Click column header to sort
RESPONSIBILITIES
- Perform initial discovery efforts, defining data collection requirements based on inputs needed to develop a successful migration plan
- Utilize advanced data analysis techniques and benchmarks to define the future state migration plan, and the pre-migration activities necessary to close gaps
- Forecast backend infrastructure needs resulting from the migration...
RESPONSIBILITIES
- Plan and design secure network solutions to consolidate connectivity services under an enterprise service.
- Partner with key stakeholders and technical experts to perform legacy environment discovery, assessing current capabilities, configurations, and unique requirements to develop a design and architecture leveraging approved design patterns.
-
RESPONSIBILITIES
- Monitor VTC calls for senior leaders as part of the white glove monitoring service for scheduled SIPR and NIPR VTC calls.
- Provide support for DLA Information Operations by performing active and passive call monitoring, utilizing TMS, CMS, CMM for conference control and scheduling, while adhering to current STIG’s.
- Assign additional...
RESPONSIBILITIES
- Monitor VTC calls for senior leaders as part of the white glove monitoring service for scheduled SIPR and NIPR VTC calls.
- Provide support for DLA Information Operations by performing active and passive call monitoring, utilizing TMS, CMS, CMM for conference control and scheduling, while adhering to current STIG’s.
- Assign additional...
RESPONSIBILITIES
- Monitor VTC calls for senior leaders as part of the white glove monitoring service for scheduled SIPR and NIPR VTC calls.
- Provide support for DLA Information Operations by performing active and passive call monitoring, utilizing TMS, CMS, CMM for conference control and scheduling, while adhering to current STIG’s.
- Assign additional...
RESPONSIBILITIES
- Monitor VTC calls for senior leaders as part of the white glove monitoring service for scheduled SIPR and NIPR VTC calls.
- Provide support for DLA Information Operations by performing active and passive call monitoring, utilizing TMS, CMS, CMM for conference control and scheduling, while adhering to current STIG’s.
- Assign additional...
RESPONSIBILITIES
- Provide support for DLA Information Operations AV/VTC equipment, including:
- AV/VTC network connections and controllers
- Wired/wireless interfaces
-
RESPONSIBILITIES
Responsible for all aspects of the development and implementation of assigned projects and provides a single point of contact for those projects. Takes projects from original concept through final implementation. Interfaces with all areas affected by the project including end users, computer services, and client services. Defines project scope and objectives. Develops detailed work plans, schedules, project estimates, resource plans, and status reports. Conducts project meetings and is responsible for project tracking and...
RESPONSIBILITIES
Responsible for the operational planning, establishment, execution, and evaluation of a multifaceted program/project typically consisting of a set of closely related subprograms or associated activities. Oversees fiscal, operational, administrative, and human resources management of the program; seeks and develops outside funding sources, serves as principal point of representation and liaison with external constituencies on operational matters, and provides day-to-day technical/professional guidance and leadership as...
RESPONSIBILITIES
Responsible for leading security event monitoring and correlation within a tiered Security Operations Center. Proven experience and ability to leverage CND analyst toolsets to detect and respond to IT security incidents. Ability to implement standard procedures for incident response interfacing with Information Security Officer and IT staff. Conducts research and document threats and their behavior to include monitoring external CSIRTS/CERTs. Provide recommendations to threat mitigation strategies. Employ effective web,...
RESPONSIBILITIES
Provides daily supervision and direction to staff who are responsible for phone and in-person support to users in the areas of E-mail, directories, standard Windows desktop applications, and other network services. Manages, personnel who serve as the first point of contact for troubleshooting hardware and software PC and printer problems.
REQUIRED...
RESPONSIBILITIES
- Responsible for leading and participating in analysis of actual and predictable interacting operational activities of business to obtain a quantitative, rational basis for decision making through the application of logic and scientific or economic disciplines and techniques. Demonstrate a complete understanding and wide application of technical principles, theories, and concepts within the Cyber Research field.
- Identifies and assesses the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.
-
RESPONSIBILITIES
- Analyzes data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
- Guides preparation of the operational environment, responding to requests for information, and submitting intelligence collection and production requirements for intelligence planning and operations.
- Identifies collection authorities and environment; incorporating priority information requirements into intelligence collection management; developing concepts to meet leadership's intent. Determines capabilities of available intelligence...
RESPONSIBILITIES
- Under general direction, leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies. Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics. Requires experience with application security, network security, reverse engineering, or malware....
RESPONSIBILITIES
- Lead a large matrixed organization across a complex portfolio of technical programs integrating and enforcing ITIL best practices.
- Responsible for using current information security technology disciplines and practices to ensure the confidentiality, integrity and availability of corporate information assets in accordance with established standards and procedures. Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout the organization.
-
RESPONSIBILITIES
- Responsible for using current information security technology disciplines and practices to ensure the confidentiality, integrity and availability of information assets in accordance with established standards and procedures. Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout the organization.
- Engages appropriate levels of leadership to make and execute decisions...
RESPONSIBILITIES
Provides daily supervision and direction to staff who are responsible for phone and in-person support to users in the areas of E-mail, directories, standard Windows desktop applications, and other network services. Manages personnel who serve as the first point of contact for troubleshooting hardware and software PC and printer problems.
REQUIRED QUALIFICATIONS
- Active TS/SCI clearance with T5 investigation
- BS in technical field and at least 12 years of program management experience (some PM experience may originate in the military, but the candidate must have at least 10...
RESPONSIBILITIES
Responsible for activities related to virtual and cloud solution administration.. Assigns personnel to various projects, directs their activities, and evaluates their work. Ensures long-term requirements of systems operations and administration are included in the overall information systems planning. Responsible for the installation, maintenance, configuration, and integrity of computer software. Implements operating system enhancements that will improve the reliability and performance of the system.
RESPONSIBILITIES
Responsible for activities related to system administration. Assigns personnel to various projects, directs their activities, and evaluates their work. Ensures long-term requirements of systems operations and administration are included in the overall information systems planning of the organization. Responsible for the installation, maintenance, configuration, and integrity of computer software. Implements operating system enhancements that will improve the reliability and performance of the system.
REQUIRED QUALIFICATIONS
- Active Secret clearance with T5...
RESPONSIBILITIES
- Responsible for activities related to system administration. Assigns personnel to various projects, directs their activities, and evaluates their work. Ensures long-term requirements of systems operations and administration are included in the overall information systems planning of the organization. Responsible for the installation, maintenance, configuration, and integrity of computer software. Implements operating system enhancements that will improve the reliability and performance of the system.
-