Service Desk Agent Must be located in Portland, OR area US Citizenship Required Attention Service Desk personnel! New opening for a daytime, fully remote IT service desk role where you will provide support to Bonneville Power Administration - an enterprise of roughly 4500 users. General Summary Provides remote Tier 1 technical end user support to Bonneville Power Administration, an enterprise of roughly 4500 users in a Microsoft Windows environment. Work on a team of Service Desk technicians to resolve and escalate user incidents and requests. Analyze, troubleshoot, and resolve Windows incidents. Carry out process workflows while upholding government policies and procedures. Provide technical assistance over the phone for a wide variety of hardware, software and site-specific applications in an enterprise environment. Job Responsibilities Provide front line support for IT systems and software, fielding telephone calls, voicemails, emails, and portal requests. Attempt incident resolution using industry knowledge and provided Knowledge Articles. Solve technical issues or escalate in a professional and timely manner, bringing in other subject matter experts as required. Enter IT incident descriptions and troubleshoot the issue sufficiently to appropriately refer the incident to the correct IT support group. Track issues using an ITSM ticketing system. Keep meticulous notes. Troubleshoot and repair Desktop/Laptop and thin client hardware. Support peripheral devices (Printers, Smartphones, Scanners etc.). Using BPA and industry standards, follow complex procedures, updating procedures as necessary. Understand the IT working environment sufficiently to explain technical issues to a disparate range of technical and non-technical clients. Follow the defined process to document and escalate incidents with tracking software and database. Seek opportunities to improve knowledge, skills and performance and be receptive to constructive criticism. Assist in mentoring junior team members and accept mentoring from senior team members. Other supporting duties as directed. Minimum Qualifications 3-5+ years IT experience in an IT Service Desk Tier 1 Enterprise position. Possess a working knowledge and progressive experience in a Microsoft computer support Experienced in all facets of troubleshooting and repairing the standard set of peripherals in an enterprise environment Familiar with supporting smartphones and other mobile devices Demonstrate the highest possible standards of customer support and produce maximum customer satisfaction Strong interpersonal communication skills both written and verbal US Citizen able to pass a government background check. Bachelor of Science in Computer/Information Technology or a directly-related field is preferred however not required.
04/24/2026
Full time
Service Desk Agent Must be located in Portland, OR area US Citizenship Required Attention Service Desk personnel! New opening for a daytime, fully remote IT service desk role where you will provide support to Bonneville Power Administration - an enterprise of roughly 4500 users. General Summary Provides remote Tier 1 technical end user support to Bonneville Power Administration, an enterprise of roughly 4500 users in a Microsoft Windows environment. Work on a team of Service Desk technicians to resolve and escalate user incidents and requests. Analyze, troubleshoot, and resolve Windows incidents. Carry out process workflows while upholding government policies and procedures. Provide technical assistance over the phone for a wide variety of hardware, software and site-specific applications in an enterprise environment. Job Responsibilities Provide front line support for IT systems and software, fielding telephone calls, voicemails, emails, and portal requests. Attempt incident resolution using industry knowledge and provided Knowledge Articles. Solve technical issues or escalate in a professional and timely manner, bringing in other subject matter experts as required. Enter IT incident descriptions and troubleshoot the issue sufficiently to appropriately refer the incident to the correct IT support group. Track issues using an ITSM ticketing system. Keep meticulous notes. Troubleshoot and repair Desktop/Laptop and thin client hardware. Support peripheral devices (Printers, Smartphones, Scanners etc.). Using BPA and industry standards, follow complex procedures, updating procedures as necessary. Understand the IT working environment sufficiently to explain technical issues to a disparate range of technical and non-technical clients. Follow the defined process to document and escalate incidents with tracking software and database. Seek opportunities to improve knowledge, skills and performance and be receptive to constructive criticism. Assist in mentoring junior team members and accept mentoring from senior team members. Other supporting duties as directed. Minimum Qualifications 3-5+ years IT experience in an IT Service Desk Tier 1 Enterprise position. Possess a working knowledge and progressive experience in a Microsoft computer support Experienced in all facets of troubleshooting and repairing the standard set of peripherals in an enterprise environment Familiar with supporting smartphones and other mobile devices Demonstrate the highest possible standards of customer support and produce maximum customer satisfaction Strong interpersonal communication skills both written and verbal US Citizen able to pass a government background check. Bachelor of Science in Computer/Information Technology or a directly-related field is preferred however not required.
Federal Network Support Engineer Tier 1 Onsite in Reston / Herndon, VA Tier 1 and Tier 1.5 Day, Swing, and Night shifts available U.S Citizenship Required Federal Network Support Engineer to provide foundational technical infrastructure and software services support for the Azure Core Networking team within Government Cloud environments. This role will support 24x7 operations (shift work) for critical networking infrastructure including ExpressRoute, VPN, and core network services across secure federal facilities. Key Responsibilities Operational Support Monitor capacity alerts and maintain ExpressRoute Direct port capacity for Enterprise Route Direct customers Perform port provisioning and generate Network Design Templates (NDT) for buildout activities Create seed files and execute post-build service configuration deployments Validate configuration settings before bringing services to production Support decom efforts for retiring network infrastructure Triage and escalate Livesite incidents, customer-reported issues, and deployment incidents Documentation & Knowledge Management Update knowledge base with troubleshooting guides and lessons learned from incident resolution Contribute to PNAAS automation initiatives Document standard operating procedures for Tier 1 activities Maintain accurate records of configuration changes and deployment activities Collaboration Coordinate with Microsoft's partners (ATT, BT, Verizon, Equinix, etc.) for partner capacity onboarding per business needs Escalate complex issues to Tier 1.5/2 support following established protocols Minimum Qualifications HS Diploma or GED; Bachelor's Degree in Information Technology, Computer Science or a related field preferred or equivalent relevant experience. 2+ years of experience in network operations or technical support U.S Citizenship due to federal contract requirements Security Requirements Active Secret level clearance Able to obtain CJIS background check Required Certifications (One or more) CompTIA Network+ CompTIA Security+ Azure AZ-900 Primary Job Specific Skills Basic understanding of networking fundamentals (TCP/IP, routing, switching) Familiarity with Microsoft Azure networking services preferred Experience with ticketing systems and incident management processes Strong troubleshooting and problem-solving abilities Excellent written and verbal communication skills Ability to work independently in a 24x7 operational environment Strong attention to detail and commitment to documentation standards Customer service orientation with ability to manage multiple priorities Other Job Skills Knowledge of Microsoft Operating Systems and products that include Microsoft Windows, Windows Servers, Microsoft Office365 and SharePoint, Microsoft Teams. Applies standard methodology, techniques, procedures and criteria. Ability to troubleshoot and resolve basic/routine system hardware, software or networking related problems. Ability to communicate effectively, both orally and in writing and to translate technical terminology into terms understandable to non-technical employees. Strong customer service skills. Experience with cloud infrastructure, digital workspace, and storage technology a plus.
04/24/2026
Full time
Federal Network Support Engineer Tier 1 Onsite in Reston / Herndon, VA Tier 1 and Tier 1.5 Day, Swing, and Night shifts available U.S Citizenship Required Federal Network Support Engineer to provide foundational technical infrastructure and software services support for the Azure Core Networking team within Government Cloud environments. This role will support 24x7 operations (shift work) for critical networking infrastructure including ExpressRoute, VPN, and core network services across secure federal facilities. Key Responsibilities Operational Support Monitor capacity alerts and maintain ExpressRoute Direct port capacity for Enterprise Route Direct customers Perform port provisioning and generate Network Design Templates (NDT) for buildout activities Create seed files and execute post-build service configuration deployments Validate configuration settings before bringing services to production Support decom efforts for retiring network infrastructure Triage and escalate Livesite incidents, customer-reported issues, and deployment incidents Documentation & Knowledge Management Update knowledge base with troubleshooting guides and lessons learned from incident resolution Contribute to PNAAS automation initiatives Document standard operating procedures for Tier 1 activities Maintain accurate records of configuration changes and deployment activities Collaboration Coordinate with Microsoft's partners (ATT, BT, Verizon, Equinix, etc.) for partner capacity onboarding per business needs Escalate complex issues to Tier 1.5/2 support following established protocols Minimum Qualifications HS Diploma or GED; Bachelor's Degree in Information Technology, Computer Science or a related field preferred or equivalent relevant experience. 2+ years of experience in network operations or technical support U.S Citizenship due to federal contract requirements Security Requirements Active Secret level clearance Able to obtain CJIS background check Required Certifications (One or more) CompTIA Network+ CompTIA Security+ Azure AZ-900 Primary Job Specific Skills Basic understanding of networking fundamentals (TCP/IP, routing, switching) Familiarity with Microsoft Azure networking services preferred Experience with ticketing systems and incident management processes Strong troubleshooting and problem-solving abilities Excellent written and verbal communication skills Ability to work independently in a 24x7 operational environment Strong attention to detail and commitment to documentation standards Customer service orientation with ability to manage multiple priorities Other Job Skills Knowledge of Microsoft Operating Systems and products that include Microsoft Windows, Windows Servers, Microsoft Office365 and SharePoint, Microsoft Teams. Applies standard methodology, techniques, procedures and criteria. Ability to troubleshoot and resolve basic/routine system hardware, software or networking related problems. Ability to communicate effectively, both orally and in writing and to translate technical terminology into terms understandable to non-technical employees. Strong customer service skills. Experience with cloud infrastructure, digital workspace, and storage technology a plus.
DevOps Engineer Full Time: Telework US Citizenship We are seeking a DevOps Engineer for hire in support of the Energy- FERC program. This is a great opportunity for someone who has hands-on experience with containerizing Windows Server applications and is driven to modernize systems. Job Description : The Containerization Engineer will be responsible for implementing and supporting container-based solutions for Windows Server applications. You will work closely with development and operations teams to containerize existing Windows-based applications, optimize container performance, and establish best practices for container deployment and management. Design and implement containerization strategies for Windows Server applications using Docker, containerd, and other container technologies. Migrate traditional Windows Server applications to containerized environments. Create and maintain Dockerfiles, container images, and related configuration files. Develop CI/CD pipelines for building, testing, and deploying Windows containers. Troubleshoot container-related issues across development and production environments. Collaborate with development teams to optimize applications for container-based deployment. Implement container orchestration solutions (Kubernetes, Docker Swarm, etc.) for Windows workloads. Establish and document best practices for Windows container security, networking, and storage. Monitor container performance and implement optimization strategies. Provide technical guidance and mentorship to junior engineers on containerization practices. Work closely with Security group to Implement security controls for environment hardening and resolving vulnerabilities. Minimum Qualifications Bachelor's Degree in Information Technology, Computer Science, other relevant field, or equivalent relevant experience; Master's Degree preferred. Security+ Cert is required or must be obtained within 90 days of role start. 5+ years of experience in Systems Engineering/Analysis. Specifically, 3-5 years of experience in IT operations, DevOps, or software engineering and 2+ years of experience with containerization technologies (Docker, containerd, etc.) Other Job Specific Skills Experience with Kubernetes for Windows workloads. Strong knowledge of Windows Server administration and architecture. Experience containerizing Windows-based applications. Familiarity with container orchestration platforms (Kubernetes, Docker Swarm). Understanding of CI/CD principles and implementation. Working knowledge of infrastructure as code tools (Terraform, Ansible, PowerShell DSC). Experience with version control systems (Git). Strong troubleshooting and problem-solving skills. Excellent communication and collaboration abilities. Preferred Qualifications Knowledge of hybrid container environments (Windows and Linux). Familiarity with cloud platforms (Azure, AWS, GCP). Experience with application modernization and refactoring. Understanding of microservices architecture. Knowledge of monitoring and observability tools for containerized applications. Relevant certifications (Docker Certified Associate, CKA, CKAD, etc.). Experience with .NET framework and applications Design and implement containerization strategies for Windows Server applications using Docker, containerd, and other container technologies. Migrate traditional Windows Server applications to containerized environments. Create and maintain Dockerfiles, container images, and related configuration files. Develop CI/CD pipelines for building, testing, and deploying Windows containers. Troubleshoot container-related issues across development and production environments. Collaborate with development teams to optimize applications for container-based deployment. Implement container orchestration solutions (Kubernetes, Docker Swarm, etc.) for Windows workloads. Establish and document best practices for Windows container security, networking, and storage. Monitor container performance and implement optimization strategies. Provide technical guidance and mentorship to junior engineers on containerization practices. Work closely with Security group to Implement security controls for environment hardening and resolving vulnerabilities.
04/24/2026
Full time
DevOps Engineer Full Time: Telework US Citizenship We are seeking a DevOps Engineer for hire in support of the Energy- FERC program. This is a great opportunity for someone who has hands-on experience with containerizing Windows Server applications and is driven to modernize systems. Job Description : The Containerization Engineer will be responsible for implementing and supporting container-based solutions for Windows Server applications. You will work closely with development and operations teams to containerize existing Windows-based applications, optimize container performance, and establish best practices for container deployment and management. Design and implement containerization strategies for Windows Server applications using Docker, containerd, and other container technologies. Migrate traditional Windows Server applications to containerized environments. Create and maintain Dockerfiles, container images, and related configuration files. Develop CI/CD pipelines for building, testing, and deploying Windows containers. Troubleshoot container-related issues across development and production environments. Collaborate with development teams to optimize applications for container-based deployment. Implement container orchestration solutions (Kubernetes, Docker Swarm, etc.) for Windows workloads. Establish and document best practices for Windows container security, networking, and storage. Monitor container performance and implement optimization strategies. Provide technical guidance and mentorship to junior engineers on containerization practices. Work closely with Security group to Implement security controls for environment hardening and resolving vulnerabilities. Minimum Qualifications Bachelor's Degree in Information Technology, Computer Science, other relevant field, or equivalent relevant experience; Master's Degree preferred. Security+ Cert is required or must be obtained within 90 days of role start. 5+ years of experience in Systems Engineering/Analysis. Specifically, 3-5 years of experience in IT operations, DevOps, or software engineering and 2+ years of experience with containerization technologies (Docker, containerd, etc.) Other Job Specific Skills Experience with Kubernetes for Windows workloads. Strong knowledge of Windows Server administration and architecture. Experience containerizing Windows-based applications. Familiarity with container orchestration platforms (Kubernetes, Docker Swarm). Understanding of CI/CD principles and implementation. Working knowledge of infrastructure as code tools (Terraform, Ansible, PowerShell DSC). Experience with version control systems (Git). Strong troubleshooting and problem-solving skills. Excellent communication and collaboration abilities. Preferred Qualifications Knowledge of hybrid container environments (Windows and Linux). Familiarity with cloud platforms (Azure, AWS, GCP). Experience with application modernization and refactoring. Understanding of microservices architecture. Knowledge of monitoring and observability tools for containerized applications. Relevant certifications (Docker Certified Associate, CKA, CKAD, etc.). Experience with .NET framework and applications Design and implement containerization strategies for Windows Server applications using Docker, containerd, and other container technologies. Migrate traditional Windows Server applications to containerized environments. Create and maintain Dockerfiles, container images, and related configuration files. Develop CI/CD pipelines for building, testing, and deploying Windows containers. Troubleshoot container-related issues across development and production environments. Collaborate with development teams to optimize applications for container-based deployment. Implement container orchestration solutions (Kubernetes, Docker Swarm, etc.) for Windows workloads. Establish and document best practices for Windows container security, networking, and storage. Monitor container performance and implement optimization strategies. Provide technical guidance and mentorship to junior engineers on containerization practices. Work closely with Security group to Implement security controls for environment hardening and resolving vulnerabilities.
Database Administrator Fully Remote US Citizenship Required New fully remote role! This is a great position for someone junior in their DBA career. QUICKBASE experience required. Provides database support by verifying databases associated with network tools and solutions function as required. Responsible for participating in the routine operations and maintenance of databases and ensuring their reliable and efficient performance. Performs preventive and corrective maintenance and incident management measures. Executes regular system administrative activities, including system reboot, back up, recovery, archiving and restoration. Checks and ensures all databases are online and can be connected. Monitors and tunes databases to ensure peak performance. Checks database log files backup status and system hardware resources such as space, CPU, and memory. Implements backup and recovery solutions. Runs database tests and tunes database performance, and identifies opportunities for improvement. Provides routine system maintenance support, ensuring that any system disruptions mandated by an upgrade or patch follow the necessary guidelines and approvals. Supports installation of operating systems, databases, applications, development upgrades, and new releases. Executes any needed upgrades to the software applications and maintains necessary licensing. Adheres to established standards, controls and procedures to ensure data integrity and security. Uses various databases and sources to ensure systems are not vulnerable to security attacks. Minimum Qualifications Bachelor's Degree in a related field of study. Dependent upon contract requirement 1-2 years of related work experience Familiarity with QUICKBASE required. Other Job Specific Skills Strong attention to detail and analytical skills. Strong written and verbal communication skills. Ability to multitask and work well under pressure. Knowledge of database backup and recovery strategies. Experience with DBA productivity and performance tools. Experience with DoD and Federal Government is a plus. Knowledge of security network and infrastructure tools, including access control and/or encryption. Knowledge of the software/system development life cycle (SDLC). Ability to clearly and concisely document table mappings/layouts or data dictionaries for technical and non-technical audiences.
04/24/2026
Full time
Database Administrator Fully Remote US Citizenship Required New fully remote role! This is a great position for someone junior in their DBA career. QUICKBASE experience required. Provides database support by verifying databases associated with network tools and solutions function as required. Responsible for participating in the routine operations and maintenance of databases and ensuring their reliable and efficient performance. Performs preventive and corrective maintenance and incident management measures. Executes regular system administrative activities, including system reboot, back up, recovery, archiving and restoration. Checks and ensures all databases are online and can be connected. Monitors and tunes databases to ensure peak performance. Checks database log files backup status and system hardware resources such as space, CPU, and memory. Implements backup and recovery solutions. Runs database tests and tunes database performance, and identifies opportunities for improvement. Provides routine system maintenance support, ensuring that any system disruptions mandated by an upgrade or patch follow the necessary guidelines and approvals. Supports installation of operating systems, databases, applications, development upgrades, and new releases. Executes any needed upgrades to the software applications and maintains necessary licensing. Adheres to established standards, controls and procedures to ensure data integrity and security. Uses various databases and sources to ensure systems are not vulnerable to security attacks. Minimum Qualifications Bachelor's Degree in a related field of study. Dependent upon contract requirement 1-2 years of related work experience Familiarity with QUICKBASE required. Other Job Specific Skills Strong attention to detail and analytical skills. Strong written and verbal communication skills. Ability to multitask and work well under pressure. Knowledge of database backup and recovery strategies. Experience with DBA productivity and performance tools. Experience with DoD and Federal Government is a plus. Knowledge of security network and infrastructure tools, including access control and/or encryption. Knowledge of the software/system development life cycle (SDLC). Ability to clearly and concisely document table mappings/layouts or data dictionaries for technical and non-technical audiences.
The Information System Security Officer (ISSO) plays a critical, dual role in safeguarding OIM's information systems. This position demands a hands-on approach to designing, integrating, and governing the enterprise cybersecurity architecture, while also performing essential ISSO duties for OIM systems and their boundaries. This ensures that every technical solution is secure-by-design and compliant with all DOE and federal requirements. The Architect/ISSO functions as a bridge between technical architecture, day-to-day operations, and governance, acting as both a primary technical authority and a dedicated compliance steward to build and sustain a robust and resilient cybersecurity. The candidate will be involved with Assessment & Authorization and Vulnerability Management teams, including A&A Analysts, A&A Specialists, A&A SMEs, A&A Security Engineers, A&A Architects, Vulnerability Management Analysts, and Vulnerability Management Engineers to deliver the cyber authorization services. Experience with one or more of the following Federal security frameworks (FedRAMP, FISMA, Zero Trust Maturity Model, RMF, and NIST SP 800 series and NIST SP 800-53) and GRC tools (e.g. XACTA, ArchAngel, eMASS, CSAM). Develop, implement, and maintain comprehensive information security programs in accordance with federal mandates and agency policies. Oversee the continuous monitoring and improvement of security controls across diverse information systems. Collaborate with system owners and stakeholders to integrate security requirements throughout the system development lifecycle. Conduct thorough risk assessments to identify, analyze, and prioritize security vulnerabilities and threats. Develop and implement risk mitigation strategies and countermeasures to protect sensitive information and critical assets. Track and manage Plans of Action and Milestones (POA&Ms) to ensure timely remediation of identified weaknesses. Ensure strict adherence to federal regulations, such as NIST SP 800-53, FISMA, and agency-specific security directives. Perform ISSO responsibilities for OIM systems and boundaries, serving as the subject matter expert for assigned systems. Advocate for System Owners, coordinating cybersecurity activities and ensuring alignment with DOE policies and federal requirements. Provide regular security briefings to System Owners, ISSMs, and AODRs. Participate in Change Control Board (CCB) meetings, reviewing privileged access requests, risk assessments, and cybersecurity requests. Support and perform internal audits, inspections, and reviews of OIM accreditation boundaries. Support the Authorization to Operate (ATO) process by providing expert guidance and ensuring all required artifacts are complete and accurate. Draft, update, and enforce information security policies, standards, and procedures. Maintain comprehensive security documentation, including system security plans, contingency plans, and configuration management plans. Develop and deliver security awareness training to educate users on best practices and compliance requirements. Evaluate, recommend, and implement security technologies and tools, such as intrusion detection/prevention systems (IDPS), security information and event management (SIEM), and data loss prevention (DLP). Manage and monitor security configurations for operating systems, networks, and applications. Conduct vulnerability scanning and penetration testing to identify and address security weaknesses. Establish and maintain Interconnection Security Agreements (ISAs) and Memoranda of Understanding (MOUs/MOAs) with external partners. Prepare and review security authorization documentation, including Security Plans (SPs), Privacy Impact Assessments (PIAs), and Contingency Plans (CPs). Represent OIM in interagency security working groups and committees. Provide analysis of vulnerability, patch, and configuration data to protect OIM mission systems. Work with System Owners to develop and remediate POA&Ms, prioritizing based on Level of Effort (LOE). Recommend corrective actions for risk assessment issues identified during audits or inspections. Minimum Qualifications Bachelor's Degree in Computer Science or a related field or equivalent experience; Advanced Degree preferred. 10+ years of experience in cybersecurity architecture, compliance, or ISSO duties. Other Job Specific Skills Deep expertise with SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and vulnerability management tools. Strong knowledge of DOE cybersecurity policies, FISMA, NIST 800-53, and federal directives. Proven experience drafting and maintaining FISMA artifacts and managing A&A processes. NIST 800-53 Rev 5. Risk Management Framework. CRISC (or equivalent), CISSP, CISM, CISSP-ISSAP, or equivalent. Desired Skills Ability to balance technical architecture with compliance oversight. Strong communication skills for briefings, reporting, and stakeholder engagement. Experience leading audits, inspections, and risk assessments. Expertise in disaster recovery, COOP planning, and incident response. Strategic mindset with adaptability to emerging technologies and evolving threats. Reporting for information security activities Meet strategic information security objectives Manage security initiatives to support information security strategy and plan Address any information security related issues Implement the security controls specified in the security plan Conduct the information security risk assessment program Targeted security assessments to ensure appropriate level of security controls Maintain knowledge of general security administration programs and one or more security specialties (e. g. sensitive compartmented information, personnel security, technical security, operations security) Provide an interface to client information security audits Protect corporate cyber security information day to day Perform information security risk assessments and serves as an internal auditor for security issues Oversee the risk assessment and information security awareness Train all employees in effective information security measures Provide ad hoc information security and privacy assistance to projects and regional leaders and information security officers Reporting on business security incidents Create enterprise information security education and awareness platforms Escalate security project issues to management Provide periodic reporting on information security issues to the VC/VPIT Ensure all employees receive mandatory training in information security awareness and information security policies, guidelines and procedures Achieving security and privacy certifications
04/24/2026
Full time
The Information System Security Officer (ISSO) plays a critical, dual role in safeguarding OIM's information systems. This position demands a hands-on approach to designing, integrating, and governing the enterprise cybersecurity architecture, while also performing essential ISSO duties for OIM systems and their boundaries. This ensures that every technical solution is secure-by-design and compliant with all DOE and federal requirements. The Architect/ISSO functions as a bridge between technical architecture, day-to-day operations, and governance, acting as both a primary technical authority and a dedicated compliance steward to build and sustain a robust and resilient cybersecurity. The candidate will be involved with Assessment & Authorization and Vulnerability Management teams, including A&A Analysts, A&A Specialists, A&A SMEs, A&A Security Engineers, A&A Architects, Vulnerability Management Analysts, and Vulnerability Management Engineers to deliver the cyber authorization services. Experience with one or more of the following Federal security frameworks (FedRAMP, FISMA, Zero Trust Maturity Model, RMF, and NIST SP 800 series and NIST SP 800-53) and GRC tools (e.g. XACTA, ArchAngel, eMASS, CSAM). Develop, implement, and maintain comprehensive information security programs in accordance with federal mandates and agency policies. Oversee the continuous monitoring and improvement of security controls across diverse information systems. Collaborate with system owners and stakeholders to integrate security requirements throughout the system development lifecycle. Conduct thorough risk assessments to identify, analyze, and prioritize security vulnerabilities and threats. Develop and implement risk mitigation strategies and countermeasures to protect sensitive information and critical assets. Track and manage Plans of Action and Milestones (POA&Ms) to ensure timely remediation of identified weaknesses. Ensure strict adherence to federal regulations, such as NIST SP 800-53, FISMA, and agency-specific security directives. Perform ISSO responsibilities for OIM systems and boundaries, serving as the subject matter expert for assigned systems. Advocate for System Owners, coordinating cybersecurity activities and ensuring alignment with DOE policies and federal requirements. Provide regular security briefings to System Owners, ISSMs, and AODRs. Participate in Change Control Board (CCB) meetings, reviewing privileged access requests, risk assessments, and cybersecurity requests. Support and perform internal audits, inspections, and reviews of OIM accreditation boundaries. Support the Authorization to Operate (ATO) process by providing expert guidance and ensuring all required artifacts are complete and accurate. Draft, update, and enforce information security policies, standards, and procedures. Maintain comprehensive security documentation, including system security plans, contingency plans, and configuration management plans. Develop and deliver security awareness training to educate users on best practices and compliance requirements. Evaluate, recommend, and implement security technologies and tools, such as intrusion detection/prevention systems (IDPS), security information and event management (SIEM), and data loss prevention (DLP). Manage and monitor security configurations for operating systems, networks, and applications. Conduct vulnerability scanning and penetration testing to identify and address security weaknesses. Establish and maintain Interconnection Security Agreements (ISAs) and Memoranda of Understanding (MOUs/MOAs) with external partners. Prepare and review security authorization documentation, including Security Plans (SPs), Privacy Impact Assessments (PIAs), and Contingency Plans (CPs). Represent OIM in interagency security working groups and committees. Provide analysis of vulnerability, patch, and configuration data to protect OIM mission systems. Work with System Owners to develop and remediate POA&Ms, prioritizing based on Level of Effort (LOE). Recommend corrective actions for risk assessment issues identified during audits or inspections. Minimum Qualifications Bachelor's Degree in Computer Science or a related field or equivalent experience; Advanced Degree preferred. 10+ years of experience in cybersecurity architecture, compliance, or ISSO duties. Other Job Specific Skills Deep expertise with SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and vulnerability management tools. Strong knowledge of DOE cybersecurity policies, FISMA, NIST 800-53, and federal directives. Proven experience drafting and maintaining FISMA artifacts and managing A&A processes. NIST 800-53 Rev 5. Risk Management Framework. CRISC (or equivalent), CISSP, CISM, CISSP-ISSAP, or equivalent. Desired Skills Ability to balance technical architecture with compliance oversight. Strong communication skills for briefings, reporting, and stakeholder engagement. Experience leading audits, inspections, and risk assessments. Expertise in disaster recovery, COOP planning, and incident response. Strategic mindset with adaptability to emerging technologies and evolving threats. Reporting for information security activities Meet strategic information security objectives Manage security initiatives to support information security strategy and plan Address any information security related issues Implement the security controls specified in the security plan Conduct the information security risk assessment program Targeted security assessments to ensure appropriate level of security controls Maintain knowledge of general security administration programs and one or more security specialties (e. g. sensitive compartmented information, personnel security, technical security, operations security) Provide an interface to client information security audits Protect corporate cyber security information day to day Perform information security risk assessments and serves as an internal auditor for security issues Oversee the risk assessment and information security awareness Train all employees in effective information security measures Provide ad hoc information security and privacy assistance to projects and regional leaders and information security officers Reporting on business security incidents Create enterprise information security education and awareness platforms Escalate security project issues to management Provide periodic reporting on information security issues to the VC/VPIT Ensure all employees receive mandatory training in information security awareness and information security policies, guidelines and procedures Achieving security and privacy certifications
The Network Administrator supports the design, operation, and maintenance of the organization's enterprise network infrastructure. This role focuses on firewalls, routing, switching, VPNs, and network security, with a strong emphasis on Palo Alto, Cisco and Juniper technologies. The ideal candidate is comfortable handling day to day network operations, troubleshooting complex issues, and contributing to ongoing improvements in performance, reliability, and security. • Configure, maintain, and troubleshoot Juniper and Cisco switches, routers, and wireless infrastructure. • Administer and support Palo Alto firewalls, including security policies, NAT rules, VPNs, and threat prevention features. • Manage site to site and remote access VPNs, ensuring secure and reliable connectivity. • Monitor network performance, availability, and capacity using approved tools. • Perform routine maintenance, firmware upgrades, and hardware lifecycle tasks for network devices. • Implement and enforce network security policies, segmentation, and access controls. • Work with security teams to remediate vulnerabilities and maintain compliance with organizational standards. • Maintain accurate documentation of firewall rules, network diagrams, and configuration baselines. • Provide Tier II/III support for network related incidents, outages, and performance issues. • Diagnose and resolve issues involving routing, switching, firewall rules, DNS, DHCP, VLANs, and wireless connectivity. • Collaborate with systems, cloud, and security teams to support cross functional infrastructure needs. • Maintain up to date configuration records in the CMDB. • Follow established change management processes for network modifications. • Assist in planning and executing network upgrades, migrations, and new deployments. Minimum Qualifications • Bachelor's Degree in Information Technology , Computer Science or a related field or equivalent relevant experience; Master's Degree preferred. • 7-10 years of experience in information technology, systems administration or other IT related field . Other Job Specific Skills • Hands on experience with Palo Alto Networks firewalls (Pan OS, Panorama preferred). • Strong working knowledge of Cisco networking (Catalyst/Nexus switches, routers, wireless). • Solid understanding of TCP/IP, VLANs, routing protocols (OSPF/BGP), VPN technologies, and network security principles. • Experience with network monitoring and troubleshooting tools (e.g., SolarWinds, Wireshark). • Ability to read, update, and maintain network diagrams and documentation. • Proficiency in network monitoring tools, CLI-based administration, and automation frameworks. • Strong knowledge of LAN/WAN, firewalls, VPNs, and cloud networking (Azure). • Ability to support Windows, macOS, and Linux endpoints connected to enterprise networks. Preferred Qualifications • Palo Alto certifications (PCNSA, PCNSE). • Cisco certifications (CCNA, CCNP). • Juniper Networks certifications such as JNCIA, JNCIS, or JNCIP. • Experience with cloud networking (Azure/AWS) or SD WAN solutions. • Familiarity with Zero Trust concepts and modern security architectures . • Strong troubleshooting skills for network connectivity, performance, and security issues. • Excellent documentation and communication skills for technical and operational reporting. • Strong communication skills and the ability to work independently on complex tasks. • Configure, maintain, and troubleshoot Juniper and Cisco switches, routers, and wireless infrastructure. • Administer and support Palo Alto firewalls, including security policies, NAT rules, VPNs, and threat prevention features. • Manage site to site and remote access VPNs, ensuring secure and reliable connectivity. • Monitor network performance, availability, and capacity using approved tools. • Perform routine maintenance, firmware upgrades, and hardware lifecycle tasks for network devices. • Implement and enforce network security policies, segmentation, and access controls. • Work with security teams to remediate vulnerabilities and maintain compliance with organizational standards. • Maintain accurate documentation of firewall rules, network diagrams, and configuration baselines. • Provide Tier II/III support for network related incidents, outages, and performance issues. • Diagnose and resolve issues involving routing, switching, firewall rules, DNS, DHCP, VLANs, and wireless connectivity. • Collaborate with systems, cloud, and security teams to support cross functional infrastructure needs. • Maintain up to date configuration records in the CMDB. • Follow established change management processes for network modifications. • Assist in planning and executing network upgrades, migrations, and new deployments.
04/24/2026
Full time
The Network Administrator supports the design, operation, and maintenance of the organization's enterprise network infrastructure. This role focuses on firewalls, routing, switching, VPNs, and network security, with a strong emphasis on Palo Alto, Cisco and Juniper technologies. The ideal candidate is comfortable handling day to day network operations, troubleshooting complex issues, and contributing to ongoing improvements in performance, reliability, and security. • Configure, maintain, and troubleshoot Juniper and Cisco switches, routers, and wireless infrastructure. • Administer and support Palo Alto firewalls, including security policies, NAT rules, VPNs, and threat prevention features. • Manage site to site and remote access VPNs, ensuring secure and reliable connectivity. • Monitor network performance, availability, and capacity using approved tools. • Perform routine maintenance, firmware upgrades, and hardware lifecycle tasks for network devices. • Implement and enforce network security policies, segmentation, and access controls. • Work with security teams to remediate vulnerabilities and maintain compliance with organizational standards. • Maintain accurate documentation of firewall rules, network diagrams, and configuration baselines. • Provide Tier II/III support for network related incidents, outages, and performance issues. • Diagnose and resolve issues involving routing, switching, firewall rules, DNS, DHCP, VLANs, and wireless connectivity. • Collaborate with systems, cloud, and security teams to support cross functional infrastructure needs. • Maintain up to date configuration records in the CMDB. • Follow established change management processes for network modifications. • Assist in planning and executing network upgrades, migrations, and new deployments. Minimum Qualifications • Bachelor's Degree in Information Technology , Computer Science or a related field or equivalent relevant experience; Master's Degree preferred. • 7-10 years of experience in information technology, systems administration or other IT related field . Other Job Specific Skills • Hands on experience with Palo Alto Networks firewalls (Pan OS, Panorama preferred). • Strong working knowledge of Cisco networking (Catalyst/Nexus switches, routers, wireless). • Solid understanding of TCP/IP, VLANs, routing protocols (OSPF/BGP), VPN technologies, and network security principles. • Experience with network monitoring and troubleshooting tools (e.g., SolarWinds, Wireshark). • Ability to read, update, and maintain network diagrams and documentation. • Proficiency in network monitoring tools, CLI-based administration, and automation frameworks. • Strong knowledge of LAN/WAN, firewalls, VPNs, and cloud networking (Azure). • Ability to support Windows, macOS, and Linux endpoints connected to enterprise networks. Preferred Qualifications • Palo Alto certifications (PCNSA, PCNSE). • Cisco certifications (CCNA, CCNP). • Juniper Networks certifications such as JNCIA, JNCIS, or JNCIP. • Experience with cloud networking (Azure/AWS) or SD WAN solutions. • Familiarity with Zero Trust concepts and modern security architectures . • Strong troubleshooting skills for network connectivity, performance, and security issues. • Excellent documentation and communication skills for technical and operational reporting. • Strong communication skills and the ability to work independently on complex tasks. • Configure, maintain, and troubleshoot Juniper and Cisco switches, routers, and wireless infrastructure. • Administer and support Palo Alto firewalls, including security policies, NAT rules, VPNs, and threat prevention features. • Manage site to site and remote access VPNs, ensuring secure and reliable connectivity. • Monitor network performance, availability, and capacity using approved tools. • Perform routine maintenance, firmware upgrades, and hardware lifecycle tasks for network devices. • Implement and enforce network security policies, segmentation, and access controls. • Work with security teams to remediate vulnerabilities and maintain compliance with organizational standards. • Maintain accurate documentation of firewall rules, network diagrams, and configuration baselines. • Provide Tier II/III support for network related incidents, outages, and performance issues. • Diagnose and resolve issues involving routing, switching, firewall rules, DNS, DHCP, VLANs, and wireless connectivity. • Collaborate with systems, cloud, and security teams to support cross functional infrastructure needs. • Maintain up to date configuration records in the CMDB. • Follow established change management processes for network modifications. • Assist in planning and executing network upgrades, migrations, and new deployments.
VDI Systems Administrator Onsite - Germantown, MD US CITIZENSHIP REQURED We are looking for someone with strong Virtual Desktop Infrastructure experience to join an exciting project with the Dept of Energy. This role does not require a clearance and is a great way to expand expertise in a federal space! The VDI Systems Administrator will provide Tier III IT operations support across the Office of Information Management (OIM) and SC mission systems, with a focus on virtual desktop infrastructure (VDI) lifecycle management, performance optimization, and compliance. This role is responsible for operating and maintaining our VDI environment, primarily built on VMware Horizon, along with associated virtualization infrastructure (vSphere), ensuring secure, reliable, and compliant virtual desktop and application delivery in alignment with DOE directives. The ideal candidate will have strong expertise in VDI architecture, golden image management, policy enforcement, and automation, while supporting hybrid environments and evolving enterprise service delivery models. VDI / Virtual Desktop Infrastructure Management Administer and maintain the VMware Horizon VDI environment, including connection servers, security servers, Unified Access Gateways (UAGs), and instant clone/linked clone deployments. Manage Windows virtual desktops and published applications, ensuring secure baselines and compliance with organizational policies. Implement and enforce conditional access, Multi-Factor Authentication (MFA), and VDI security policies through Azure AD, VMware Access, and Group Policy. Support various VDI use cases, including persistent and non-persistent desktops, ensuring proper resource allocation and user experience. Provide Tier III support for VDI troubleshooting, virtual machine provisioning issues, and performance bottlenecks. VDI Lifecycle Management Oversee the provisioning, deployment, and retirement of virtual desktops and application layers across the enterprise. Maintain accurate records of VDI pool inventories, compliance status, and lifecycle tracking. Manage golden images, application delivery methods (e.g., App Volumes, MSIX App Attach), and user environment management solutions (e.g., DEM/UEM). Collaborate with cybersecurity teams to remediate vulnerabilities identified through VDI compliance gaps and ensure secure configurations. Monitoring & Compliance Continuously monitor VDI environment health, performance metrics (e.g., CPU, memory, IOPS, network latency), and user session quality. Generate and deliver compliance and audit reports related to VDI usage, security postures, and resource consumption to leadership and stakeholders. Detect and resolve VDI pool compliance failures, policy conflicts, and outages in line with Service Level Agreements (SLAs). Track and report on license utilization for VDI components and resource consumption. Configuration Management & Change Control Maintain and update the Configuration Management Database (CMDB) with VDI infrastructure components, virtual desktop images, and configurations. Submit all changes via the OIM-approved change management system in accordance with the Change Control Review (CCR) process. Evaluate proposed changes for technical and cybersecurity risk, ensuring compliance with secure baselines. Document and maintain VDI architecture, policies, Standard Operating Procedures (SOPs), and configuration records, reviewed quarterly or after major changes.
04/24/2026
Full time
VDI Systems Administrator Onsite - Germantown, MD US CITIZENSHIP REQURED We are looking for someone with strong Virtual Desktop Infrastructure experience to join an exciting project with the Dept of Energy. This role does not require a clearance and is a great way to expand expertise in a federal space! The VDI Systems Administrator will provide Tier III IT operations support across the Office of Information Management (OIM) and SC mission systems, with a focus on virtual desktop infrastructure (VDI) lifecycle management, performance optimization, and compliance. This role is responsible for operating and maintaining our VDI environment, primarily built on VMware Horizon, along with associated virtualization infrastructure (vSphere), ensuring secure, reliable, and compliant virtual desktop and application delivery in alignment with DOE directives. The ideal candidate will have strong expertise in VDI architecture, golden image management, policy enforcement, and automation, while supporting hybrid environments and evolving enterprise service delivery models. VDI / Virtual Desktop Infrastructure Management Administer and maintain the VMware Horizon VDI environment, including connection servers, security servers, Unified Access Gateways (UAGs), and instant clone/linked clone deployments. Manage Windows virtual desktops and published applications, ensuring secure baselines and compliance with organizational policies. Implement and enforce conditional access, Multi-Factor Authentication (MFA), and VDI security policies through Azure AD, VMware Access, and Group Policy. Support various VDI use cases, including persistent and non-persistent desktops, ensuring proper resource allocation and user experience. Provide Tier III support for VDI troubleshooting, virtual machine provisioning issues, and performance bottlenecks. VDI Lifecycle Management Oversee the provisioning, deployment, and retirement of virtual desktops and application layers across the enterprise. Maintain accurate records of VDI pool inventories, compliance status, and lifecycle tracking. Manage golden images, application delivery methods (e.g., App Volumes, MSIX App Attach), and user environment management solutions (e.g., DEM/UEM). Collaborate with cybersecurity teams to remediate vulnerabilities identified through VDI compliance gaps and ensure secure configurations. Monitoring & Compliance Continuously monitor VDI environment health, performance metrics (e.g., CPU, memory, IOPS, network latency), and user session quality. Generate and deliver compliance and audit reports related to VDI usage, security postures, and resource consumption to leadership and stakeholders. Detect and resolve VDI pool compliance failures, policy conflicts, and outages in line with Service Level Agreements (SLAs). Track and report on license utilization for VDI components and resource consumption. Configuration Management & Change Control Maintain and update the Configuration Management Database (CMDB) with VDI infrastructure components, virtual desktop images, and configurations. Submit all changes via the OIM-approved change management system in accordance with the Change Control Review (CCR) process. Evaluate proposed changes for technical and cybersecurity risk, ensuring compliance with secure baselines. Document and maintain VDI architecture, policies, Standard Operating Procedures (SOPs), and configuration records, reviewed quarterly or after major changes.
Dunhill Professional Search
Annapolis Junction, Maryland
Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to specifications provided. Builds, deploys and maintains programs, Web Site pages and applications. Develops and improves site navigation and applications. Responsible for the design, development, and configuration of software systems to meet market and/or client requirements. Updates, repairs, modifies, and expands existing computer programs. Writes, tests, and maintains computer programs. Develops code using Java, C#, HTML, Javascript, or other programming languages. Responsible for design and development of Java code for a large-scale Federal IT Program. Provides technical site maintenance and advice on moderately complex issues related to animation, search engine techniques, link integrity, navigation, browsers, graphics, and other technical web developments. Prepares functional specifications from which programs will be written and then designs, codes, debugs, and documents programs. Develops the requirements of a product from inception to conclusion. Tests, debugs, and refines the software to produce the required product Designs user interfaces of interactive web applications including ADA 508, and cross browser compliance. Maintains compliance with standards and conventions in developing programs. Develops required specifications for simple to moderately complex programs or problems. Conducts systems tests, monitors test results, and takes appropriate corrective action for the non-routine issues. Creates coded unit tests and works with Testers/Information Assurance to address program and/or security findings. Prepares required documentation, including block diagrams, logic flow charts and software program documentation. Minimum Qualifications Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. 2+ years of experience with programming or web development activities. Active Secret Clearance Ability to report to the client site in Annapolis Junction, MD (up to 3x a week) Other Job Specific Skills 2+ years of hands-on Java development experience. Experience with J2EE or other Java frameworks (e.g. Spring). Experience using Java development tools (e.g. Eclipse, JUnit, Git). 2 years of work experience with Web development technologies (HTML, JSP, etc.). 2+ years of Java development experience in order to build enterprise applications. 2+ years' experience with using Java development tools (e.g. Eclipse, JUnit, Git). Ability to report to the client site in Annapolis, Junction, MD (up to 3x a week). Experience in a large scale Federal IT Program. Experience with SAFe Agile delivery framework. Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. 2+ years of experience with programming or web development activities. 2+ years of hands-on Java development experience. 2 years of work experience with Web development technologies (HTML, JSP, etc.). 2+ years of Java development experience in order to build enterprise applications. 2+ years' experience with using Java development tools (e.g. Eclipse, JUnit, Git). Active Secret Clearance Ability to report to the client site in Annapolis Junction, MD (up to 3x a week)
04/24/2026
Full time
Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to specifications provided. Builds, deploys and maintains programs, Web Site pages and applications. Develops and improves site navigation and applications. Responsible for the design, development, and configuration of software systems to meet market and/or client requirements. Updates, repairs, modifies, and expands existing computer programs. Writes, tests, and maintains computer programs. Develops code using Java, C#, HTML, Javascript, or other programming languages. Responsible for design and development of Java code for a large-scale Federal IT Program. Provides technical site maintenance and advice on moderately complex issues related to animation, search engine techniques, link integrity, navigation, browsers, graphics, and other technical web developments. Prepares functional specifications from which programs will be written and then designs, codes, debugs, and documents programs. Develops the requirements of a product from inception to conclusion. Tests, debugs, and refines the software to produce the required product Designs user interfaces of interactive web applications including ADA 508, and cross browser compliance. Maintains compliance with standards and conventions in developing programs. Develops required specifications for simple to moderately complex programs or problems. Conducts systems tests, monitors test results, and takes appropriate corrective action for the non-routine issues. Creates coded unit tests and works with Testers/Information Assurance to address program and/or security findings. Prepares required documentation, including block diagrams, logic flow charts and software program documentation. Minimum Qualifications Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. 2+ years of experience with programming or web development activities. Active Secret Clearance Ability to report to the client site in Annapolis Junction, MD (up to 3x a week) Other Job Specific Skills 2+ years of hands-on Java development experience. Experience with J2EE or other Java frameworks (e.g. Spring). Experience using Java development tools (e.g. Eclipse, JUnit, Git). 2 years of work experience with Web development technologies (HTML, JSP, etc.). 2+ years of Java development experience in order to build enterprise applications. 2+ years' experience with using Java development tools (e.g. Eclipse, JUnit, Git). Ability to report to the client site in Annapolis, Junction, MD (up to 3x a week). Experience in a large scale Federal IT Program. Experience with SAFe Agile delivery framework. Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. 2+ years of experience with programming or web development activities. 2+ years of hands-on Java development experience. 2 years of work experience with Web development technologies (HTML, JSP, etc.). 2+ years of Java development experience in order to build enterprise applications. 2+ years' experience with using Java development tools (e.g. Eclipse, JUnit, Git). Active Secret Clearance Ability to report to the client site in Annapolis Junction, MD (up to 3x a week)
Dunhill Professional Search
Washington, Washington DC
If you're an AI/ML engineer who thrives where data science meets production engineering, we have a rare opportunity to deploy cutting-edge AI at the Department of Energy - where your work powers the nation's most critical missions. The AI Integration Specialist is a pivotal role bridging the gap between cutting-edge AI/ML research and robust, scalable production systems. This individual possesses a deep understanding of data science principles, machine learning model development, and the engineering expertise required to seamlessly integrate AI solutions into existing enterprise applications and workflows. They will be responsible for ensuring that AI initiatives not only deliver accurate and insightful models but are also designed for operational efficiency, maintainability, and measurable business impact, particularly within the Department of Energy's critical missions. Design, develop, and implement strategies for integrating trained AI/ML models (e.g., predictive analytics, natural language processing, computer vision) into various existing IT systems, operational platforms, and software applications within the DOE. Work closely with data scientists to understand model requirements, performance characteristics, and potential integration challenges. Collaborate with software engineers and DevOps teams to establish robust CI/CD pipelines for AI/ML models, ensuring automated testing, deployment, and monitoring. Develop APIs and microservices to expose AI model functionality for consumption by other applications and services. Implement and manage MLOps (Machine Learning Operations) best practices, including model versioning, lineage tracking, performance monitoring, drift detection, and retraining strategies. Establish monitoring dashboards and alerting systems to proactively identify and address issues related to model performance, data quality, and system health. Act as a key liaison between data science teams and engineering/IT teams, translating complex data science concepts and model requirements into actionable engineering tasks. Provide technical guidance to data scientists on model design for production readiness, including considerations for efficiency, latency, and resource utilization. Participate in data exploration, feature engineering, and model experimentation processes to ensure data quality and model interpretability from an integration perspective. Contribute to the architectural design of AI-enabled systems, advocating for scalable, secure, and resilient solutions. Research and evaluate new technologies, frameworks, and tools for AI integration, deployment, and MLOps. Develop and enforce coding standards, documentation practices, and best practices for AI/ML system development. Communicate technical complexities and integration progress effectively to both technical and non-technical stakeholders, including senior leadership. Develop training materials and conduct demos for internal teams on AI integration tools, processes, and best practices. Minimum Qualifications Bachelor's or Master's degree in computer science, Data Science, Artificial Intelligence, Electrical Engineering, or a related quantitative field. 12+ years of experience in a technical field with 5 years of experience in software engineering, data engineering, or MLOps, with a strong focus on deploying and integrating AI/ML models. Experience working with large datasets, distributed computing, and cloud platforms (e.g., Azure, AWS, GCP). Other Job Specific Skills Strong proficiency in Python is essential; experience with Java, Scala, or Go is a plus. Experience with MLOps platforms and tools. Solid understanding of databases (SQL, NoSQL), data warehousing concepts, and data streaming technologies. Experience with cloud-native services for compute, storage, and AI/ML (e.g., Azure Machine Learning, AWS SageMaker, Google Cloud AI Platform). Experience designing and implementing RESTful APIs for AI services. Strong understanding of software development best practices, including version control (Git), testing, and code review. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills, with the ability to bridge technical and business gaps. Preferred Skills Experience working within a government agency or highly regulated industry. Familiarity with specific DOE-relevant domains (e.g., energy systems, national security, scientific computing). Experience with real-time AI inference and low-latency systems. Certifications in cloud computing (e.g., Azure AI Engineer, AWS Machine Learning Specialty).
04/24/2026
Full time
If you're an AI/ML engineer who thrives where data science meets production engineering, we have a rare opportunity to deploy cutting-edge AI at the Department of Energy - where your work powers the nation's most critical missions. The AI Integration Specialist is a pivotal role bridging the gap between cutting-edge AI/ML research and robust, scalable production systems. This individual possesses a deep understanding of data science principles, machine learning model development, and the engineering expertise required to seamlessly integrate AI solutions into existing enterprise applications and workflows. They will be responsible for ensuring that AI initiatives not only deliver accurate and insightful models but are also designed for operational efficiency, maintainability, and measurable business impact, particularly within the Department of Energy's critical missions. Design, develop, and implement strategies for integrating trained AI/ML models (e.g., predictive analytics, natural language processing, computer vision) into various existing IT systems, operational platforms, and software applications within the DOE. Work closely with data scientists to understand model requirements, performance characteristics, and potential integration challenges. Collaborate with software engineers and DevOps teams to establish robust CI/CD pipelines for AI/ML models, ensuring automated testing, deployment, and monitoring. Develop APIs and microservices to expose AI model functionality for consumption by other applications and services. Implement and manage MLOps (Machine Learning Operations) best practices, including model versioning, lineage tracking, performance monitoring, drift detection, and retraining strategies. Establish monitoring dashboards and alerting systems to proactively identify and address issues related to model performance, data quality, and system health. Act as a key liaison between data science teams and engineering/IT teams, translating complex data science concepts and model requirements into actionable engineering tasks. Provide technical guidance to data scientists on model design for production readiness, including considerations for efficiency, latency, and resource utilization. Participate in data exploration, feature engineering, and model experimentation processes to ensure data quality and model interpretability from an integration perspective. Contribute to the architectural design of AI-enabled systems, advocating for scalable, secure, and resilient solutions. Research and evaluate new technologies, frameworks, and tools for AI integration, deployment, and MLOps. Develop and enforce coding standards, documentation practices, and best practices for AI/ML system development. Communicate technical complexities and integration progress effectively to both technical and non-technical stakeholders, including senior leadership. Develop training materials and conduct demos for internal teams on AI integration tools, processes, and best practices. Minimum Qualifications Bachelor's or Master's degree in computer science, Data Science, Artificial Intelligence, Electrical Engineering, or a related quantitative field. 12+ years of experience in a technical field with 5 years of experience in software engineering, data engineering, or MLOps, with a strong focus on deploying and integrating AI/ML models. Experience working with large datasets, distributed computing, and cloud platforms (e.g., Azure, AWS, GCP). Other Job Specific Skills Strong proficiency in Python is essential; experience with Java, Scala, or Go is a plus. Experience with MLOps platforms and tools. Solid understanding of databases (SQL, NoSQL), data warehousing concepts, and data streaming technologies. Experience with cloud-native services for compute, storage, and AI/ML (e.g., Azure Machine Learning, AWS SageMaker, Google Cloud AI Platform). Experience designing and implementing RESTful APIs for AI services. Strong understanding of software development best practices, including version control (Git), testing, and code review. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills, with the ability to bridge technical and business gaps. Preferred Skills Experience working within a government agency or highly regulated industry. Familiarity with specific DOE-relevant domains (e.g., energy systems, national security, scientific computing). Experience with real-time AI inference and low-latency systems. Certifications in cloud computing (e.g., Azure AI Engineer, AWS Machine Learning Specialty).
The NOC Network Administrator, Junior supports day to day operation of systems and core services within a network operations center to help ensure reliable, highly available network and server infrastructure. The role focuses on monitoring servers and key applications, performing basic troubleshooting, and executing routine maintenance activities under the guidance of senior administrators. Working in a fast paced federal IT environment, this position follows standard operating procedures for patching, backup and restore activities, and user and access management. The administrator documents system configurations, changes, and incidents to support auditability, shift handoffs, and continuous improvement. Key Responsibilities Monitor servers, operating systems, and core services using monitoring and ticketing tools, reviewing alerts, opening and updating tickets, and prioritizing actions based on business impact. Execute standard operating procedures for routine system administration tasks, including patching, basic configuration changes, service restarts, backup verification, and user and group management. Assist with troubleshooting common system issues such as resource exhaustion, service failures, login problems, and connectivity issues, escalating incidents that exceed runbook guidance. Maintain accurate system documentation, including inventories, configuration baselines, change records, and incident logs to support compliance and repeatable operations. Participate in coordinated incident response, backup and recovery activities, and security related monitoring tasks that intersect with system administration. Collaborate with network and security teams to gather diagnostic information, implement corrective actions, and validate restoration of affected services. Support adherence to incident, change, and configuration management processes, ensuring that activities are properly recorded and approved. Required Qualifications Bachelor's degree in Computer Science, Information Technology, or a related field, or equivalent relevant experience. 0-3 years of experience in junior system administration, NOC support, or similar infrastructure operations roles focused on monitoring and first line remediation. Foundational understanding of system administration concepts, including user and group management, file system permissions, basic networking, and routine health checks for Windows and/or Linux servers. Training or practical experience with system monitoring tools, ticketing systems, backup solutions, and basic virtualization concepts. Good analytical, problem solving, and communication skills, with the ability to work effectively under pressure and document system configurations, changes, and incidents accurately. Candidates must be US citizens with a current SECRET security clearance (active within last 24 months). Candidates should have a current Security+ or other DoD 8180 IAT-II certification. Preferred Qualifications Hands on experience administering servers and core services in a NOC or data center operations environment using common tools and consoles. Entry level infrastructure certifications such as CompTIA Network+, CompTIA Security+, or platform specific junior administrator certifications. Familiarity with ITIL practices and experience working in a structured operational environment with formal procedures and shift handoffs. Monitor servers, operating systems, and core services using monitoring and ticketing tools, reviewing alerts, opening and updating tickets, and prioritizing actions based on business impact. Execute standard operating procedures for routine system administration tasks, including patching, basic configuration changes, service restarts, backup verification, and user and group management. Assist with troubleshooting common system issues such as resource exhaustion, service failures, login problems, and connectivity issues, escalating incidents that exceed runbook guidance. Maintain accurate system documentation, including inventories, configuration baselines, change records, and incident logs to support compliance and repeatable operations. Participate in coordinated incident response, backup and recovery activities, and security related monitoring tasks that intersect with system administration. Collaborate with network and security teams to gather diagnostic information, implement corrective actions, and validate restoration of affected services. Support adherence to incident, change, and configuration management processes, ensuring that activities are properly recorded and approved.
04/24/2026
Full time
The NOC Network Administrator, Junior supports day to day operation of systems and core services within a network operations center to help ensure reliable, highly available network and server infrastructure. The role focuses on monitoring servers and key applications, performing basic troubleshooting, and executing routine maintenance activities under the guidance of senior administrators. Working in a fast paced federal IT environment, this position follows standard operating procedures for patching, backup and restore activities, and user and access management. The administrator documents system configurations, changes, and incidents to support auditability, shift handoffs, and continuous improvement. Key Responsibilities Monitor servers, operating systems, and core services using monitoring and ticketing tools, reviewing alerts, opening and updating tickets, and prioritizing actions based on business impact. Execute standard operating procedures for routine system administration tasks, including patching, basic configuration changes, service restarts, backup verification, and user and group management. Assist with troubleshooting common system issues such as resource exhaustion, service failures, login problems, and connectivity issues, escalating incidents that exceed runbook guidance. Maintain accurate system documentation, including inventories, configuration baselines, change records, and incident logs to support compliance and repeatable operations. Participate in coordinated incident response, backup and recovery activities, and security related monitoring tasks that intersect with system administration. Collaborate with network and security teams to gather diagnostic information, implement corrective actions, and validate restoration of affected services. Support adherence to incident, change, and configuration management processes, ensuring that activities are properly recorded and approved. Required Qualifications Bachelor's degree in Computer Science, Information Technology, or a related field, or equivalent relevant experience. 0-3 years of experience in junior system administration, NOC support, or similar infrastructure operations roles focused on monitoring and first line remediation. Foundational understanding of system administration concepts, including user and group management, file system permissions, basic networking, and routine health checks for Windows and/or Linux servers. Training or practical experience with system monitoring tools, ticketing systems, backup solutions, and basic virtualization concepts. Good analytical, problem solving, and communication skills, with the ability to work effectively under pressure and document system configurations, changes, and incidents accurately. Candidates must be US citizens with a current SECRET security clearance (active within last 24 months). Candidates should have a current Security+ or other DoD 8180 IAT-II certification. Preferred Qualifications Hands on experience administering servers and core services in a NOC or data center operations environment using common tools and consoles. Entry level infrastructure certifications such as CompTIA Network+, CompTIA Security+, or platform specific junior administrator certifications. Familiarity with ITIL practices and experience working in a structured operational environment with formal procedures and shift handoffs. Monitor servers, operating systems, and core services using monitoring and ticketing tools, reviewing alerts, opening and updating tickets, and prioritizing actions based on business impact. Execute standard operating procedures for routine system administration tasks, including patching, basic configuration changes, service restarts, backup verification, and user and group management. Assist with troubleshooting common system issues such as resource exhaustion, service failures, login problems, and connectivity issues, escalating incidents that exceed runbook guidance. Maintain accurate system documentation, including inventories, configuration baselines, change records, and incident logs to support compliance and repeatable operations. Participate in coordinated incident response, backup and recovery activities, and security related monitoring tasks that intersect with system administration. Collaborate with network and security teams to gather diagnostic information, implement corrective actions, and validate restoration of affected services. Support adherence to incident, change, and configuration management processes, ensuring that activities are properly recorded and approved.
The PKI Engineer, designs, implements, and operates enterprise Public Key Infrastructure services that underpin secure authentication, encryption, and digital signatures across mission critical systems. The role serves as the primary technical authority for certificate lifecycle management, key management, and trust architectures spanning on premises and cloud environments. The engineer defines PKI standards, policies, and integration patterns for applications, devices, and identities, and leads troubleshooting, modernization, and automation initiatives to keep cryptographic services resilient, scalable, and audit ready in a highly regulated federal IT environment. Key Responsibilities Architect and maintain enterprise PKI solutions, including certificate authorities, registration authorities, OCSP/CRL distribution, and hardware security modules, ensuring high availability and crypto agility. Oversee end to end certificate lifecycle management for users, services, devices, and workloads, including automated issuance, renewal, revocation, and inventory across hybrid and multi cloud environments. Design PKI trust models and integration patterns for TLS/SSL, S/MIME, code signing, VPN, Wi Fi, and device authentication in support of zero trust access and strong identity assurance. Implement and enforce PKI security policies, certificate policies, and certification practice statements, aligning configurations with applicable government and industry cryptographic standards. Build PowerShell or Python automation, APIs, and tooling to streamline PKI operations, monitoring, key rotation, and compliance reporting at enterprise scale. Lead incident response for certificate related outages or compromises, including rapid revocation, re issuance, key rotation, and coordination with security operations and incident response teams. Collaborate with identity, network, and application security architects to embed PKI requirements into new platforms and remediate legacy or non compliant cryptographic implementations. Guide risk assessments and audits focused on cryptographic controls, producing remediation roadmaps to address algorithm deprecation, weak ciphers, and end of life PKI components. Required Qualifications Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent relevant experience. 8+ years of experience in cybersecurity engineering or closely related roles, including at least 5 years focused on PKI architecture and operations. Strong background in cybersecurity, network security, and information systems, with deep understanding of standards based security architectures, identity services, and device profiling. Demonstrated expertise with enterprise PKI platforms, certificate lifecycle management, hardware security modules, and related tooling across on prem and cloud environments. Proficiency with automation and scripting (such as PowerShell or Python) to manage PKI operations, monitoring, and reporting at scale. Excellent problem solving, analytical, communication, and interpersonal skills, with the ability to manage multiple initiatives and incident responses effectively. Secret Clearance Required U.S. citizenship required. Less than 10% travel required. Preferred Qualifications Experience engineering PKI for large federal or defense environments, including integration with smart cards, PIV/CAC, and enterprise identity governance platforms. Professional certifications such as CISSP, CCSP, or vendor PKI/cryptography credentials demonstrating advanced knowledge of applied cryptography and key management. Experience leading cryptographic modernization programs (for example, algorithm migrations, key length upgrades, or post quantum readiness initiatives). Familiarity with zero trust architectures and how PKI enables strong device, user, and service identity within those models. - Hands-on experience designing and managing PKI environments (CA/RA, OCSP/CRL, HSMs, key management), not just supporting them - Proven ownership of end-to-end certificate processes (issuance, renewal, revocation, inventory) across users, devices, and systems - Experience integrating PKI with IAM and security systems (TLS/SSL, VPN, SSO, device authentication, Zero Trust environments) - Strong scripting/automation skills (PowerShell/Python/APIs) to manage PKI operations, key rotation, monitoring, and reporting at scale - Background in regulated environments (NIST, FISMA, FedRAMP, DoD) with experience in audits, crypto policies, and incident response
04/23/2026
Full time
The PKI Engineer, designs, implements, and operates enterprise Public Key Infrastructure services that underpin secure authentication, encryption, and digital signatures across mission critical systems. The role serves as the primary technical authority for certificate lifecycle management, key management, and trust architectures spanning on premises and cloud environments. The engineer defines PKI standards, policies, and integration patterns for applications, devices, and identities, and leads troubleshooting, modernization, and automation initiatives to keep cryptographic services resilient, scalable, and audit ready in a highly regulated federal IT environment. Key Responsibilities Architect and maintain enterprise PKI solutions, including certificate authorities, registration authorities, OCSP/CRL distribution, and hardware security modules, ensuring high availability and crypto agility. Oversee end to end certificate lifecycle management for users, services, devices, and workloads, including automated issuance, renewal, revocation, and inventory across hybrid and multi cloud environments. Design PKI trust models and integration patterns for TLS/SSL, S/MIME, code signing, VPN, Wi Fi, and device authentication in support of zero trust access and strong identity assurance. Implement and enforce PKI security policies, certificate policies, and certification practice statements, aligning configurations with applicable government and industry cryptographic standards. Build PowerShell or Python automation, APIs, and tooling to streamline PKI operations, monitoring, key rotation, and compliance reporting at enterprise scale. Lead incident response for certificate related outages or compromises, including rapid revocation, re issuance, key rotation, and coordination with security operations and incident response teams. Collaborate with identity, network, and application security architects to embed PKI requirements into new platforms and remediate legacy or non compliant cryptographic implementations. Guide risk assessments and audits focused on cryptographic controls, producing remediation roadmaps to address algorithm deprecation, weak ciphers, and end of life PKI components. Required Qualifications Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field, or equivalent relevant experience. 8+ years of experience in cybersecurity engineering or closely related roles, including at least 5 years focused on PKI architecture and operations. Strong background in cybersecurity, network security, and information systems, with deep understanding of standards based security architectures, identity services, and device profiling. Demonstrated expertise with enterprise PKI platforms, certificate lifecycle management, hardware security modules, and related tooling across on prem and cloud environments. Proficiency with automation and scripting (such as PowerShell or Python) to manage PKI operations, monitoring, and reporting at scale. Excellent problem solving, analytical, communication, and interpersonal skills, with the ability to manage multiple initiatives and incident responses effectively. Secret Clearance Required U.S. citizenship required. Less than 10% travel required. Preferred Qualifications Experience engineering PKI for large federal or defense environments, including integration with smart cards, PIV/CAC, and enterprise identity governance platforms. Professional certifications such as CISSP, CCSP, or vendor PKI/cryptography credentials demonstrating advanced knowledge of applied cryptography and key management. Experience leading cryptographic modernization programs (for example, algorithm migrations, key length upgrades, or post quantum readiness initiatives). Familiarity with zero trust architectures and how PKI enables strong device, user, and service identity within those models. - Hands-on experience designing and managing PKI environments (CA/RA, OCSP/CRL, HSMs, key management), not just supporting them - Proven ownership of end-to-end certificate processes (issuance, renewal, revocation, inventory) across users, devices, and systems - Experience integrating PKI with IAM and security systems (TLS/SSL, VPN, SSO, device authentication, Zero Trust environments) - Strong scripting/automation skills (PowerShell/Python/APIs) to manage PKI operations, key rotation, monitoring, and reporting at scale - Background in regulated environments (NIST, FISMA, FedRAMP, DoD) with experience in audits, crypto policies, and incident response
System Admin - Patching / SSCM Can be staffed in Oak Ridge, TN; Lemont, IL; or Germantown, MD U.S Citizenship Required The Patching / SCCM Administrator will provide Tier III IT operations support across the Office of Information Management (OIM) and SC mission systems, with a focus on endpoint management, patching, and compliance. This role is responsible for operating and maintaining Microsoft Endpoint Configuration Manager (SCCM), Intune, and related patching infrastructure, ensuring timely updates, secure baselines, and compliance with DOE directives. The ideal candidate will have strong expertise in Windows desktop/server patching, automation, and reporting, while supporting hybrid environments and evolving enterprise service delivery models. Plan, schedule, and deploy Windows OS and application patches across servers and endpoints in accordance with OIM policy. Validate patch compliance against secure configuration baselines and DOE directives. Perform pre- and post-patch testing, documenting results and mitigating issues. Maintain patch deployment records, including maintenance logs, validation history, and compliance reports. Collaborate with cybersecurity teams to remediate vulnerabilities identified through patching gaps. Administer and maintain Microsoft Endpoint Configuration Manager (SCCM), including collections, deployments, task sequences, and reporting. Support Microsoft Intune for mobile device and modern endpoint management. Develop and maintain automation scripts (PowerShell, Azure CLI) to streamline patching and endpoint management tasks. Manage software distribution, OS imaging, and application packaging for enterprise endpoints. Monitor SCCM infrastructure health, including site servers, distribution points, and SQL databases. Continuously monitor patch compliance, endpoint health, and SCCM infrastructure performance. Generate and deliver compliance reports to leadership and stakeholders. Track and report on capacity utilization, resource consumption, and licensing compliance. Detect and resolve patching failures, bottlenecks, and outages in line with SLAs. Maintain and update the Configuration Management Database (CMDB) with patching and endpoint configuration items. Submit all patching changes via the OIM-approved change management system in accordance with the Change Control Review (CCR) process. Evaluate proposed changes for technical and cybersecurity risk, ensuring compliance with secure baselines. Maintain documentation of patching SOPs, SCCM configurations, and endpoint policies, reviewed quarterly or after major changes. Minimum Qualifications Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience; Master's Degree preferred. U.S Citizenship Demonstrated technical proficiency equivalent to industry-recognized certifications, such as: o Microsoft Certified: Endpoint Administrator Associate o Microsoft Certified: Windows Server Hybrid Administrator Associate o CompTIA Security+ or Network+ Vendor-specific certifications in endpoint security or patch management platforms Proficiency in PowerShell scripting, SCCM administration, and automation tools. 7-10 years of experience in information technology, systems administration or other IT related field. Other Job Specific Skills Strong knowledge of Windows OS patching, SCCM infrastructure, Intune, and compliance frameworks. Ability to support Windows, macOS, and Linux endpoints as required. Experience with hybrid endpoint management (SCCM + Intune). Familiarity with vulnerability management tools (e.g., Tenable, Qualys) and integration with patching workflows. Strong troubleshooting skills for patch deployment failures, SCCM infrastructure issues, and endpoint compliance gaps. Excellent documentation and communication skills for compliance reporting and operational transparency.
04/23/2026
Full time
System Admin - Patching / SSCM Can be staffed in Oak Ridge, TN; Lemont, IL; or Germantown, MD U.S Citizenship Required The Patching / SCCM Administrator will provide Tier III IT operations support across the Office of Information Management (OIM) and SC mission systems, with a focus on endpoint management, patching, and compliance. This role is responsible for operating and maintaining Microsoft Endpoint Configuration Manager (SCCM), Intune, and related patching infrastructure, ensuring timely updates, secure baselines, and compliance with DOE directives. The ideal candidate will have strong expertise in Windows desktop/server patching, automation, and reporting, while supporting hybrid environments and evolving enterprise service delivery models. Plan, schedule, and deploy Windows OS and application patches across servers and endpoints in accordance with OIM policy. Validate patch compliance against secure configuration baselines and DOE directives. Perform pre- and post-patch testing, documenting results and mitigating issues. Maintain patch deployment records, including maintenance logs, validation history, and compliance reports. Collaborate with cybersecurity teams to remediate vulnerabilities identified through patching gaps. Administer and maintain Microsoft Endpoint Configuration Manager (SCCM), including collections, deployments, task sequences, and reporting. Support Microsoft Intune for mobile device and modern endpoint management. Develop and maintain automation scripts (PowerShell, Azure CLI) to streamline patching and endpoint management tasks. Manage software distribution, OS imaging, and application packaging for enterprise endpoints. Monitor SCCM infrastructure health, including site servers, distribution points, and SQL databases. Continuously monitor patch compliance, endpoint health, and SCCM infrastructure performance. Generate and deliver compliance reports to leadership and stakeholders. Track and report on capacity utilization, resource consumption, and licensing compliance. Detect and resolve patching failures, bottlenecks, and outages in line with SLAs. Maintain and update the Configuration Management Database (CMDB) with patching and endpoint configuration items. Submit all patching changes via the OIM-approved change management system in accordance with the Change Control Review (CCR) process. Evaluate proposed changes for technical and cybersecurity risk, ensuring compliance with secure baselines. Maintain documentation of patching SOPs, SCCM configurations, and endpoint policies, reviewed quarterly or after major changes. Minimum Qualifications Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience; Master's Degree preferred. U.S Citizenship Demonstrated technical proficiency equivalent to industry-recognized certifications, such as: o Microsoft Certified: Endpoint Administrator Associate o Microsoft Certified: Windows Server Hybrid Administrator Associate o CompTIA Security+ or Network+ Vendor-specific certifications in endpoint security or patch management platforms Proficiency in PowerShell scripting, SCCM administration, and automation tools. 7-10 years of experience in information technology, systems administration or other IT related field. Other Job Specific Skills Strong knowledge of Windows OS patching, SCCM infrastructure, Intune, and compliance frameworks. Ability to support Windows, macOS, and Linux endpoints as required. Experience with hybrid endpoint management (SCCM + Intune). Familiarity with vulnerability management tools (e.g., Tenable, Qualys) and integration with patching workflows. Strong troubleshooting skills for patch deployment failures, SCCM infrastructure issues, and endpoint compliance gaps. Excellent documentation and communication skills for compliance reporting and operational transparency.
Responsible for supporting the sustainment of Applications/Services providing the backend administration and support in the Oracle Cloud Infrastructure. Assist in defining requirements, designing and building data center technology components and testing efforts. Responsibilities and Duties Familiarity with ALM Octane, UFT, LoadRunner, Dynatrace, ReadyAPI, CyberArk, VMWare/Horizon is preferred Installs Application client tools on VDI Images/Pools Troubleshoots connections to Applications and integrations Load Balancing Configuration for Applications Performs Application configuration with SAML/SSO Authentication Provides Level 2 and 3 support for related integration issues Creates a management plan, validates sizing, and forecasted sizing Maintains licenses and key secrets in vault Provides STIGs and CDRL Documentation Minimum Qualifications Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience 7-10 years of experience in information technology, systems administration or other IT related field. CompTIA Security+ US Citizenship Security Requirement Active Secret level clearance Other Job Specific Skills Windows and Linux Environment Administration and configuration of ALM Octane, UFT, LoadRunner, Dynatrace, ReadyAPI,VMWare/Horizon is preferred Installing Application client tools on VDI Images/Pools STIG experience CDRL documentation VMware VDI Microsoft Windows Server Administration Micro Focus Application Lifecycle Management (ALM) Octane Familiarity with ALM Octane, UFT, LoadRunner, Dynatrace, ReadyAPI, CyberArk, VMWare/Horizon is preferred Provides Level 2 and 3 support for related integration issues CompTIA Security+ Active Secret level clearance Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience
04/23/2026
Full time
Responsible for supporting the sustainment of Applications/Services providing the backend administration and support in the Oracle Cloud Infrastructure. Assist in defining requirements, designing and building data center technology components and testing efforts. Responsibilities and Duties Familiarity with ALM Octane, UFT, LoadRunner, Dynatrace, ReadyAPI, CyberArk, VMWare/Horizon is preferred Installs Application client tools on VDI Images/Pools Troubleshoots connections to Applications and integrations Load Balancing Configuration for Applications Performs Application configuration with SAML/SSO Authentication Provides Level 2 and 3 support for related integration issues Creates a management plan, validates sizing, and forecasted sizing Maintains licenses and key secrets in vault Provides STIGs and CDRL Documentation Minimum Qualifications Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience 7-10 years of experience in information technology, systems administration or other IT related field. CompTIA Security+ US Citizenship Security Requirement Active Secret level clearance Other Job Specific Skills Windows and Linux Environment Administration and configuration of ALM Octane, UFT, LoadRunner, Dynatrace, ReadyAPI,VMWare/Horizon is preferred Installing Application client tools on VDI Images/Pools STIG experience CDRL documentation VMware VDI Microsoft Windows Server Administration Micro Focus Application Lifecycle Management (ALM) Octane Familiarity with ALM Octane, UFT, LoadRunner, Dynatrace, ReadyAPI, CyberArk, VMWare/Horizon is preferred Provides Level 2 and 3 support for related integration issues CompTIA Security+ Active Secret level clearance Bachelor's Degree in Information Technology, Computer Science or a related field or equivalent relevant experience
A Cybersecurity Lead will set strategic directions and oversight for the entire Assessment & Authorization and Vulnerability Management teams, including A&A Analysts, A&A Specialists, A&A SMEs, A&A Security Engineers, A&A Architects, Vulnerability Management Analysts, and Vulnerability Management Engineers to deliver the cyber authorization services. A Cybersecurity Lead will develop project management plans such as Work Breakdown Structure, mentor and guide team members on the preparation of technical deliverables and resolve project issues, prepares progress/status reports on technical deliverables, and monitor contractual requirements bringing in help from outside the project as needed to mitigate risks. A Cybersecurity Lead will also serve as a primary interface for the client and ASM leadership to answer questions, address concerns, and provide status/updates. Additionally, a Cybersecurity Lead will have at least five years of working knowledge and experience with one or more of the following Federal security frameworks (FedRAMP, FISMA, Zero Trust Maturity Model, RMF, and NIST SP 800 series and NIST SP 800-53) and GRC tools (e.g. XACTA, ArchAngel , eMASS , CSAM) A Cyber Security Lead is the manager of all SOC analysts and is the primary representative of the SOC to external stakeholders. The SOC Lead's primary responsibilities include managing the shift work analysts, developing training plans, developing and approving SLA monitoring solutions, ensuing ongoing analyst certification, conducting employee performance evaluations, and providing overall strategic direction for the SOC. • Implement and oversee baseline security configurations and controls. • Monitor and report on cybersecurity metrics, ensuring compliance with DOE and federal requirements. • Review and update processes to align with OIM guidance, policy, and best practices. • Lead the implementation of the OIM cybersecurity metrics program plan, including data collection, reporting, and oversight. • Direct daily cybersecurity operations for SC GSS domains, including detection, analysis, containment, eradication, and recovery. • Manage SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security tools. • Provide daily cyber health and status reports to leadership. • Lead proactive threat hunting and incident response, coordinating with DOE's iJC3. • Establish and maintain SOPs for incident response, escalation, and after-action reporting. • Ensure compliance with DOE Order 205.1, US-CERT requirements, and federal directives. • Oversee CDM program activities, including tool maintenance, upgrades, and analysis. • Coordinate with DOE contractors and vendors to ensure compliance with DOE Orders and regulations. • Provide continuous monitoring for unauthorized hardware/software and applied risk controls. • Lead vulnerability identification, risk assessment, and mitigation across IT infrastructure and cloud environments. • Direct patch management, configuration updates, and corrective actions. • Establish continuous monitoring processes leveraging automated tools and threat intelligence feeds. • Ensure compliance with FISMA, NIST 800-53, and evolving regulatory requirements. • Deliver regular vulnerability management reports with metrics, compliance status, and recommendations. • Minimum Qualifications • Bachelor's degree in Cybersecurity, Computer Science, or related field ( Master's preferred). • 8+ years of progressive experience in cybersecurity operations, incident response, and vulnerability management. • Certifications such as CISSP, CISM, CEH, or equivalent. GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), Certified Information System Security Professional or Associate (CISSP or Associate), ISC2 Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Project Management Professional (PMP), Certified Associate in Project Management (CAPM). Other Job Specific Skills • Strong knowledge of DOE cybersecurity policies, federal directives, and industry best practices. • Hands-on expertise with SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security platforms. • Proven leadership in managing cross-functional teams. • Experience with: NIST 800-53 Rev 5, Risk Management Framework, NIST Cybersecurity Framework (CSF), FedRAMP Authorization, Tenable Nessus (ACAS), and DISA STIGs. Desired Skills • Strategic thinker with ability to align cybersecurity initiatives to mission priorities. • Excellent communication skills for reporting to leadership and coordinating with stakeholders. • Strong analytical and problem-solving skills, especially in incident response and forensic analysis. • Ability to adapt to emerging technologies and evolving threat landscapes. • Able to build advanced alerts in SIEM. • Team lead with capability to train basic and advanced skills. • Able to translate events into incident response ticket with full information for SOC lead and provide briefings to leadership. • Advanced knowledge of security tools. • Assist Tier 2 and Tier 3 Analyst in incident response. • Has above basic Window and Linux CLI skills. • Has built understanding of multiple security tools i.e. EDR, IDP, IDS, Firewalls, etc • Built full incident response and provides mitigation steps. • Leads and writes Tabletop Exercises. • Implement and oversee baseline security configurations and controls. • Monitor and report on cybersecurity metrics, ensuring compliance with DOE and federal requirements. • Review and update processes to align with OIM guidance, policy, and best practices. • Lead the implementation of the OIM cybersecurity metrics program plan, including data collection, reporting, and oversight. • Direct daily cybersecurity operations for SC GSS domains, including detection, analysis, containment, eradication, and recovery. • Manage SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security tools. • Provide daily cyber health and status reports to leadership. • Lead proactive threat hunting and incident response, coordinating with DOE's iJC3. • Establish and maintain SOPs for incident response, escalation, and after-action reporting. • Ensure compliance with DOE Order 205.1, US-CERT requirements, and federal directives. • Oversee CDM program activities, including tool maintenance, upgrades, and analysis. • Coordinate with DOE contractors and vendors to ensure compliance with DOE Orders and regulations. • Provide continuous monitoring for unauthorized hardware/software and applied risk controls. • Lead vulnerability identification, risk assessment, and mitigation across IT infrastructure and cloud environments. • Direct patch management, configuration updates, and corrective actions. • Establish continuous monitoring processes leveraging automated tools and threat intelligence feeds. • Ensure compliance with FISMA, NIST 800-53, and evolving regulatory requirements. • Deliver regular vulnerability management reports with metrics, compliance status, and recommendations.
04/23/2026
Full time
A Cybersecurity Lead will set strategic directions and oversight for the entire Assessment & Authorization and Vulnerability Management teams, including A&A Analysts, A&A Specialists, A&A SMEs, A&A Security Engineers, A&A Architects, Vulnerability Management Analysts, and Vulnerability Management Engineers to deliver the cyber authorization services. A Cybersecurity Lead will develop project management plans such as Work Breakdown Structure, mentor and guide team members on the preparation of technical deliverables and resolve project issues, prepares progress/status reports on technical deliverables, and monitor contractual requirements bringing in help from outside the project as needed to mitigate risks. A Cybersecurity Lead will also serve as a primary interface for the client and ASM leadership to answer questions, address concerns, and provide status/updates. Additionally, a Cybersecurity Lead will have at least five years of working knowledge and experience with one or more of the following Federal security frameworks (FedRAMP, FISMA, Zero Trust Maturity Model, RMF, and NIST SP 800 series and NIST SP 800-53) and GRC tools (e.g. XACTA, ArchAngel , eMASS , CSAM) A Cyber Security Lead is the manager of all SOC analysts and is the primary representative of the SOC to external stakeholders. The SOC Lead's primary responsibilities include managing the shift work analysts, developing training plans, developing and approving SLA monitoring solutions, ensuing ongoing analyst certification, conducting employee performance evaluations, and providing overall strategic direction for the SOC. • Implement and oversee baseline security configurations and controls. • Monitor and report on cybersecurity metrics, ensuring compliance with DOE and federal requirements. • Review and update processes to align with OIM guidance, policy, and best practices. • Lead the implementation of the OIM cybersecurity metrics program plan, including data collection, reporting, and oversight. • Direct daily cybersecurity operations for SC GSS domains, including detection, analysis, containment, eradication, and recovery. • Manage SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security tools. • Provide daily cyber health and status reports to leadership. • Lead proactive threat hunting and incident response, coordinating with DOE's iJC3. • Establish and maintain SOPs for incident response, escalation, and after-action reporting. • Ensure compliance with DOE Order 205.1, US-CERT requirements, and federal directives. • Oversee CDM program activities, including tool maintenance, upgrades, and analysis. • Coordinate with DOE contractors and vendors to ensure compliance with DOE Orders and regulations. • Provide continuous monitoring for unauthorized hardware/software and applied risk controls. • Lead vulnerability identification, risk assessment, and mitigation across IT infrastructure and cloud environments. • Direct patch management, configuration updates, and corrective actions. • Establish continuous monitoring processes leveraging automated tools and threat intelligence feeds. • Ensure compliance with FISMA, NIST 800-53, and evolving regulatory requirements. • Deliver regular vulnerability management reports with metrics, compliance status, and recommendations. • Minimum Qualifications • Bachelor's degree in Cybersecurity, Computer Science, or related field ( Master's preferred). • 8+ years of progressive experience in cybersecurity operations, incident response, and vulnerability management. • Certifications such as CISSP, CISM, CEH, or equivalent. GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), Certified Information System Security Professional or Associate (CISSP or Associate), ISC2 Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Project Management Professional (PMP), Certified Associate in Project Management (CAPM). Other Job Specific Skills • Strong knowledge of DOE cybersecurity policies, federal directives, and industry best practices. • Hands-on expertise with SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security platforms. • Proven leadership in managing cross-functional teams. • Experience with: NIST 800-53 Rev 5, Risk Management Framework, NIST Cybersecurity Framework (CSF), FedRAMP Authorization, Tenable Nessus (ACAS), and DISA STIGs. Desired Skills • Strategic thinker with ability to align cybersecurity initiatives to mission priorities. • Excellent communication skills for reporting to leadership and coordinating with stakeholders. • Strong analytical and problem-solving skills, especially in incident response and forensic analysis. • Ability to adapt to emerging technologies and evolving threat landscapes. • Able to build advanced alerts in SIEM. • Team lead with capability to train basic and advanced skills. • Able to translate events into incident response ticket with full information for SOC lead and provide briefings to leadership. • Advanced knowledge of security tools. • Assist Tier 2 and Tier 3 Analyst in incident response. • Has above basic Window and Linux CLI skills. • Has built understanding of multiple security tools i.e. EDR, IDP, IDS, Firewalls, etc • Built full incident response and provides mitigation steps. • Leads and writes Tabletop Exercises. • Implement and oversee baseline security configurations and controls. • Monitor and report on cybersecurity metrics, ensuring compliance with DOE and federal requirements. • Review and update processes to align with OIM guidance, policy, and best practices. • Lead the implementation of the OIM cybersecurity metrics program plan, including data collection, reporting, and oversight. • Direct daily cybersecurity operations for SC GSS domains, including detection, analysis, containment, eradication, and recovery. • Manage SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and cloud security tools. • Provide daily cyber health and status reports to leadership. • Lead proactive threat hunting and incident response, coordinating with DOE's iJC3. • Establish and maintain SOPs for incident response, escalation, and after-action reporting. • Ensure compliance with DOE Order 205.1, US-CERT requirements, and federal directives. • Oversee CDM program activities, including tool maintenance, upgrades, and analysis. • Coordinate with DOE contractors and vendors to ensure compliance with DOE Orders and regulations. • Provide continuous monitoring for unauthorized hardware/software and applied risk controls. • Lead vulnerability identification, risk assessment, and mitigation across IT infrastructure and cloud environments. • Direct patch management, configuration updates, and corrective actions. • Establish continuous monitoring processes leveraging automated tools and threat intelligence feeds. • Ensure compliance with FISMA, NIST 800-53, and evolving regulatory requirements. • Deliver regular vulnerability management reports with metrics, compliance status, and recommendations.
Service Desk Agent - Tier 1 Onsite in Oak Ridge, TN U.S Citizenship Required The Service Desk (Tier 1) Support Contractor will serve as the primary point of contact for all end-user IT issues, requests, and inquiries. This role requires strong technical troubleshooting skills, customer service excellence, and the ability to manage incidents in alignment with defined service level agreements (SLAs). The contractor will support a wide range of enterprise IT services and technologies, ensuring reliable and efficient IT operations for both on-site and remote users. This role is stationed at Oak Ridge, TN and requires full on-site. Key Responsibilities Provide comprehensive Tier 1 Service Desk support, including incident intake, call management, initial troubleshooting, resolution, or escalation as appropriate. Respond to incidents and service requests according to assigned criticality and established SLAs. Operate and maintain an approved ticketing and tracking system to log, monitor, and document all user interactions, resolutions, escalations, and follow-ups. Support enterprise IT services and end-user technologies, including: Operating systems (Windows, macOS) Office productivity platforms (Microsoft 365) Cloud collaboration tools Mobile devices (iOS, Android) Common peripherals and communication services Assist users with VPN and virtual desktop infrastructure (VDI) troubleshooting, leveraging secure remote access tools. Ensure Service Desk personnel maintain foundational knowledge in hardware, software, networking, and troubleshooting methodologies aligned with industry standards (CompTIA A+, ITIL v4 Foundations, HDI). Demonstrate proficiency in modern productivity and collaboration tools (Microsoft 365), basic data analysis tools (Power BI), and awareness of emerging technologies such as AI-driven tools and self-service platforms. Contribute to and maintain a knowledge base of common issues and solutions to promote user self-service and reduce call volume. Conduct trend and root cause analysis to identify opportunities for incident reduction and service improvement. Support the generation of operational metrics and reports to support performance monitoring and continuous improvement, including incident trends, recurring issues, service request volumes, and customer satisfaction data. Provide ad hoc reports as requested. Demonstrate flexibility to support evolving technology platforms, service delivery models, and organizational needs as directed. Support a shared on-call schedule as needed Qualifications U.S Citizenship Excellent communication and customer service skills. Foundational knowledge equivalent to CompTIA A+ or similar industry-recognized certifications. Familiarity with ITIL v4 Foundations or HDI standards for IT service management. Experience with enterprise IT environments, including Windows, macOS, Microsoft 365, VPN, and VDI. Strong troubleshooting skills across hardware, software, and networking concepts. Ability to adapt to new technologies and evolving service delivery mo
01/06/2026
Full time
Service Desk Agent - Tier 1 Onsite in Oak Ridge, TN U.S Citizenship Required The Service Desk (Tier 1) Support Contractor will serve as the primary point of contact for all end-user IT issues, requests, and inquiries. This role requires strong technical troubleshooting skills, customer service excellence, and the ability to manage incidents in alignment with defined service level agreements (SLAs). The contractor will support a wide range of enterprise IT services and technologies, ensuring reliable and efficient IT operations for both on-site and remote users. This role is stationed at Oak Ridge, TN and requires full on-site. Key Responsibilities Provide comprehensive Tier 1 Service Desk support, including incident intake, call management, initial troubleshooting, resolution, or escalation as appropriate. Respond to incidents and service requests according to assigned criticality and established SLAs. Operate and maintain an approved ticketing and tracking system to log, monitor, and document all user interactions, resolutions, escalations, and follow-ups. Support enterprise IT services and end-user technologies, including: Operating systems (Windows, macOS) Office productivity platforms (Microsoft 365) Cloud collaboration tools Mobile devices (iOS, Android) Common peripherals and communication services Assist users with VPN and virtual desktop infrastructure (VDI) troubleshooting, leveraging secure remote access tools. Ensure Service Desk personnel maintain foundational knowledge in hardware, software, networking, and troubleshooting methodologies aligned with industry standards (CompTIA A+, ITIL v4 Foundations, HDI). Demonstrate proficiency in modern productivity and collaboration tools (Microsoft 365), basic data analysis tools (Power BI), and awareness of emerging technologies such as AI-driven tools and self-service platforms. Contribute to and maintain a knowledge base of common issues and solutions to promote user self-service and reduce call volume. Conduct trend and root cause analysis to identify opportunities for incident reduction and service improvement. Support the generation of operational metrics and reports to support performance monitoring and continuous improvement, including incident trends, recurring issues, service request volumes, and customer satisfaction data. Provide ad hoc reports as requested. Demonstrate flexibility to support evolving technology platforms, service delivery models, and organizational needs as directed. Support a shared on-call schedule as needed Qualifications U.S Citizenship Excellent communication and customer service skills. Foundational knowledge equivalent to CompTIA A+ or similar industry-recognized certifications. Familiarity with ITIL v4 Foundations or HDI standards for IT service management. Experience with enterprise IT environments, including Windows, macOS, Microsoft 365, VPN, and VDI. Strong troubleshooting skills across hardware, software, and networking concepts. Ability to adapt to new technologies and evolving service delivery mo