“Y’all are the first company I’ve actively thrown people at. Other places were -Eh, they pay you to just ignore the front office.” – Team Member

Requirements:
- HPC Architecture: Requirements work, system design, and architecture; Architecture documentation, to-be plan planning, transition planning
- Technical Configuration Mgmt: Technology Roadmap planning
- Overarching H/W Requirements: Technical CONOPS, use cases, and pilot plan development
Familiarity with IC Cloud Computing to include:
- Familiarity with the mission platform, the broad range of Capabilities products and services, and the functionality of the IC Cloud.
- Experience with researching, developing and documenting best practices related to migration and transformation of existing products to new IT hosting technologies.
- Experience with guiding and managing the risks associated with these migrations.
- Experience with researching and provide guidance related to the NSA IT security requirements.
- Experience developing briefings on technical topics relating to the migration process.
- Experience with DoD 500 Phase A activities (requirements gathering, analysis of alternatives, DoDAF, cost estimation, scheduling, etc).
Job Features
Requirements: Familiarity with IC Cloud Computing to include:
DESCRIPTION:
Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
- Salary Range: $140,000-$170,000
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security).
Level 3- Doctoral degree with 4 years, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks…
Task Description:
The Software Engineer shall be responsible for developing rapid experimental prototypes of particular capabilities associated with the improvement and modernization of metrics and monitoring capabilities within the Y33 organization. Tasking shall also include demonstrations to validate concepts and to prove operational capability and scalability.
Task Required Skills:
- Experience using the Linux CLI
- Experience developing scripts using Bash/Python
- Experience developing with multiple high level programming languages in a Linux environment
- Experience with metrics collection, monitoring, and alerting concepts, best practices, and tools
- Experience with software frameworks used for searching, monitoring, and analyzing big data such as Elastic Stack, Splunk, and Prometheus
- Experience developing with messaging frameworks such as Kafka, JMS, RabbitMQ, ActiveMQ
- Experience with SQL technologies such as MySQL, MariaDB, and PostgreSQL
- Experience with Key/Value and Time-series databases such as OpenTSDB
- Experience designing, implementing, and consuming REST/and or gRPC interfaces
- Experience with CI/CD concepts, principles, methodologies, and tools such as GitLab CI
SWE-3 Qualifications:
Master’s degree in Computer Science or related discipline from an accredited college or university, plus five (5)
years of experience as a SWE, in programs and contracts of similar scope, type, and complexity.
OR
Bachelor’s degree in Computer Science or related discipline from an accredited college or university, plus seven (7) years of experience as a SWE, in programs and contracts of similar scope, type, and complexity
OR
Nine (9) years of experience as a SWE, in programs and contracts of similar scope, type, and complexity.
Job Features
Task Description: The Software Engineer shall be responsible for developing rapid experimental prototypes of particular capabilities associated with the improvement and modernization of metrics and mo…
DESCRIPTION:
Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
- Salary Range: $118,000-$136,000
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security).
LEVEL 2:
Doctoral degree with 2 years, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks…
Qualifications:
Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree. CWIP: IAM Level II Certification
Five (5) years’ experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
Experience is to include at least one (1) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
Two (2) years’ experience using the LINUX, UNIX, Widows, or Cisco Operating System
Two (2) years’ experience in the SIGINT environment performing ISSO responsibilities
Job Features
Qualifications: Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substitute…
Qualifications:
Bachelor’s degree in a technical discipline from an accredited college or university is required. Five (5) years of DBE experience may be substituted for a bachelor’s degree. CWIP: IAT Level I Certification, IA Baseline in the Oracle Database Management System.
Five (5) years’ experience as a DBE in programs and contracts of similar scope, type, and complexity.
Four (4) years’ experience developing, configuring, troubleshooting, monitoring, administering, updating, and testing Oracle databases.
Three (3) years’ experience with SQL development relevant to Oracle databases.
Three (3) years’ experience developing on Linux, Unix, Windows, or Cisco OS operating system.
Two (2) years’ experience developing databases to be executed on Linux, Unix, Windows, or Cisco OS operating system.
One (1) year experience with the SIGINT environment.
Familiarity with SIGINT security rules.
Job Features
Qualifications: Bachelor’s degree in a technical discipline from an accredited college or university is required. Five (5) years of DBE experience may be substituted for a bachelor’s degree. CWIP:…
Position Overview:
The candidate will join a seasoned team of fellow developers developing modular code that interfaces with a large scale framework.
Required Experience:
• Strong proficiency in C++ and Python
• In-depth understanding of OS internals
• In-depth understanding of network protocols
• Familiarity with modern software engineering concepts
• Knowledge of common CNO techniques
Job Features
Position Overview: The candidate will join a seasoned team of fellow developers developing modular code that interfaces with a large scale framework. Required Experience: • Strong profici…
DESCRIPTION:
Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
Characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and mission supported by those systems.
Compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the technologies being studied.
- Salary Range: $140,000-155,000
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security.
LEVEL 3:
Doctoral degree with 4 years, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms. Chara…
Role Description:
The SE will be part of a team that creates solutions for several technologies, Linux, storage, virtualization, and network. This role will analyze the requirements, gather additional requirements, design, plan, and build architectures as needed. This role will serve in a Tier 3/4 troubleshooting capacity as needed.
From a system engineering perspective, this role will work within a team to design and develop solutions; provide technical leadership for the integration of requirements, design, and technology. Also, develop system architecture and system design documentation. Work with vendors as needed.
Qualifications:
Twenty (20) years experience as a SE in programs and contracts of similar scope, type and complexity is required. Bachelor’s degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Five (5) years of additional SE experience may be substituted for a bachelor’s degree.
Also, must have seven (7) years of the following:
- QA, CM
- Manage requirements and requirements process
- Applying risk management principles
- System test programs
- Troubleshooting, monitoring
- Scripting bash/python
- System architecture
- UNIX, Linux, Windows
- MS Office
Requirements:
- Must have completed and remain current on all Cyberspace Workforce Improvement Program (CWIP) certification requirements. Level I required at start and must obtain Level II within 6 months after start.
- Understanding of UNIX, LINUX platforms
Desired Skills:
- System engineering experience with Linux, storage, virtualization, network technologies
- Working with product vendors
- System integration/administration experience
- Lab Support
- Atlassian (Jira, Confluence, Bamboo, etc.)
Job Features
Role Description: The SE will be part of a team that creates solutions for several technologies, Linux, storage, virtualization, and network. This role will analyze the requirements, gather addit…
DESCRIPTION:
The candidate will be joining an existing fast paced team focused on Security Research for Mobile technologies. The candidate needs to be experienced with Mobile systems and have experience and recent exposure to the latest security implementations for Mobile platforms. The candidate will need depth of understanding with current security research and open source security flaws (CVEs). The candidate will support the research and development on Mobile platforms, providing crisp documentation that is easy to understand for our customers.
REQUIREMENTS:
- Experience researching and developing in a mobile environment (e.g.; Android, Apple) and understand the underlying OS Internals
- Experience with Python and C development
- Exposure to Mobile development environments and debugging tools (XCode, ADB, etc.).
- Experience reading and writing Assembly
- Demonstrated ability to self-drive research tasking
- Experience with remote debugging (ADB, GDB, etc.)
Job Features
DESCRIPTION: The candidate will be joining an existing fast paced team focused on Security Research for Mobile technologies. The candidate needs to be experienced with Mobile systems and have ex…
Position Overview:
- Support IC Cloud activities to include external engagements, working groups, periodic technical reviews, and actions; and internal Govt system engineering actions, working groups, and activities.
- Coordinate with Capabilities and Architecture team and technical leaders across the organization initiatives to include architecture modernization, security enhancements, and incorporation of new requirements.
- Facilitate engineering efforts to add system instrumentation across IC GovCloud to support enhanced metrics, mission impact insight, and Fee-for Service initiatives.
- Coordinate with IC Gov Cloud Program Managers, Outreach teams, and other stakeholders, internal and external, to support programmatic activities and reviews, strategic planning activities, customer engagement, and related activities
Job Features
Position Overview:
Requirements:
- Act as a SETA contractor, advising HPCS as a Network Technical expert
- Provide architecture guidance across HPCS for all networking activities
- Participate in non-disclosure activities and advise HPCS on technical feasibility and any potential issues
- Actively research open networking technologies that would be feasible for HPC and for any projects of significant scale
- Advise HPCS and assist in troubleshooting any operation issues (while maintaining the ability privileged access)
- Provide guidance and participate in the development of deployment, orchestration, and monitoring strategies for large scale networks
- Participate in Cooperative Research Activities where large scale networking is involved
Job Features
Requirements:
(U) Requirements:
- (U) Installs, tests, and validates operational software as specified by installation standards, manufacturer’s guidance and safety codes; Maintains a broad knowledge of the system.
- (U) Installs, tests, and validates operational equipment and software as specified by installation standards, manufacturer’s guidance and safety codes; maintains a broad knowledge of the system; Acts as a lead technician for program production.
(U) Qualifications:
- SIGINT Experience Desired: At least three years of direct experience with an intelligence community or signals intelligence activity.
(U) Education Requirement:
- Bachelor’s Degree in Communications Engineering, Computer Engineering, Computer Science, Electrical Engineering, Information Systems, Mathematics or similar degree or equivalent documented combination of training and experience.
(U) General Experience Requirement:
- Minimum ten years experience integrating systems using multiple operating systems;
- Experience performing all aspects of the integration and test of the system including installing the hardware in the racks, labeling cables, running cables, building the system to drawing package, performing quality assurance, loading operating system, loading applications, and performing all levels of testing in regard to system;
- Develop overall integration & test strategy and schedule test plans & scripts.
Job Features
(U) Requirements: (U) Qualifications: (U) Education Requirement: (U) General Experience Requirement:
(U) Requirements:
- (U) Perform systems engineering activities and assist in the preparation of a work product in Technical Process Areas associated with the ISO/IEC 15288.
- (U) Develop and deliver a work product in any of the ISO/IEC 15288 Process Areas.
- (U) Perform analysis of technical alternatives for a project and make preliminary recommendations.
- (U) Assist in performing systems engineering activities in the ISO/IEC 15288 Agreement or Enterprise Process Areas.
- (U) Perform systems engineering activities and assist in the preparation of multiple work products in Project and/or Technical Process Areas associated with any of the ISO/IEC 15288 processes.
- (U) Perform systems engineering activities and develop and deliver work products in each of the ISO/IEC 15288 Project and Technical Process Areas.
- (U) Independently analyze, and recommend alternatives for elements of project’s technical design.
- (U) Perform systems engineering activities and develop and deliver work products of either the ISO/IEC 15288 Agreement or Enterprise Process Areas.
- (U) Assist in developing a new or innovative approach to a technical or engineering issue.
- (U) Assist in conducting an evaluation to determine its suitability for project implementation.
- (U) Analyze and propose appropriate engineering standards and processes for a project.
- (U) Supervise or coordinate the work of other contractor engineers or technicians on a project.
(U) Qualifications:
- (U) A Bachelor’s degree in a Qualified Engineering Field (See Note 1) or a related discipline (See Note 2) from an accredited college or university plus ten (10) years of systems engineering experience.
- OR (U) A High School Diploma or GED plus fourteen (14) years of general systems engineering experience (any process area).
- OR (U) A Master’s degree in a Qualified Engineering Field (See Note 1) or a related discipline (See Note 2) from an accredited college or university plus eight (8) years of systems engineering experience.
- OR (U) A PhD in a Qualified Engineering Field (See Note 1) or a related discipline (See Note 2) from an accredited college or university plus eight (8) years of systems engineering experience.
*(U) Note 1 – Examples of Qualified engineering fields include: Aeronautics, Biomedical, Chemical, Civil, Computer, Electrical, Environmental, Mechanical, Nuclear, Software, Systems, and Engineering Management.
*(U) Note 2 – Examples of related disciplines include: Chemistry, Computer Science, Information Systems, Mathematics, and Physics.
Job Features
(U) Requirements: (U) Qualifications: *(U) Note 1 – Examples of Qualified engineering fields include: Aeronautics, Biomedical, Chemical, Civil, Computer, Electrical, Environmental, Mechanical, Nucle…
Requirements:
- (U) Develop or implement algorithms to meet or exceed system performance and functional standards
- (U) Assist with developing and executing test procedures for software components
- (U) Write or review software and system documentation
- (U) Develop software solutions by analyzing system performance standards, confer with users or system engineers, analyze systems flow, data usage and work processes; and investigate problem areas
- (U) Serve as a team lead at the level appropriate to the software development process being used on any particular project
- (U) Modify existing software to correct errors, to adapt to new hardware, or to improve its performance
- (U) Design, develop and modify software systems, using scientific analysis and mathematical models to predict and measure outcomes and consequences of design
- (U) Design or implement complex database or data repository interfaces/queries
Qualifications:
- (U) A Bachelor’s degree in Computer Science or related discipline from an accredited college or university and three (3) or more years experience in software development is required. An additional four (4) years of software experience on projects with similar software processes may be substituted for a Bachelor’s degree.
Job Features
Requirements: Qualifications:
Requirements:
- HPC Architecture: Requirements work, system design, and architecture; Architecture documentation, to-be plan planning, transition planning
- Technical Configuration Mgmt: Technology Roadmap planning
- Overarching H/W Requirements: Technical CONOPS, use cases, and pilot plan development
Familiarity with IC Cloud Computing to include:
- Familiarity with the mission platform, the broad range of Capabilities products and services, and the functionality of the IC Cloud.
- Experience with researching, developing and documenting best practices related to migration and transformation of existing products to new IT hosting technologies.
- Experience with guiding and managing the risks associated with these migrations.
- Experience with researching and provide guidance related to the NSA IT security requirements.
- Experience developing briefings on technical topics relating to the migration process.
- Experience with DoD 500 Phase A activities (requirements gathering, analysis of alternatives, DoDAF, cost estimation, scheduling, etc).
Job Features
Requirements: Familiarity with IC Cloud Computing to include:
DESCRIPTION:
Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
- Salary Range: $140,000-$170,000
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security).
Level 3- Doctoral degree with 4 years, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks…
Task Description:
The Software Engineer shall be responsible for developing rapid experimental prototypes of particular capabilities associated with the improvement and modernization of metrics and monitoring capabilities within the Y33 organization. Tasking shall also include demonstrations to validate concepts and to prove operational capability and scalability.
Task Required Skills:
- Experience using the Linux CLI
- Experience developing scripts using Bash/Python
- Experience developing with multiple high level programming languages in a Linux environment
- Experience with metrics collection, monitoring, and alerting concepts, best practices, and tools
- Experience with software frameworks used for searching, monitoring, and analyzing big data such as Elastic Stack, Splunk, and Prometheus
- Experience developing with messaging frameworks such as Kafka, JMS, RabbitMQ, ActiveMQ
- Experience with SQL technologies such as MySQL, MariaDB, and PostgreSQL
- Experience with Key/Value and Time-series databases such as OpenTSDB
- Experience designing, implementing, and consuming REST/and or gRPC interfaces
- Experience with CI/CD concepts, principles, methodologies, and tools such as GitLab CI
SWE-3 Qualifications:
Master’s degree in Computer Science or related discipline from an accredited college or university, plus five (5)
years of experience as a SWE, in programs and contracts of similar scope, type, and complexity.
OR
Bachelor’s degree in Computer Science or related discipline from an accredited college or university, plus seven (7) years of experience as a SWE, in programs and contracts of similar scope, type, and complexity
OR
Nine (9) years of experience as a SWE, in programs and contracts of similar scope, type, and complexity.
Job Features
Task Description: The Software Engineer shall be responsible for developing rapid experimental prototypes of particular capabilities associated with the improvement and modernization of metrics and mo…
DESCRIPTION:
Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
- Salary Range: $118,000-$136,000
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security).
LEVEL 2:
Doctoral degree with 2 years, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks…
Qualifications:
Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree. CWIP: IAM Level II Certification
Five (5) years’ experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
Experience is to include at least one (1) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
Two (2) years’ experience using the LINUX, UNIX, Widows, or Cisco Operating System
Two (2) years’ experience in the SIGINT environment performing ISSO responsibilities
Job Features
Qualifications: Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substitute…
Qualifications:
Bachelor’s degree in a technical discipline from an accredited college or university is required. Five (5) years of DBE experience may be substituted for a bachelor’s degree. CWIP: IAT Level I Certification, IA Baseline in the Oracle Database Management System.
Five (5) years’ experience as a DBE in programs and contracts of similar scope, type, and complexity.
Four (4) years’ experience developing, configuring, troubleshooting, monitoring, administering, updating, and testing Oracle databases.
Three (3) years’ experience with SQL development relevant to Oracle databases.
Three (3) years’ experience developing on Linux, Unix, Windows, or Cisco OS operating system.
Two (2) years’ experience developing databases to be executed on Linux, Unix, Windows, or Cisco OS operating system.
One (1) year experience with the SIGINT environment.
Familiarity with SIGINT security rules.
Job Features
Qualifications: Bachelor’s degree in a technical discipline from an accredited college or university is required. Five (5) years of DBE experience may be substituted for a bachelor’s degree. CWIP:…
Position Overview:
The candidate will join a seasoned team of fellow developers developing modular code that interfaces with a large scale framework.
Required Experience:
• Strong proficiency in C++ and Python
• In-depth understanding of OS internals
• In-depth understanding of network protocols
• Familiarity with modern software engineering concepts
• Knowledge of common CNO techniques
Job Features
Position Overview: The candidate will join a seasoned team of fellow developers developing modular code that interfaces with a large scale framework. Required Experience: • Strong profici…
DESCRIPTION:
Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
Characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and mission supported by those systems.
Compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the technologies being studied.
- Salary Range: $140,000-155,000
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security.
LEVEL 3:
Doctoral degree with 4 years, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms. Chara…
Role Description:
The SE will be part of a team that creates solutions for several technologies, Linux, storage, virtualization, and network. This role will analyze the requirements, gather additional requirements, design, plan, and build architectures as needed. This role will serve in a Tier 3/4 troubleshooting capacity as needed.
From a system engineering perspective, this role will work within a team to design and develop solutions; provide technical leadership for the integration of requirements, design, and technology. Also, develop system architecture and system design documentation. Work with vendors as needed.
Qualifications:
Twenty (20) years experience as a SE in programs and contracts of similar scope, type and complexity is required. Bachelor’s degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Five (5) years of additional SE experience may be substituted for a bachelor’s degree.
Also, must have seven (7) years of the following:
- QA, CM
- Manage requirements and requirements process
- Applying risk management principles
- System test programs
- Troubleshooting, monitoring
- Scripting bash/python
- System architecture
- UNIX, Linux, Windows
- MS Office
Requirements:
- Must have completed and remain current on all Cyberspace Workforce Improvement Program (CWIP) certification requirements. Level I required at start and must obtain Level II within 6 months after start.
- Understanding of UNIX, LINUX platforms
Desired Skills:
- System engineering experience with Linux, storage, virtualization, network technologies
- Working with product vendors
- System integration/administration experience
- Lab Support
- Atlassian (Jira, Confluence, Bamboo, etc.)
Job Features
Role Description: The SE will be part of a team that creates solutions for several technologies, Linux, storage, virtualization, and network. This role will analyze the requirements, gather addit…
DESCRIPTION:
The candidate will be joining an existing fast paced team focused on Security Research for Mobile technologies. The candidate needs to be experienced with Mobile systems and have experience and recent exposure to the latest security implementations for Mobile platforms. The candidate will need depth of understanding with current security research and open source security flaws (CVEs). The candidate will support the research and development on Mobile platforms, providing crisp documentation that is easy to understand for our customers.
REQUIREMENTS:
- Experience researching and developing in a mobile environment (e.g.; Android, Apple) and understand the underlying OS Internals
- Experience with Python and C development
- Exposure to Mobile development environments and debugging tools (XCode, ADB, etc.).
- Experience reading and writing Assembly
- Demonstrated ability to self-drive research tasking
- Experience with remote debugging (ADB, GDB, etc.)
Job Features
DESCRIPTION: The candidate will be joining an existing fast paced team focused on Security Research for Mobile technologies. The candidate needs to be experienced with Mobile systems and have ex…
Position Overview:
- Support IC Cloud activities to include external engagements, working groups, periodic technical reviews, and actions; and internal Govt system engineering actions, working groups, and activities.
- Coordinate with Capabilities and Architecture team and technical leaders across the organization initiatives to include architecture modernization, security enhancements, and incorporation of new requirements.
- Facilitate engineering efforts to add system instrumentation across IC GovCloud to support enhanced metrics, mission impact insight, and Fee-for Service initiatives.
- Coordinate with IC Gov Cloud Program Managers, Outreach teams, and other stakeholders, internal and external, to support programmatic activities and reviews, strategic planning activities, customer engagement, and related activities
Job Features
Position Overview:
Requirements:
- Act as a SETA contractor, advising HPCS as a Network Technical expert
- Provide architecture guidance across HPCS for all networking activities
- Participate in non-disclosure activities and advise HPCS on technical feasibility and any potential issues
- Actively research open networking technologies that would be feasible for HPC and for any projects of significant scale
- Advise HPCS and assist in troubleshooting any operation issues (while maintaining the ability privileged access)
- Provide guidance and participate in the development of deployment, orchestration, and monitoring strategies for large scale networks
- Participate in Cooperative Research Activities where large scale networking is involved
Job Features
Requirements:
(U) Requirements:
- (U) Installs, tests, and validates operational software as specified by installation standards, manufacturer’s guidance and safety codes; Maintains a broad knowledge of the system.
- (U) Installs, tests, and validates operational equipment and software as specified by installation standards, manufacturer’s guidance and safety codes; maintains a broad knowledge of the system; Acts as a lead technician for program production.
(U) Qualifications:
- SIGINT Experience Desired: At least three years of direct experience with an intelligence community or signals intelligence activity.
(U) Education Requirement:
- Bachelor’s Degree in Communications Engineering, Computer Engineering, Computer Science, Electrical Engineering, Information Systems, Mathematics or similar degree or equivalent documented combination of training and experience.
(U) General Experience Requirement:
- Minimum ten years experience integrating systems using multiple operating systems;
- Experience performing all aspects of the integration and test of the system including installing the hardware in the racks, labeling cables, running cables, building the system to drawing package, performing quality assurance, loading operating system, loading applications, and performing all levels of testing in regard to system;
- Develop overall integration & test strategy and schedule test plans & scripts.
Job Features
(U) Requirements: (U) Qualifications: (U) Education Requirement: (U) General Experience Requirement:
(U) Requirements:
- (U) Perform systems engineering activities and assist in the preparation of a work product in Technical Process Areas associated with the ISO/IEC 15288.
- (U) Develop and deliver a work product in any of the ISO/IEC 15288 Process Areas.
- (U) Perform analysis of technical alternatives for a project and make preliminary recommendations.
- (U) Assist in performing systems engineering activities in the ISO/IEC 15288 Agreement or Enterprise Process Areas.
- (U) Perform systems engineering activities and assist in the preparation of multiple work products in Project and/or Technical Process Areas associated with any of the ISO/IEC 15288 processes.
- (U) Perform systems engineering activities and develop and deliver work products in each of the ISO/IEC 15288 Project and Technical Process Areas.
- (U) Independently analyze, and recommend alternatives for elements of project’s technical design.
- (U) Perform systems engineering activities and develop and deliver work products of either the ISO/IEC 15288 Agreement or Enterprise Process Areas.
- (U) Assist in developing a new or innovative approach to a technical or engineering issue.
- (U) Assist in conducting an evaluation to determine its suitability for project implementation.
- (U) Analyze and propose appropriate engineering standards and processes for a project.
- (U) Supervise or coordinate the work of other contractor engineers or technicians on a project.
(U) Qualifications:
- (U) A Bachelor’s degree in a Qualified Engineering Field (See Note 1) or a related discipline (See Note 2) from an accredited college or university plus ten (10) years of systems engineering experience.
- OR (U) A High School Diploma or GED plus fourteen (14) years of general systems engineering experience (any process area).
- OR (U) A Master’s degree in a Qualified Engineering Field (See Note 1) or a related discipline (See Note 2) from an accredited college or university plus eight (8) years of systems engineering experience.
- OR (U) A PhD in a Qualified Engineering Field (See Note 1) or a related discipline (See Note 2) from an accredited college or university plus eight (8) years of systems engineering experience.
*(U) Note 1 – Examples of Qualified engineering fields include: Aeronautics, Biomedical, Chemical, Civil, Computer, Electrical, Environmental, Mechanical, Nuclear, Software, Systems, and Engineering Management.
*(U) Note 2 – Examples of related disciplines include: Chemistry, Computer Science, Information Systems, Mathematics, and Physics.
Job Features
(U) Requirements: (U) Qualifications: *(U) Note 1 – Examples of Qualified engineering fields include: Aeronautics, Biomedical, Chemical, Civil, Computer, Electrical, Environmental, Mechanical, Nucle…
Requirements:
- (U) Develop or implement algorithms to meet or exceed system performance and functional standards
- (U) Assist with developing and executing test procedures for software components
- (U) Write or review software and system documentation
- (U) Develop software solutions by analyzing system performance standards, confer with users or system engineers, analyze systems flow, data usage and work processes; and investigate problem areas
- (U) Serve as a team lead at the level appropriate to the software development process being used on any particular project
- (U) Modify existing software to correct errors, to adapt to new hardware, or to improve its performance
- (U) Design, develop and modify software systems, using scientific analysis and mathematical models to predict and measure outcomes and consequences of design
- (U) Design or implement complex database or data repository interfaces/queries
Qualifications:
- (U) A Bachelor’s degree in Computer Science or related discipline from an accredited college or university and three (3) or more years experience in software development is required. An additional four (4) years of software experience on projects with similar software processes may be substituted for a Bachelor’s degree.
Job Features
Requirements: Qualifications:
