1 to 15 of 3,878
Sort by: Date | Relevance
Technical Program and Project Manager Key Role Provide te chn ical project and program level oversight and thought leadership to drive the completion of high quality Army client deliverables and manage client relationships. Assist the program manager with planning and managing projects to meet delivery, quality, schedule, and cost goals for engineering and te chn ical assistance efforts in support
Posted 1 day ago
Technical Business System Analyst Key Role Formulate and define systems scope and objective based on both us er needs and a thorough understanding of b us iness systems and ind us try requirements. Devise and modify procedures to solve complex problems while considering computer equipment capabilities, limitations, operating time, and form of required results. Perform analysis of b us iness and us
Posted 1 day ago
Integrated Training Environment Functional Technician Key Role Analyze training needs and prepare special courses and related manuals for the Army Low Overhead Training Toolkit (ALOTT). Test, evaluate, troubleshoot, communicate, and give professional recommendations on low overhead training solutions that are included or being evaluated for inclusion into ALOTT. Navigate and perform within a diver
Posted 1 day ago
Data Scientist, Mid The Challenge Are you excited at the prospect of unlocking the secrets held by a data set? Are you fascinated by the possibilities presented by machine learning, artificial intelligence advances, and IoT? In an increasingly connected world, massive amounts of structured and unstructured data open up new opportunities. As a data scientist, you can turn these complex data sets in
Posted 2 days ago
Configuration Management Lead Key Role Establish a configuration management program, including researching current processes, tools, techniques, and methodologies and implement improvements to create a solid, structured, documented, and repeatable CM program. Protect the integrity of a project's delivered products, from code to technical documentation. Leverage modern configuration management, app
Posted 2 days ago
Software Engineer The Challenge Are you looking for an opportunity to not just develop software, but to help build a system that will dynamically provide intelligence to the soldier? As a full stack developer, you can solve a problem with a complete end to end solution in a fast paced, agile environment. We're looking for a developer with the skills needed to build enterprise grade intelligence sy
Posted 2 days ago
All Source Analyst, Senior The Challenge Do you find yourself constantly looking for more and better information? Do you want a job where you can use your knowledge and research skills to improve national security? Never has the role of an all source analyst been so meaningful. More connected devices, larger storage capacity, and faster connections has resulted in an explosion of available informa
Posted 2 days ago
C4I Systems Technician Key Role Provide technical support for engineers engaged in research, design, development, testing, and manufacturing process improvement and assist engineers with the development and fabrication of electronic, electrical, and mechanical prototypes, subassemblies, components, parts, equipment, and systems. Work under general supervision on routine tasks that typically involv
Posted 2 days ago
Cybersecurity Tester, Mid Key Role Serve as a security tester working in a dynamic client environment to conduct compliance and vulnerability assessments on a board range of systems, including mainframe, UNIX, Windows, networking, databases, virtual environments, applications, and web servers under general supervision. Leverage both manual and automated methodologies to identify, assess, and repor
Posted 2 days ago
Cybersecurity Policy and Compliance Analyst Key Role Assist with accrediting virtual and augmented reality technologies for use in classified environments. Provide Cybersecurity and information assurance analysis and consulting throughout the security assessment and compliance life cycle process for mobile and tablet, virtual, and augmented reality technologies, including hardware and software. As
Posted 2 days ago
Systems Engineer, Senior The Challenge Are you looking for an opportunity to combine your technical skills with big picture thinking to make an impact in national security? You understand your customer's environment and how to develop the right systems for their mission. Your ability to translate real world needs into technical specifications, makes you an integral part of delivering a customer fo
Posted 2 days ago
Cybersecurity Engineer, Lead The Challenge Everyone knows security needs to be "baked in" to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your Cyber engineering skills to lead the design and building of secure systems for the Department of Veterans Affairs? We're looking
Posted 2 days ago
Continuous Monitoring Lead Key Role Leverage expertise in the Risk Management Framework (RMF) process and analyze the development of a continuous monitoring program for a DoD organization. Apply expertise in performing continuous assessments of all security controls for all information systems under the purview of the client organization. Serve as the project manager for up to six staff and analyz
Posted 2 days ago
Booz Allen Hamilton
- Aberdeen Proving Ground, MD
Network Engineer, Senior Key Role Design, plan, install, integrate, and maintain backbone core area tactical and strategic communications networks. Gather a Mission Needs Statements Initial Capabilities Document (MNSICD), Operational Requirements Capability Development Documents (ORCDDs), and Capability Production Documents (CPDs) for the Army's tactical communications systems and translate requir
Posted 2 days ago
Cloud Security Architect, Lead The Challenge Everyone knows security needs to be "baked in" to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your knowledge of Cyber network, infrastructure, application architecture, accreditation boundary, DoD on premise and Cloud services
Posted 2 days ago
Email this Job to Yourself or a Friend
Indicates required fields