Secure Communications Specialist (TS/SCI) 

In by admin

Minimum Qualification * Currently holds TS/SCI clearance and holds, or able to obtain, DHS suitability. *  Bachelor’s degree in a technical discipline from an accredited College or University is required along with 2+ years of experience. *  Certified in COMSEC electronic key management systems and local site key management policies. *  Experience with providing COMSEC support including key management, key …

Software Test Engineer

In by admin

Job Summary: Create and run manual test cases against our web interfaces and APIs. Participate in the implementation of testing best practices and principals and promote them across the organization. Identify bugs and track issues to resolution. Provide technical expertise in defect analysis and work with different teams to resolve issues. Drive efficiencies and improvements in the QA process. Role …

Senior FRCS Development Engineering

In by admin

Network Engineer/Manager Expertise – The candidate shall provide network engineer expertise and shall be responsible for the following:  Control Systems Administration Expertise – The candidate shall provide expertise on configuration, maintenance, management, and cyber security compliance associated with the all FRCS, IT, and other networking components. The candidate shall provide control system expertise and use best practices and industry knowledge …

Senior Risk Analysis Development Engineering

In by admin

Cyber Security/Computer Network Systems Support – The candidate shall collaborate with the Government to help identify, access, analyze, and manage cyber risk to protect the integrity, availability, authenticity, non-repudiation, resiliency, and confidentiality of data. Support activities include the assessment, maintenance and restoration of information systems incorporating protection, detection, and reaction capabilities. The candidate shall perform the following: 1) application of …

Cyber Security Engineer

In by admin

Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of doctrine and policies. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures