Welcome to the TekSynap careers page! At TekSynap, we are Doing IT Different! Our mission is to challenge norms, redefine innovation, and create unique solutions that transform the technology landscape. We embrace the mission in order to inspire change and deliver unparalleled value to our clients and partners.
After applying, you can expect to hear from an employment manager within 48 hours. If you are considered for a position, an initial interview will be requested. During the conversation, the employment manager will review your background, qualifications, TekSynap benefits and answer your questions. Most roles also involve at least one additional conversation with the hiring manager.
Are you a current employee? Visit our internal portal via TekJobs.
Click column header to sort
RESPONSIBILITIES
-
Apply expertise in computer security, military system specifications, and DoD cybersecurity policies to secure classified and unclassified networks.
-
Lead the implementation of the Risk Management Framework (RMF) and develop boundary defense strategies using various IA-enabled appliances, including:
-
RESPONSIBILITIES
- Perform system hardening on DoD information systems in compliance with DoD cybersecurity policies.
- Apply and validate Security Technical Implementation Guides (STIGs) to ensure secure configurations.
- Conduct vulnerability assessments using the Assured Compliance Assessment Solution (ACAS)...
RESPONSIBILITIES
- Support the system hardening of DoD systems through secure configuration and implementation of best practices.
- Apply and validate Security Technical Implementation Guides (STIGs) to ensure system compliance.
- Conduct vulnerability scans using the Assured Compliance Assessment Solution (ACAS)...
RESPONSIBILITIES
- Conduct meetings with Stakeholders to clarify and understand business requirements.
- Establish the high-level sprint schedule.
- Create, design, update, document and implement logical and physical database changes.
- Design and implement design solutions based on industry best...
Responsibilities and Qualifications
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
-
Responsibilities and Qualifications
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
-
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Apply expert knowledge of DoD cybersecurity policies, military system specifications, and computer security best practices to secure Navy systems.
- Support the implementation of Risk Management Framework (RMF), including boundary defense, A&A packages, and continuous monitoring.
- Configure and manage IA-enabled appliances, including Firewalls, IDS/IPS, Routers/Switches, Cross Domain Solutions...
RESPONSIBILITIES
- Collaborate with key personnel to ensure proper storage and protection of COMSEC material, in compliance with DoD and Navy standards.
- Coordinate and support monthly and annual COMSEC management activities, audits, and rekeying operations.
- Track and manage Controlled Cryptographic Item (CCI) equipment and rekey statuses to ensure compliance and operational readiness.
-
RESPONSIBILITIES
- Collaborate with key personnel to ensure proper storage and protection of COMSEC material, in compliance with DoD and Navy standards.
- Coordinate and support monthly and annual COMSEC management activities, audits, and rekeying operations.
- Track and manage Controlled Cryptographic Item (CCI) equipment and rekey statuses to ensure compliance and operational readiness.
-
RESPONSIBILITIES
- Design, implement, configure, and enforce network security controls across routers, switches, firewalls, and endpoint devices.
- Manage enterprise-level Active Directory (AD) deployments and security configurations.
- Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool and implement mitigation strategies.
-
RESPONSIBILITIES
- Lead and execute complex Red Team penetration tests and cyber adversary emulation operations.
- Design, develop, and employ offensive tools using platforms such as Metasploit, NMAP, Kali Linux, and Cobalt Strike.
- Emulate threat actor TTPs based on MITRE ATT&CK, APT profiles, and emerging threat intelligence.
- Conduct...
RESPONSIBILITIES
- Plan, execute, and document full-scope penetration tests and adversary emulation exercises.
- Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike.
- Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK.
- Conduct assessments across...
RESPONSIBILITIES
- Plan, execute, and document full-scope penetration tests and adversary emulation exercises.
- Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike.
- Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK.
- Conduct assessments across...
RESPONSIBILITIES
- Design, develop, and deploy offensive cyber tools to support Red Team and penetration testing engagements.
- Conduct advanced exploitation activities to simulate adversary tactics, techniques, and procedures (TTPs).
- Reverse engineer software and systems to identify vulnerabilities and create proof-of-concept exploits.
-
RESPONSIBILITIES
- Perform system hardening on Windows and Linux platforms to reduce security risks.
- Conduct vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool.
- Analyze and apply vendor security patches, configuration changes, and remediation plans for vulnerability findings.
- Design, implement, and...
RESPONSIBILITIES
- Provide leadership and oversight for all aspects of contract performance across multiple task areas, including cybersecurity engineering, RMF implementation, network defense, test and evaluation, and lifecycle support.
- Ensure delivery of contract requirements in accordance with Navy cybersecurity policies, directives, and NIST guidance.
- Supervise...
This position will work with Space Development Agency personnel to provide operations and maintenance of as-built AV systems throughout the SDA’s area of responsibilities, as well as