Job Listings


Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.

Use this form to perform another job search

The system cannot access your location for 1 of 2 reasons:
  1. Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
  2. Your location information has yet to be received. Please wait a moment then hit [Search] again.
Click column header to sort

Search Results Page 6 of 13

Sev1Tech is looking for the right candidate to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The program will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.   Sev1Tech seeks a Lead Content Developer/Cyber Threat Detection Developer, utilizing Splunk Enterprise Services or other SIEM tools to pro-actively research and then apply custom detection capabilities from disparate data sources such as: cyber threat intelligence, vulnerability data, campaign and indicators of compromise. These threat detection data types will be used to develop custom security, engineering, and or applicable dashboards; validate existing and/or create new correlation rules and alerts, as well as validate the index sources of the SIEM to ensure a thorough defense in depth for the enterprise.     Responsibilities include but are not limited to: - Analyze data feeds and event logs - Correlate the results with known threats, vulnerabilities, and incidents - Create new security content and updates to Enterprise NOSC dashboards - Develop, disseminate, and implement new security content such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Data Loss Prevention (DLP) correlation rules and cyber threat indicators - Participate in Briefings to provide expert guidance on new threats and will act as an escalation point for cyber analysts and engineering leads - Author reports and/or interface with customers for ad-hoc requests - Participate in discussions to make recommendations on improving NOSC cyber visibility, process improvements, and reducing the incident remediation period - Investigate and analyze all logs available within the SIEM, document workflows, and identify process improvements in the handling and remediation of cyber security events - Leverage deep understanding of how to develop custom content within the Splunk SIEM using advanced SPL language and data models or other network security tools to detect threats and attacks - Capture use cases from subscribers or other team members to develop custom correlation rule(s), validate and or create new dashboard(s) and validate all index sources for applicability within the Splunk environment - Utilize knowledge of latest cyber threats and attack vectors to develop and or maintain custom Splunk correlation rules from all indexed sources to support continuous event monitoring and alerting - Develop, manage, and maintain Splunk data models - Review all existing network event sources to determine if relevant data is present and make technical recommendations to re-mediate any missing log components - Review and or suggest new log and event index types as new devices are brought into the enterprise network - Develop custom regex to create custom knowledge objects - Developing custom SPL using macros, lookups, etc., and network security signatures such as SNORT, YARA and Zeek - Develop custom dashboards and reports for customer stakeholders - Train and mentor junior staff
ID
2024-7887
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for the right candidate to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The program will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.   Sev1Tech seeks a Lead Content Developer/Cyber Threat Detection Developer, utilizing Splunk Enterprise Services or other SIEM tools to pro-actively research and then apply custom detection capabilities from disparate data sources such as: cyber threat intelligence, vulnerability data, campaign and indicators of compromise. These threat detection data types will be used to develop custom security, engineering, and or applicable dashboards; validate existing and/or create new correlation rules and alerts, as well as validate the index sources of the SIEM to ensure a thorough defense in depth for the enterprise.     Responsibilities include but are not limited to: - Analyze data feeds and event logs - Correlate the results with known threats, vulnerabilities, and incidents - Create new security content and updates to Enterprise NOSC dashboards - Develop, disseminate, and implement new security content such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Data Loss Prevention (DLP) correlation rules and cyber threat indicators - Participate in Briefings to provide expert guidance on new threats and will act as an escalation point for cyber analysts and engineering leads - Author reports and/or interface with customers for ad-hoc requests - Participate in discussions to make recommendations on improving NOSC cyber visibility, process improvements, and reducing the incident remediation period - Investigate and analyze all logs available within the SIEM, document workflows, and identify process improvements in the handling and remediation of cyber security events - Leverage deep understanding of how to develop custom content within the Splunk SIEM using advanced SPL language and data models or other network security tools to detect threats and attacks - Capture use cases from subscribers or other team members to develop custom correlation rule(s), validate and or create new dashboard(s) and validate all index sources for applicability within the Splunk environment - Utilize knowledge of latest cyber threats and attack vectors to develop and or maintain custom Splunk correlation rules from all indexed sources to support continuous event monitoring and alerting - Develop, manage, and maintain Splunk data models - Review all existing network event sources to determine if relevant data is present and make technical recommendations to re-mediate any missing log components - Review and or suggest new log and event index types as new devices are brought into the enterprise network - Develop custom regex to create custom knowledge objects - Developing custom SPL using macros, lookups, etc., and network security signatures such as SNORT, YARA and Zeek - Develop custom dashboards and reports for customer stakeholders - Train and mentor junior staff
ID
2024-7886
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for a Forensics/Malware Analyst SME to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety. The contract will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.   We're looking for a Forensics/Malware Analyst SME to conduct malware investigations and operations. Candidates will apply their technical and professional skill-sets to examine malware from various sources and perform appropriate analysis to improve cyber incident responses.    Responsibilities include but are not limited to: - Conduct Mal-ware investigations and operations - Examine submitted malware from cyber incident reporting and other sources - Perform forensic analysis of digital information and gathers methods, indicators of compromise (IOC), evidence of Advanced Persistence Threat (APT) threat actors, trends, and mitigations - Leverage scanning tools (i.e., VirusTotal) to conduct suspicious file scanning; performing queries, pivoting on indicators, and malware analysis on characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.) - Use forensically sound procedures to identify network computer intrusion evidence and identifies perpetrators - Contribute to cyber incident responses and other DoD Defense Industrial Base Collaborative Information Sharing Environment (DCISE) products - Contribute to the general knowledge base of intelligence used to develop or enhance tools - Provide guidance and direction to junior analysts
ID
2024-7885
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for a Forensics/Malware Analyst SME to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The contract will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.   We're looking for a Forensics/Malware Analyst SME to conduct malware investigations and operations. Candidates will apply their technical and professional skill-sets to examine malware from various sources and perform appropriate analysis to improve cyber incident responses.    Responsibilities include but are not limited to: - Conduct Malware investigations and operations - Examine submitted malware from cyber incident reporting and other sources - Perform forensic analysis of digital information and gathers methods, indicators of compromise (IOC), evidence of Advanced Persistence Threat (APT) threat actors, trends, and mitigations - Leverage scanning tools (i.e., VirusTotal) to conduct suspicious file scanning; performing queries, pivoting on indicators, and malware analysis on characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.) - Use forensically sound procedures to identify network computer intrusion evidence and identifies perpetrators - Contribute to cyber incident responses and other DoD Defense Industrial Base Collaborative Information Sharing Environment (DCISE) products - Contribute to the general knowledge base of intelligence used to develop or enhance tools - Provide guidance and direction to junior analysts
ID
2024-7884
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for the Cyber Threat Hunter to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The contract will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.   The Department of Homeland Security (DHS), Network Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusion detection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The NOSC Cyber is responsible for the overall security of DHS Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.   Sev1Tech seeks a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.   Responsibilities include but are not limited to: - Manage all aspects of the Cyber-Threat Hunt lifecycle, including creation and improvement of enterprise-specific Threat Models and threat hypotheses, plan and scope Threat Hunt campaigns, missions, and activities against a variety of threat types and identify enterprise defense gaps and propose potential mitigation activities - Perform Cyber-Threat Hunt missions by identifying and investigating patterns and anomalies in data, suspicious network activities, including access from Outside the Continental United States (OCONUS) or utilization of non-standard credentials, anomalous or suspicious telemetry, and other Cyber Threat Intelligence - Pro-actively search networks to detect and isolate advanced cybersecurity threats that evade in-place security solutions - Regularly perform advanced analysis and adversary hunting activities to pro-actively uncover evidence of adversary presence on DHS networks - Follow incident response procedures for detected insider threat activity - Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations - Author, update, and maintain SOPs, playbooks, work instructions - Utilize Threat Intelligence and Threat Models to create threat hypotheses - Plan and scope Threat Hunt Missions to verify threat hypotheses - Pro-actively and iteratively search through systems and networks to detect advanced threats - Analyze host, network, and application logs in addition to malware and code - Prepare and report risk analysis and threat findings to appropriate stakeholders - Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation. - Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise
ID
2024-7883
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for the Cyber Threat Hunter to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The contract will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.   The Department of Homeland Security (DHS), Network Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusion detection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The NOSC Cyber is responsible for the overall security of DHS Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.   Sev1Tech seeks a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.   Responsibilities include but are not limited to: - Manage all aspects of the Cyber-Threat Hunt lifecycle, including creation and improvement of enterprise-specific Threat Models and threat hypotheses, plan and scope Threat Hunt campaigns, missions, and activities against a variety of threat types and identify enterprise defense gaps and propose potential mitigation activities - Perform Cyber-Threat Hunt missions by identifying and investigating patterns and anomalies in data, suspicious network activities, including access from Outside the Continental United States (OCONUS) or utilization of non-standard credentials, anomalous or suspicious telemetry, and other Cyber Threat Intelligence - Pro-actively search networks to detect and isolate advanced cybersecurity threats that evade in-place security solutions - Regularly perform advanced analysis and adversary hunting activities to pro-actively uncover evidence of adversary presence on DHS networks - Follow incident response procedures for detected insider threat activity - Create Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigations - Author, update, and maintain SOPs, playbooks, work instructions - Utilize Threat Intelligence and Threat Models to create threat hypotheses - Plan and scope Threat Hunt Missions to verify threat hypotheses - Pro-actively and iteratively search through systems and networks to detect advanced threats - Analyze host, network, and application logs in addition to malware and code - Prepare and report risk analysis and threat findings to appropriate stakeholders - Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation. - Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise
ID
2024-7882
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for Network Operations and Security Center (NOSC) Tier 2 Specialist to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The program will encompass a wide range of tasks including but not limited to: Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; Field Engineering technical support; and Cloud operations.   Responsibilities include but are not limited to: - Monitor network, security, system, and cloud environments for events and perform triage analysis to identify or prevent incidents; perform network, security, system, and cloud incident response as needed - Respond to incidents by collecting, analyzing, preserving digital evidence and ensure that incidents are recorded and tracked in accordance with NOSC requirements - Work closely with other teams to assess - and provide recommendations for reducing - operational risks. - Maintains records of monitoring and incident response activities, utilizing case management and ticketing technologies. - Perform monitoring and analysis using Splunk analytics tools. - Monitor dashboards for malicious events, phishing events, spoofing events, DDoS attacks, SQL Injection events, network connectivity events, system/device performance events and other potentially high-risk incidents - Recognizes intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information - Recommends changes to SOPs and related documentation. - Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty - Log all incident details and prioritization codes - Provide Tier 2 support, including WAN and LAN connectivity, routers, firewalls, and security - Support remote access platforms such as VPN, Terminal Services - Assign unresolved incidents to higher Tier support or Internet service providers and product vendors to coordinate restoration of service and obtain the necessary information for recording/tracking the outage or degradation of service - Keep component NOCs and SOCs informed of their incident's status at agreed intervals and continuously update incidents as needed - Notify Government Leads and other stakeholders of high impact/priority failures using the appropriate escalation procedures
ID
2024-7881
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for Network Operations and Security Center (NOSC) Tier 2 Specialist to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The program will encompass a wide range of tasks including but not limited to: Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; Field Engineering technical support; and Cloud operations.   Responsibilities include but are not limited to: - Monitor network, security, system, and cloud environments for events and perform triage analysis to identify or prevent incidents; perform network, security, system, and cloud incident response as needed - Respond to incidents by collecting, analyzing, preserving digital evidence and ensure that incidents are recorded and tracked in accordance with NOSC requirements - Work closely with other teams to assess - and provide recommendations for reducing - operational risks. - Maintains records of monitoring and incident response activities, utilizing case management and ticketing technologies. - Perform monitoring and analysis using Splunk analytics tools. - Monitor dashboards for malicious events, phishing events, spoofing events, DDoS attacks, SQL Injection events, network connectivity events, system/device performance events and other potentially high-risk incidents - Recognizes intrusion attempts and compromises through reviews and analyses of relevant event detail and summary information - Recommends changes to SOPs and related documentation. - Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty - Log all incident details and prioritization codes - Provide Tier 2 support, including WAN and LAN connectivity, routers, firewalls, and security - Support remote access platforms such as VPN, Terminal Services - Assign unresolved incidents to higher Tier support or Internet service providers and product vendors to coordinate restoration of service and obtain the necessary information for recording/tracking the outage or degradation of service - Keep component NOCs and SOCs informed of their incident's status at agreed intervals and continuously update incidents as needed - Notify Government Leads and other stakeholders of high impact/priority failures using the appropriate escalation procedures
ID
2024-7880
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is seeking a talented Splunk Engineer/Operator to join our team to support a new customer on a highly-visible contract. The Splunk Engineer/Operator will be a member of Network Operations and Security Center (NOSC) team uses Splunk for content development, analysis and will be expected to manage multiple assignments, changing priorities, and work independently with little oversight.  Responsibilities include but are not limited to: - Build, implement, and administer Splunk in Windows and Linux environments - Work with existing and custom Splunk applications and add-ons to fulfill customer needs - Provide operations and maintenance support for a distributed Splunk environment consisting of heavy forwarders, indexers, and search head servers, spanning security, performance, and operational roles - Editing and maintaining Splunk configuration files and apps - Onboard data to Splunk via forwarder, scripted inputs, TCP/UDP, and modular inputs from a variety of sources - Provider operational support for Splunk Universal Forwarder on Linux and Windows endpoints - Manage, and support automation solutions for Splunk deployment and orchestration in on-premise and cloud environments - Documentation, reporting, presentation, teamwork, and DHS wide collaboration are among the expected duties and mission of the task order  
ID
2024-7879
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is seeking a talented Splunk Engineer/Operator to join our team to support a new customer on a highly-visible contract. The Splunk Engineer/Operator will be a member of Network Operations and Security Center (NOSC) team uses Splunk for content development, analysis and will be expected to manage multiple assignments, changing priorities, and work independently with little oversight.  Responsibilities include but are not limited to: - Build, implement, and administer Splunk in Windows and Linux environments - Work with existing and custom Splunk applications and add-ons to fulfill customer needs - Provide operations and maintenance support for a distributed Splunk environment consisting of heavy forwarders, indexers, and search head servers, spanning security, performance, and operational roles - Editing and maintaining Splunk configuration files and apps - Onboard data to Splunk via forwarder, scripted inputs, TCP/UDP, and modular inputs from a variety of sources - Provider operational support for Splunk Universal Forwarder on Linux and Windows endpoints - Manage, and support automation solutions for Splunk deployment and orchestration in on-premise and cloud environments - Documentation, reporting, presentation, teamwork, and DHS wide collaboration are among the expected duties and mission of the task order  
ID
2024-7878
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech has a need for a Security Orchestration Automation and Response (SOAR) Engineer working in a cross-functional capacity to identify, propose, design, develop, implement, integrate, and maintain security. The SOAR Engineer must be a cybersecurity and technical expert with the ability to clearly identify, capture, articulate, design, implement, and maintain security operations uses cases, including developing integration code to provide interoperability between disparate IT and security solutions and infrastructure components. The SOAR Engineer must have a solid background in cybersecurity technologies, including deploying enterprise platforms, conducting demonstrations, creating product documentation, training security analysts, and sustaining enterprise technology services. Additionally, the engineer must have a solid understanding of security operations, incident response, threat management, and enterprise IT and security engineering. The SOAR Engineers provide expert support for the analysis, development and integration of the Swimlane SOAR Platform along with providing technical expertise to operational users. Works on complex technical problems and provides innovative solutions. Develops advanced technological ideas and guides their development into a final product. Responsibilities include but are not limited to: - Design, implement, and maintain Swimlane infrastructure develop and maintain custom Swimlane applications - Develop and maintain Swimlane Case Management system to support an Enterprise ticketing system - Serve as primary point of contact for Swimlane problem identification and resolution - Create and maintain user, administrator, engineering, and compliance/accreditation documentation - Manage and implement integration between components and security tools (e.g. send/receive data from component Swimlane, establish API connections with the network security stack, etc) - Work with external teams to establish service accounts and/or API access - Quickly grasp complex technical concepts and make them easily understandable in writing and network diagrams/illustrations - Ensure SOAR capabilities are operational and developed to anticipate infrastructure growth  
ID
2024-7877
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech has a need for a Security Orchestration Automation and Response (SOAR) Engineer working in a cross-functional capacity to identify, propose, design, develop, implement, integrate, and maintain security. The SOAR Engineer must be a cybersecurity and technical expert with the ability to clearly identify, capture, articulate, design, implement, and maintain security operations uses cases, including developing integration code to provide interoperability between disparate IT and security solutions and infrastructure components. The SOAR Engineer must have a solid background in cybersecurity technologies, including deploying enterprise platforms, conducting demonstrations, creating product documentation, training security analysts, and sustaining enterprise technology services. Additionally, the engineer must have a solid understanding of security operations, incident response, threat management, and enterprise IT and security engineering. The SOAR Engineers provide expert support for the analysis, development and integration of the Swimlane SOAR Platform along with providing technical expertise to operational users. Works on complex technical problems and provides innovative solutions. Develops advanced technological ideas and guides their development into a final product. Responsibilities include but are not limited to: - Design, implement, and maintain Swimlane infrastructure develop and maintain custom Swimlane applications - Develop and maintain Swimlane Case Management system to support an Enterprise ticketing system - Serve as primary point of contact for Swimlane problem identification and resolution - Create and maintain user, administrator, engineering, and compliance/accreditation documentation - Manage and implement integration between components and security tools (e.g. send/receive data from component Swimlane, establish API connections with the network security stack, etc) - Work with external teams to establish service accounts and/or API access - Quickly grasp complex technical concepts and make them easily understandable in writing and network diagrams/illustrations - Ensure SOAR capabilities are operational and developed to anticipate infrastructure growth  
ID
2024-7876
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for an Engineering and Integration Manager to lead a pool of technical resources who support the development and deployment of a centralized Cloud Management Platform as well as Platform as a Service solutions; assist development teams with application migrations and other special projects involving applications, data, and the introduction of new XaaS; implement Shared Services; and integrate SAS capabilities.  The Engineering and Integration Manager reports to the BPA Task Order Program Manager.   Responsibilities include but are not limited to: - Assess resource requirements for engineering and integration - Determine best resource mix for specific projects - Assign engineering and integration resources to Technical Delivery Managers - Establish and ensure adherence to engineering processes for building and deploying cloud solutions and services  - Balance and manage the priorities of a diverse team of engineering resources, in coordination the leadership team - Ensure that E&I staff maintain required technical skill-sets through training and certifications - Respond to ad hoc requests from program leadership and customers as needed - Oversee technology evaluations and pilot projects  
ID
2024-7875
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for an Engineering and Integration Manager to lead a pool of technical resources who support the development and deployment of a centralized Cloud Management Platform as well as Platform as a Service solutions; assist development teams with application migrations and other special projects involving applications, data, and the introduction of new XaaS; implement Shared Services; and integrate SAS capabilities.  The Engineering and Integration Manager reports to the BPA Task Order Program Manager.   Responsibilities include but are not limited to: - Assess resource requirements for engineering and integration - Determine best resource mix for specific projects - Assign engineering and integration resources to Technical Delivery Managers - Establish and ensure adherence to engineering processes for building and deploying cloud solutions and services  - Balance and manage the priorities of a diverse team of engineering resources, in coordination the leadership team - Ensure that E&I staff maintain required technical skill-sets through training and certifications - Respond to ad hoc requests from program leadership and customers as needed - Oversee technology evaluations and pilot projects  
ID
2024-7874
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for a Customer Success Manager that leads the Customer Success Team, providing direction to Technical Delivery Managers (TDMs). TDMs are dedicated to specific OIT customer user organizations with the responsibility to delight the customers and provide a positive experience while engaging with the ECIS platform.    The Customer Success Team has two primary functions: - Maintains active relationships with customers to ensure that project teams are meeting their needs and that their requests for new capabilities are understood and considered; and - Works across groups to help resolve conflicting requirements and priorities. Responsibilities include but are not limited to: - Facilitates evaluation of ECIS technical requirements (including Directorate-specific one), determines resources needed to meet those requirements, and assigns Technical Delivery Managers (TDMs) to manage projects - Provides customer requirements to the Architecture, Engineering, and Integration Manager - Ensures that all TDMs pro-actively inform customers of new and improved service offerings - Reviews delivery progress across multiple projects - Develops success metrics that are relevant and timely, including adoption measures, customer satisfaction scores, and issue monitoring and resolution measurements - Reports to the BPA Task Order PM  
ID
2024-7873
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for a Customer Success Manager that leads the Customer Success Team, providing direction to Technical Delivery Managers (TDMs). TDMs are dedicated to specific OIT customer user organizations with the responsibility to delight the customers and provide a positive experience while engaging with the ECIS platform.    The Customer Success Team has two primary functions: - Maintains active relationships with customers to ensure that project teams are meeting their needs and that their requests for new capabilities are understood and considered; and - Works across groups to help resolve conflicting requirements and priorities. Responsibilities include but are not limited to: - Facilitates evaluation of ECIS technical requirements (including Directorate-specific one), determines resources needed to meet those requirements, and assigns Technical Delivery Managers (TDMs) to manage projects - Provides customer requirements to the Architecture, Engineering, and Integration Manager - Ensures that all TDMs pro-actively inform customers of new and improved service offerings - Reviews delivery progress across multiple projects - Develops success metrics that are relevant and timely, including adoption measures, customer satisfaction scores, and issue monitoring and resolution measurements - Reports to the BPA Task Order PM  
ID
2024-7872
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for a Cloud Operations Manager that would: - Guide and oversee technical resources in managing the operations in a multi-cloud and hybrid environment, including Onboarding, Monitoring, Sustainment, Incident Response, and Customer Service - Play a key role in Platform management, maintenance, and optimization, with a focus on performance and service quality assessments, as well as making improvement recommendations - Report on the operational status of the Platform to senior leadership - Ensure Platform reliability through tasks such as patching, data backups, and disaster recovery planning - Ensure the Platform is compliant with DHS security guidelines and respond to all vendor critical security vulnerabilities - Develop and enforce operational processes based on industry best practices - Identify and report anomalies and issues, escalating them to the appropriate teams as needed - Manage multiple demands and priorities effectively while frequently interacting with customers, security operations, and other teams - Mentor and coach cross-functional team members to enhance their skills and performance. - Manage Service Level Agreements (SLAs) and work towards achieving them - The position requires strong organizational skills as well as a technical background in IT operations  
ID
2024-7871
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for a Cloud Operations Manager that would: - Guide and oversee technical resources in managing the operations in a multi-cloud and hybrid environment, including Onboarding, Monitoring, Sustainment, Incident Response, and Customer Service - Play a key role in Platform management, maintenance, and optimization, with a focus on performance and service quality assessments, as well as making improvement recommendations - Report on the operational status of the Platform to senior leadership - Ensure Platform reliability through tasks such as patching, data backups, and disaster recovery planning - Ensure the Platform is compliant with DHS security guidelines and respond to all vendor critical security vulnerabilities - Develop and enforce operational processes based on industry best practices - Identify and report anomalies and issues, escalating them to the appropriate teams as needed - Manage multiple demands and priorities effectively while frequently interacting with customers, security operations, and other teams - Mentor and coach cross-functional team members to enhance their skills and performance. - Manage Service Level Agreements (SLAs) and work towards achieving them - The position requires strong organizational skills as well as a technical background in IT operations  
ID
2024-7870
Location
US-AZ-Chandler
Security Clearance
Public Trust
Sev1Tech is looking for Senior Cyber Security Engineer to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The program will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region (Washington D.C.), in Stennis, MS; Chandler, AZ; and other locations in the U.S and occasionally OCONUS.      This Senior Cyber Security Engineer will be a member of a high functioning team supporting cybersecurity countermeasures to strengthen DHS enterprise and HQ networks, to include overseeing and providing strategic and tactical direction with security compliance. This candidate will work directly with team of network and security engineers, data center specialists, ISSOs, industry vendors, and DHS stakeholder groups.   Responsibilities include but are not limited to: - Maintaining and improving network and security capabilities to include modernization and emerging technologies - Providing technical support for the design, build, and upgrade of network and security systems - Ensuring that the network security architecture is in compliance with security standards and complies with federal and DHS architectural guidelines - Providing performance engineering and network management support to include monitoring using the tools and technologies provided by the DHS customer - Ensuring the security tools and infrastructure are available and operational from the perimeter down to the endpoint and data itself - Develop and implement a Systems Development Life Cycle (SDLC) approach to design, plan, and deliver engineering services, solutions, and products to transition to Operational and Maintenance (O&M) - Provide an array of management and technical support services to DHS sites in accordance with DHS methodologies, processes, and procedures - Provide project engineering services for new services, solutions, and products - Deploy in the IT enterprise. Project engineering scopes of work include hardware and software solutions and products, application tools installations and configurations, and other related activities. Project engineering activities include design, analysis, implementation, testing, deployment, and transition to O&M - Review system requirements and provide recommended architectural and supporting design changes for capacity management, optimal automation, server builds, and configuration - Work with O&M team to develop and implement an IT Service Management/IT Operations Management (ITSM/ITOM) Plan to standardize ITSM/ITOM procedures utilizing best practices in providing IT services and managing IT operations across the enterprise - Coordinate and collaborate with DHS Headquarters (HQ)’s other technology and service providers to integrate and streamline delivery of new LAN A capabilities and services, supplying DHS HQ with seamless communication, planning, project engineering services, and implementation with all parties associated with LAN A infrastructure - Create standard operating procedures, technical schematics, system support, and SDLC documentation for all new IT infrastructure activities and services  
ID
2024-7869
Location
US-MS-Stennis
Security Clearance
Public Trust
Sev1Tech is looking for Senior Cyber Security Engineer to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety.  The program will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support.  Work will be executed in the National Capital Region (Washington D.C.), in Stennis, MS; Chandler, AZ; and other locations in the U.S and occasionally OCONUS.      This Senior Cyber Security Engineer will be a member of a high functioning team supporting cybersecurity countermeasures to strengthen DHS enterprise and HQ networks, to include overseeing and providing strategic and tactical direction with security compliance. This candidate will work directly with team of network and security engineers, data center specialists, ISSOs, industry vendors, and DHS stakeholder groups.   Responsibilities include but are not limited to: - Maintaining and improving network and security capabilities to include modernization and emerging technologies - Providing technical support for the design, build, and upgrade of network and security systems - Ensuring that the network security architecture is in compliance with security standards and complies with federal and DHS architectural guidelines - Providing performance engineering and network management support to include monitoring using the tools and technologies provided by the DHS customer - Ensuring the security tools and infrastructure are available and operational from the perimeter down to the endpoint and data itself - Develop and implement a Systems Development Life Cycle (SDLC) approach to design, plan, and deliver engineering services, solutions, and products to transition to Operational and Maintenance (O&M) - Provide an array of management and technical support services to DHS sites in accordance with DHS methodologies, processes, and procedures - Provide project engineering services for new services, solutions, and products - Deploy in the IT enterprise. Project engineering scopes of work include hardware and software solutions and products, application tools installations and configurations, and other related activities. Project engineering activities include design, analysis, implementation, testing, deployment, and transition to O&M - Review system requirements and provide recommended architectural and supporting design changes for capacity management, optimal automation, server builds, and configuration - Work with O&M team to develop and implement an IT Service Management/IT Operations Management (ITSM/ITOM) Plan to standardize ITSM/ITOM procedures utilizing best practices in providing IT services and managing IT operations across the enterprise - Coordinate and collaborate with DHS Headquarters (HQ)’s other technology and service providers to integrate and streamline delivery of new LAN A capabilities and services, supplying DHS HQ with seamless communication, planning, project engineering services, and implementation with all parties associated with LAN A infrastructure - Create standard operating procedures, technical schematics, system support, and SDLC documentation for all new IT infrastructure activities and services  
ID
2024-7868
Location
US-AZ-Chandler
Security Clearance
Public Trust

Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.