- Professional
- Ufficio in Frederick
Job Description
ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps. All positions are onsite, unless otherwise stated.
Description:
Our employment partner is seeking a highly qualified Secret Cleared Systems Engineer to research, design, and recommend innovative solutions tailored to customer requirements, with a strong emphasis on cyber compliance, cost-effectiveness, and operational efficiency. This requires working on site 3 days at Fort Detrick , MD . The ideal candidate will work cross-functionally, collaborating with multiple teams to implement, integrate, test, and deploy solutions while ensuring their alignment with security standards and budget constraints.
Key Responsibilities:
- Design & Solutions Development: Develop, design, and propose technical solutions that address customer needs, ensuring compliance with cybersecurity standards and budget limits.
- Cross-functional Collaboration: Collaborate with internal teams, including security, software engineering, and operations, to successfully implement, test, and deploy systems.
- Systems Optimization: Conduct thorough evaluations of existing systems, identifying opportunities for performance improvements, increased efficiency, and enhanced cyber resilience.
- Vendor & Third-Party Coordination: Liaise with third-party vendors to explore and recommend potential solutions that align with the project’s objectives.
- Customer Interaction: Work closely with customers and mission partners to gather, refine, and validate requirements, ensuring that deliverables meet their operational needs.
Job Category
Minimum Education Required
Certificates/Security Clearances/Other
- SECRET CLEARANCE
- Current Security + Certification on Date of Hire
City*
Additional Qualifications/Responsibilities
- SECRET CLEARANCE
- Ability to research, design, and recommend innovative solutions tailored to customer requirements
- Ability to show a strong emphasis on cyber compliance and knowledge of implementing STIGS and IAVMs then tracking the systems for any problems
- Understanding of and ability to explain how they have implemented and tracked operational efficiency ability to explain background working cross-functionally and collaborating with multiple teams to implement, integrate, test, and deploy solutions while ensuring their alignment with security standards.
- Working knowledge server operating systems, networking, and general application concepts.
- Experience analyzing user/system requirements and concept of operations documents
- Experience incorporating new plans, designs, and systems into ongoing operations
- Experience interacting with the Government leads
- Current Security + Certification on Date of Hire
- Knowledge of Linux
- Knowledge of networking and networking protocols
- Knowledge of cybersecurity and compliance with DoD cybersecurity requirements such as DISA STIGs, IAVMs, ACAS scans, ESS
- Technical Expertise: Proficiency in server operating systems, networking principles, and general application development and deployment concepts.
- Requirements Analysis: Demonstrated experience in analyzing user/system requirements and reviewing concept of operations (CONOPS) documents to ensure alignment with system capabilities.
- Systems Integration & Continuity: Experience incorporating new designs, systems, and technologies into existing operational environments, ensuring minimal disruption and smooth transitions.
- Collaboration with Stakeholders: Strong interpersonal skills, with proven ability to interact effectively with government leads, stakeholders, and cross-functional teams to ensure alignment and project success.
- Cybersecurity Awareness: Understanding of cybersecurity best practices and how to incorporate them into system design, implementation, and maintenance.