, but are not limited to: You will help drive critical network exploitation efforts and enable enhanced operational awareness through the... a motivated, career and customer-oriented Digital Network Exploitation Analyst to join our team in Annapolis Junction, MD...
**This position is contingent on contract award** Description: Performs network services from network design... users and sites to resolve network or system incidents. Translates business requirements into telecommunications (e.g., LAN...
Description: The Level 2 Network Engineer is responsible for the full lifecycle of network services, including design..., implementation, maintenance, and upgrades of existing network infrastructure. This role involves analyzing technical specifications...
Description The Level 3 Risk Management Framework (RMF) Coordinator is responsible for integrating risk management... and technical risks across systems and enclaves. The coordinator ensures risk mitigation strategies, deadlines, and progress...
Security clearance Drug test Yes Position sensitivity and risk Trust determination process Financial disclosure... operational effectiveness through a consistent project management approach. Reviews and recommends improvements to plans...
information systems security policies, standards, and methodologies. Maintains operational security posture for an information.... Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management...
in software, hardware, communications and security, and leveraging decades of operational experience to deliver exceptional value... policies, and driving proactive risk management across enterprise-level networks and systems. Key Responsibilities Lead...
systems. With a proven track record in information security, project management, systems/network engineering, security risk... to deliver robust system designs and operational efficiency. Establish and implement best practices for system security...
, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security... security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support...
in information security, project management, systems/network engineering, security risk management, vulnerability assessments... and operational effectiveness. Develop, maintain, and enforce best practices for system security, monitoring, and documentation...
(STE) and secure the network (STN) requirements. Advise management on risk levels and security posture. Advise appropriate leadership... such as System Security Plans (SSPs), Risk Assessment Plans, Implementation Plans, and Plans of Action & Milestones (POA&Ms). Manage...
and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational... deployment, and support of key systems. With a proven track record in information security, project management, systems/network...
/storage/network devices, mobile devices, etc. Provide Tier 1 (Help Desk) and Tier 2 (Escalation) problem identification... integrity and configure network components along with implementing operating systems enhancements to improve reliability...
, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation... in Computer Science or IT Engineering. Knowledge of the Risk Management Framework and at least one (1) year experience...
such as Wireshark Deep knowledge of the OSI network stack and associated protocols across layers 2-7. All protocol stacks for data... inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support...
) of developmental and operational systems. Work on developmental and operational teams to create and maintain configuration baselines... (development, test, production, etc.) supporting developmental and operational systems. Use or recommend automated CM tools...
systems security policies, standards, and methodologies. Maintain operational security posture for an information system... vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information...
systems security policies, standards, and methodologies. Maintain operational security posture for an information system... vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information...
drawings, operational procedures to understand and blend large quantities of computer related information Produce technical... inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support...
into systems to be deployed to operational environments Prepare risk assessment, plan of actions, authorization recommendations... track record in information security, project management, systems/network engineering, security risk management...