Key Responsibilities:
1) Project Management & Execution
• Implement and manage multiple components of the specified project, ensuring they are completed within scope
• Leverage Agile methodologies to enhance collaboration, adaptability, and efficient delivery of project milestones
• Track project milestones, manage risks, and report status updates to stakeholders and senior leadership.
• Analyze and recommend solutions for deficiencies in system architectures, improving system stability and security.
• Oversee transition plans for the handover of software licenses and hardware to new development and operations teams.
• Evaluate search technologies and system components, ensuring alignment with contract deliverables and performance standards.
• Perform preliminary testing and provide recommendations for component integration and system functionality.
• Support the development and review of system architectures, ensuring accuracy and alignment with operational objectives.
2) Systems & Security Engineering
• Oversee lifecycle management for security packages, improving security processes and streamlining approval pathways.
• Develop technical documentation, including Version Description Documents (VDDs), Memorandum of Agreement (MOA), Continuity of Operations Plans (COOP), and Concepts of Operations (CONOPS).
• Support government testing protocols, ensuring alignment with industry standards and organizational objectives.
• Manage documentation for operational readiness and ensure accurate system architecture reviews.
• Manage the lifecycle of security packages, achieving reductions in security findings and facilitating baseline approvals.
• Oversee stakeholder engagement concerning security requirements and expectations, including managing scope creep and resource estimation.
• Conduct security status tracking and reporting to senior leadership.
• Produce roadmaps and resource estimations for accreditation processes, ensuring comprehensive oversight of security-related deliverables.
• Lead the Change Requests (CRQ) process, including requirements gathering, financial management, and closeout documentation.
3) Stakeholder Communication & Leadership
• Engage with key stakeholders and senior leadership to ensure transparency and alignment with strategic objectives.
• Lead presentations and briefings for milestone decision authorities and internal review boards.
• Develop comprehensive reports, briefings, and program documentation for senior leadership.
• Manage expectations and build strong working relationships with internal teams, contractors, and external partners.
Qualifications:
• Bachelor’s degree in Systems Engineering, Computer Science, Information Security, or a related field; PMP certification preferred.
• Minimum of 10 years of experience in project management, systems engineering, and security management within a government contracting environment.
• Demonstrated success managing complex programs with multi-million-dollar budgets.
• Strong experience in lifecycle management for security processes and systems integration.
• Excellent communication, leadership, and organizational skills.
Technical Skills:
• Proficiency in security documentation and compliance management.
• Strong analytical and problem-solving abilities.
• Experience with hybrid Agile and Waterfall methodologies for project planning.
• CI/CD orchestration tools: GitLab CI, Jenkins, GitOps
Desired Skills:
• Experience deploying and managing RedHat OpenShift in a cloud and/or vSphere environment
• Experience with Amazon Web Services
• Python, Shell scripting, Git (desired)
• Linux distributions: RHEL/RHCOS, CentOS
• Container technology: Docker, Kubernetes, and Cloud Native Computing Foundation ecosystem in general
REQUIRED: *ACTIVE* TS/SCI
DO NOT APPLY IF YOU DO NOT HAVE AN ACTIVE SECURITY CLEARANCE
Job Type: Full-time
Pay: From $150,000.00 per year
Work Location: Hybrid remote in Springfield, VA 22150
Benefits
Protect your organization with indepth cyber security services
Cloud Security
Cloud security involves access controls, encryption, and monitoring to detect threats.
Firewall Protection
Access controls limit unauthorized system and data access.
Vulnerability Assessments
Vulnerability assessments reveal network weaknesses before attackers exploit them.
Data Encryption
Data encryption secures sensitive data from unauthorized access.