server/Core Switches
- Understand equipment capabilities to follow fault diagnosis procedures to support effective fault resolution for Server/Core Switches
- Understand equipment capabilities to follow...
RESPONSIBILITIES
- Oversee the administration, configuration, and maintenance of Linux workstations, VMs, and supporting software in an air-gapped DevSecOps environment.
- Configure and maintain enterprise Linux administration tools such as Identity Management (IdM), Satellite, and Ansible Tower servers.
-
RESPONSIBILITIES
- Conduct meetings with Stakeholders to clarify and understand business requirements.
- Establish the high-level sprint schedule.
- Create, design, update, document and implement logical and physical database changes.
- Design and implement...
RESPONSIBILITIES
· Produces RFP shred, analysis, tracking, and posting of amendments
· Organizes and submits questions to government
· Leads proposal prep tag ups
· Responsible...
RESPONSIBILITIES
· Coordinate proposal meetings and administrative tasks
· Follow up on deliverables throughout the proposal process
· Conduct proposal database and SharePoint management activities
BOEM and BSEE are responsible for managing the nation’s offshore energy, minerals, and natural resources on the Federal Outer Continental Shelf (OCS). BSEE promotes safety, protects the environment, and conserves resources offshore through vigorous regulatory oversight and enforcement. BOEM manages the responsible exploration and development of offshore energy and marine mineral resources on the OCS. OCS production accounts for about 18 percent of domestic crude oil and four percent of domestic natural gas supply.
Responsibilities and Qualifications
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
-
Responsibilities and Qualifications
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
-
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Collaborate with key personnel to ensure proper storage and protection of COMSEC material, in compliance with DoD and Navy standards.
- Coordinate and support monthly and annual COMSEC management activities, audits, and rekeying operations.
- Track and manage Controlled Cryptographic Item (CCI) equipment and rekey statuses to ensure compliance and operational readiness.
-
RESPONSIBILITIES
- Collaborate with key personnel to ensure proper storage and protection of COMSEC material, in compliance with DoD and Navy standards.
- Coordinate and support monthly and annual COMSEC management activities, audits, and rekeying operations.
- Track and manage Controlled Cryptographic Item (CCI) equipment and rekey statuses to ensure compliance and operational readiness.
-
RESPONSIBILITIES
- Design, implement, configure, and enforce network security controls across routers, switches, firewalls, and endpoint devices.
- Manage enterprise-level Active Directory (AD) deployments and security configurations.
- Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool and implement mitigation strategies.
-
RESPONSIBILITIES
- Lead and execute complex Red Team penetration tests and cyber adversary emulation operations.
- Design, develop, and employ offensive tools using platforms such as Metasploit, NMAP, Kali Linux, and Cobalt Strike.
- Emulate threat actor TTPs based on MITRE ATT&CK, APT profiles, and emerging threat intelligence.
- Conduct...