Skip to content
Description Leidos is seeking a Information System Security Officer (ISSO) with hands-on technical experience in the operation, maintenance and security configuration of technologies noted below. The right candidate shall know and follow all applicable Policies and Procedures, Federal regulations and rulings, including OMB, NIST Special Publications and FIPS documents. This position is anticipated to be 90% remote and the preferred candidate will be in the Washington, DC or Fairmont, WV area. To be considered for this position you must have an active Secret, or higher, clearance. Key Skills:... more ->
Description The PKI Registering Agent (RA) will report directly to the PKI HSDN Team Lead. Your technical and engineering expertise will be critical for supporting the program's Identity & Access Management program architecture, infrastructure, capabilities, components, and standards. Specifically, you will be responsible for contributing to, and supporting/executing, RAO activities, PKI Reporting, Trusted Agent training, CSP reconciliation, Smart Card Token support, implementation and operations of all program-wide PKI services and creating products capturing valuable information. This... more ->
Sr. Systems Engineer Tasks includes but not limited to: Derive requirements from customer/company (IRAD) requirements/requests Generate flow down requirements for subassemblies, vendors, or other disciplines Provide technical guidance and support to other disciplines Generate and maintain System level block diagrams, System level ATPs, System level Interface Documents, and System level reports Execute system integration and test activities in lab, including setting up test configurations and working with electrical test equipment Run system level ATPs in lab, at external third-party test... more ->
Description The Quality Assurance (QA) Engineer in support of the HNCD-IDCS program will perform as a Multi-Function Systems Analyst and be responsible for developing, implementing, and maintaining technical quality assurance and control systems. The Air Force Lifecycle Management Center Defensive Cyber Systems Branch (AFLCMC/HNCD) serves as the program office for several defensive cyberspace weapon systems and capabilities. HNCD has designed a new architecture that effectively replaces the Legacy systems solutions into a new ecosystem - the Integrated Defensive Cyber System (IDCS) Mobile -... more ->
Systems Engineer II or III Tasks includes but not limited to: Derive requirements from customer/company (IRAD) requirements/requests Generate flow down requirements for subassemblies, vendors, or other disciplines Provide technical guidance and support to electrical, software, firmware, and mechanical engineers Generate and maintain System level documentation, including but not limited to block diagrams, System level acceptance test procedures (ATPs), System level Interface Documents, System level analysis reports, and user operational manuals. Execute system integration and test activities... more ->
Principal Engineer Qualification : Science/Engineering graduate Responsibility : Requirements Gathering : Participate in requirement gathering JAD sessions and support documentation where applicable (business functional UI usability data compliance data migration NFR 3rd party tools & products). Raise clarifications with customer/onsite to eliminate any ambiguity on the scope of work assigned from the Client/Project Co coordinator. track to closure any open clarifications with customer/onsite. understand and translate requirements into design. (FOR ONSITE) : conduct meetings with customer... more ->
Design Your Future at PVH Cyber Security Engineer - PVH Corp POSITION SUMMARY: The Cyber Security Engineer will be deeply engaged in a dynamic, creative environment that is closely aligned with strategic business and security objectives in order to secure all aspects of the PVH environment. The position will require a candidate to have proven technical leadership experience and a track record of engineering and implementing security solutions in large complex environments. The candidate must have foundational knowledge in endpoint security, network security, web security, data security... more ->