Military Operations Specialist Internet & Ecommerce at Geebo

Military Operations Specialist

Company Name:
Kinney Group, Inc.
Overview:
Must possess at least eight (8) years of experience in military command, control and communications. Must have extensive background in requirements analysis, advanced warfighting concepts and doctrine, and tactics, techniques, and procedures (TTP). Experience in computer systems and their application to tactical programs is required. Analyzes and provides recommendations on issues dealing with system and operational architectures. Coordinates with user community representatives throughout all phases of development concerning requirements definition, clarification, prioritization, and alternatives. Applies emerging doctrine and tactics, to system design and development. Assesses the impact of programmatic and technical options on stated user requirements and doctrine.
Analyzes user needs and performs research and functional analysis on a variety of projects
1. Performs technical assessments aimed at improving client systems.
2. Performs functional allocations to identify tasks and their inter-relationships.
3. Researches, identifies, and recommends resources required for task execution and completion.
4. Performs functional modeling based on requirements analysis.
5. Develops new systems or updates existing systems to meet client needs.
6. Serves as technical advisor to clients in assigned subject areas, recommends functional changes, and identifies areas for further investigation.
7. Generates recommendations in the form of technical briefings, reports, and other major documents provided to senior level client personnel.
8. Consults with clients to determine optimum design for assigned projects.
9. Identifies emerging relevant technologies that may result in improvements to current processes and systems.
10. Writes and updates project documentation including system procedures, presentations, and training materials.
11. Conducts functional testing of various systems.
12. Provides guidance and work leadership to less-experienced analysts, and may have supervisory responsibilities.
13. May serve as technical team or task lead.
14. Maintains current knowledge of relevant technologies and subject areas.
15. Participates in special projects as required.
Desired Skills &
Experience:
Security +
Bachelor's Degree in a related technical discipline.
All personnel will have the appropriate certifications or licenses as required.
Requires 8-10 years experience.
Must have extensive background in requirements analysis, advanced warfighting concepts and doctrine, and tactics, techniques, and procedures. Experience in computer systems and their application to tactical programs is required.
A minimum of a Secret security clearance is required.
More About Kinney Group
Kinney Group develops and delivers data center solutions providing technology and people to exceed customer expectations. We design, build, and integrate IT infrastructure solutions for some of the most demanding government agencies and commercial organizations. By leveraging next-generation technologies and adopting proven engineering practices, we create custom solutions and world-class environments for data.
Our colleagues subscribe to a shared ethos and purpose for the company: to harness the power and promise of technology to improve people's lives. This translates across every customer touch point in the organization. We offer compelling work and a progressive approach to work/life balance as well as leadership commitment to ongoing training and development.
Kinney Group, Inc is an Equal Employment Opportunity employer.
Job ID
2014-1184
Job Locations
US-VA-Fort Belvoir
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.