Careers
Our Opportunities
-
ACTR (Assistant Contract Technical Representative) -
-
The ACTR will serve as a specialist responsible for planning and identifying IT service operational requirements and developing and maintaining strategic plans. You will provide technical knowledge to monitor and review Navy Marine Corps Intranet (NMCI) compliance and Service Legal Agreements (SLA) performance requirements.
-
-
All Source Analyst -
-
An all source intelligence analyst is a data specialist who provides analysis and reports to support a variety of applications that support military and government operations around the world. This role requires excellent judgment and critical thinking skills, as well as the ability to responsibly gather, maintain, and report on confidential information.
-
-
Certifying Agent (CA) -
-
Responsible for conducting a security certification of an organization.
-
-
Collection Manager -
-
Duties include developing technical source collection strategies to address intelligence gaps, creating collection postures and assessing collection efficiency, conducting source citation analysis, outreach to IC partners to improve evaluation methodologies, and addressing a wide variety of SIGINT collection resource management issues.
-
-
Counterintelligence Analyst -
-
Analyzes Foreign Intelligence Entity (FIE) threat information from multiple sources, disciplines, and Intelligence Community agencies. Provides specialized analytical and CI investigative support utilizing sophisticated analyst tools and CI, CT and/or all-source analytical methodologies to support CI investigations and operations, as well as US Military activities and operations.
-
-
Cyber Hunter -
-
Provide expert analytic investigative support for critical security incidents. Use the MITRE ATT&CK framework to analyze malicious campaigns and evaluate the effectiveness of security technologies.
-
-
Database Engineer -
-
Database engineers write new database programs and maintain existing programs to ensure they can handle the flow of traffic and the amount of data being stored in the database. Database engineers design new databases based on company needs, data storage needs, and the number of users accessing the database.
-
-
Forensic Analyst -
-
Computer forensic analysts combine their computer science background with their forensic skills to recover information from computers and storage devices. Analysts are responsible for assisting law enforcement officers with cybercrimes and to retrieve evidence.
-
-
Incident Response Analyst -
-
Works with an incident response team to identify and monitor security threats to an organization’s cyber systems. Your responsibilities as an incident response analyst are to prevent escalation of severe security threats, provide reports to the organization’s security team, utilize tools to minimize the effects of a security breach on the computer network, and perform an analysis to ensure that the organization’s computer network is clear of threats. Your duties also include implementing and optimizing security tools to prevent the same security issues from happening again. You may communicate with law enforcement about security threats if necessary.
-
-
Information Assurance Specialist -
-
The Information Assurance/Security Specialist coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customer requirements in a fast paced, evolving environment.
-
-
Information System Security Engineer -
-
Help to safeguard organization's computer networks and systems. They plan and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.
-
-
Information System Security Officer -
-
Oversee the digital records in an organization. They are responsible for instituting security protocols, fending off attacks, and running diagnostics. ISSOs may also monitor networks and create a risk management plan for the organization.
-
-
Malware Analyst -
-
Works in the field of computer and network security to examine, identify, and understand the nature of cyber-threats such as viruses, worms, bots, rootkits, and Trojan horses. All these types of programs represent malicious code that can infect systems and cause them to behave in unexpected ways.
-
-
Master Scheduler -
-
Completes a number of tasks, such as planning rules and modifiers to drive manufacturing software such as MS and MRP, planning and monitoring the cost of projects, preparing schedules with inputs from several prime contract sources, and understanding the work and time involved in planning each activity. The master scheduler is responsible for planning, scheduling, coordinating, and monitoring products through the complete production cycle.
-
-
Penetration Testers -
-
Perform penetration tests on computer systems, networks and applications. Create new testing methods to identify vulnerabilities. Perform physical security assessments of systems, servers and other network devices to identify areas that require physical protection.
-
-
Process Engineers -
-
Oversees and assesses existing processes and workflows. Optimizes productivity by designing, implementing and testing new procedures. Assembles reports to document process status and changes. Tracks metrics to discover areas for improvement and monitor upgrades.
-
-
Risk and Vulnerability Analysts -
-
Detects weaknesses in networks and software and then takes measures to correct and strengthen security within the system. Job duties include: Develops risk-based mitigation strategies for networks, operating systems, and applications.
-
-
Security Control Assessors (SCA) -
-
Responsible for assessing the management, operational, assurance, and technical security controls implemented on an information system via security testing and evaluation (ST&E) methods. The SOA must be independent of system development, operation, and deficiency mitigation.
-
-
SIGINT Analyst -
-
Examining foreign communications and activity and collating the information by compiling reports on combat, strategy, and tactical intelligence, to support Special Operations Task Force and other government agencies.
-
-
Technical Writer -
-
Prepare, review, revise, and maintain technical documents, including software and systems engineering, system operations, testing, and user documentation. Gather and analyze technical and product information from various sources to document new or changing product functionality.
-
-
Tier I/II/III Help Desk Specialist –
-
Responsible for assisting the customer with basic to complex issues requiring detailed systems and applications knowledge.
-
-
Vulnerability Assessment Analyst -
-
Detects weaknesses in networks and software and then takes measures to correct and strengthen security within the system. Job duties include: Develops risk-based mitigation strategies for networks, operating systems, and applications.
-
-
Low Band System Software Support Specialist -
-
The DSFS Low Band Software (LB SW) support position is responsible and accountable for the system software that manages LB sensor assets and controls the execution LB signal Planning & Direction, Collection, Processing & Exploitation, Analysis & Production, and Dissemination (PCPAD) processes. LB SW support personnel interface daily with users, mission planners, co-contractors, and other ground system maintainers to troubleshoot and correct system problems, analyze system performance, and make recommendations on system improvements.
-
-
High Band System Software Support Specialist -
-
The DSFS HB Band Software (HB SW) support position is responsible and accountable for the system software that manages HB sensor assets and controls the execution HB signal Planning & Direction, Collection, Processing & Exploitation, Analysis & Production, and Dissemination (PCPAD) processes. HB SW support personnel interface daily with users, mission planners, co-contractors, and other ground system maintainers to troubleshoot and correct system problems, analyze system performance, and make recommendations on system improvements.
-
-
Maintenance Technician -
-
DSFS Maintenance Technician (MT) support position is responsible and accountable for the initialization and operation of AF DCGS ground and airborne sensor systems used in the execution of the SR mission. MT support personnel interface daily with users, mission planners, co-contractors, and other ground system maintainers to troubleshoot and correct system problems, analyze system performance, and make recommendations on system improvements.
-