Cyber Chief / Lead Engineerother related Employment listings at Geebo

Cyber Chief / Lead Engineer

Company Name:
Absolute Opportunities
Cyber Chief / Lead Engineer
Location: Arlington, VA
Openings: 1
Salary Range: 200K-260K
Description:
The Cyber Chief Engineer/Lead Engineer supports the development of system capabilities through the deployment including requirements definition, designs and development of system-oriented products and prepares related installation, testing, operation, and maintenance specifications and instructions.
Responsible for the oversight of the definition and analysis of system architecture to establish operating conditions, conducts tests, define and analyze engineering proposals and related technical data to determine feasibility of developing new capabilities and/or modifying existing capabilities.
The Cyber Chief/Lead Engineer understands and embraces the Systems Engineering Lifecycle (SELC) processes and practices, Change Management practices, and collaborates with various Integrated Product Teams (IPTs), Project Teams, and Government entities to deliver technical solutions that achieve the customers mission, objectives, and requirements.
Demonstrated experience that is essential for this position:
End to end single POC for all Technical matters for the Life Cycle of the Program
Experience with CND (Computer Network Defense) & CNO (Computer Network Operations) solution development, delivery, and operations
Experience with Engineering Development, Integration, Test, and Deployment of COTS capabilities
Strong Leadership and Communications skills
Responsibilities include:
Provide technical direction for development, engineering, interfacing, integration and testing of components of system
Works in conjunction with Program Manager and IPT Leads to size proposed changes, manage scope and risk, and to identify opportunities
Ensures creative and innovative business and technology solutions meet/perform to technical and functional requirements
Identifies project technical risks; formulates risk mitigation strategies
Ensures delivered solutions are realized in time frame committed
Analyze user requirements, CONOPS and high-level system architectures to derive, develop and decompose system-level specifications
Provide internal and external customers with technical design support to system acquisition specification, design, proof-of-concept prototyping, development and evaluation of management information and decision support systems
Interface directly with customer and program management team
Conduct trade studies, to determine possible system (hardware, software, architecture) improvements
Plan and/or support enhancement projects through requirements definition, implementation, development, operations, performance, testing, cost and schedule, training and support, and/or system disposal
Perform requirement elicitation, analysis and functional allocation
Provide technical oversight of program milestone reviews
Ensure implementation of operational view, technical standards view, and system and services view for architectures using applicable standards (e.g., Department of Defense Architecture Framework (DODAF), Federal Enterprise Architecture Framework (FEAF))
Shape and guide the development of technical documentation, including CONOPS, user guides, test plans, and other CDRL items
Provide input to hardware (COTS/GOTS/capacity/etc.) recommendations, including support for Technology Insertion in Government Technical Reference Model (TRM)
Active member in Integrated Product Teams (IPTs) and program Engineering Review Boards (ERBs); with responsibility to foster active engagement across team members
Required skills include:
Active Top Secret/Sensitive Compartmented Information (TS/SCI) security clearance required
Demonstrated experience with cyber, cyber operations and cyber analysis systems
Demonstrated experience working within the customer community.
12
years of engineering experience with progression of increased scope of responsibility, technical complexity and industry.
3
years demonstrated experience in cyber security to include practices/methodologies, associated technologies, application design, and/or experience in an operational environment
2
years demonstrated experience in the design and development of cloud-based systems, architectures, and analytics development
Experience and/or familiarity with software and system lifecycle methodologies, (e.g ISO, CMMI, ITIL)
Demonstrated ability to manage software engineering projects associated with transformational and/or rapid (agile) development programs
Strong understanding of security design and requirements
Demonstrated ability to manage multiple teams in a dynamic environment
Knowledge of Information Assurance and Information Operations technologies and development activities
Understanding of the processes and guidelines for Certifying & Accrediting information systems based upon experience on a large-scale development program
Experience developing system performance, availability, scalability, manageability and security solutions for mid-to-large scale programs
Comprehensive understanding of Government Information Security policies, regulations, and guidelines
Demonstrated experience working collaboratively across agencies and physical locations
Experience interfacing directly with customer and management teams; including, conducting briefings and technical meetings for management and customer representatives
Required Education and Certifications:
B.S. in Engineering, Science or Mathematics (advanced degree preferred)
DoD 8570.1-M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP) certification required
Agile software development methodology certification (e.g. SCRUM Master) required
Desired Skills:
Demonstrated experience or familiarity with Earned Value Management Systems (EVMS), compliant with ANSI/EIA Standard 748-B desired
Experience with process development and deployment
3
years experience with managed services applications
Experience with one or more of the following:
Security COTS integration
Operating System Hardening
Vulnerability Assessment testing
Identification and Authentication schemes
Public Key Infrastructure and Identity Management
Cross Domain Solutions
Computer Network Exploitation (CNE)
Computer Network Operations (CNO)
Malware Analysis
Reverse Software Engineering
Security engineeringEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.