Careers 2018-12-19T16:47:17+00:00

Obsidian Global – Join Our Team

Obsidian Global employs the most talented leaders and IT professionals to represent our team and culture. We value team members’ interest in leadership, business development, and furthering technical specialization – one size does not fit all!

As an employee of our small business, you can build a career which supports your aspirations, while Obsidian builds the viable workforce to expand our business and support our diverse client base.

Obsidian Global is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.

COMPANY BENEFITS PACKAGE

Job Category

Summary:

As a Senior Solutions Architect, you will have the opportunity to help shape strategies and federally compliant solutions, using sound system architecture and system engineering principals, working directly with customers, system integrators and solution providers. You will provide technical design and thought leadership for Federal new business pursuits and will work with our client’s sales and business development teams. You will lead efforts to capture and share best-practice knowledge among the solution architect community. The ideal candidate will have experience working with U.S. Federal marketplace, proven contacts and the ability to design and implement solutions.

Security Clearance: Minimum SECRET and eligible for TS

Responsibilities:

  • Owning the technical engagement with direct communication with our customer
  • Defining the technical and implementation system(s) architecture(s)
  • Leading the Technical Volume for proposals, writing technical sections of the proposal, developing Bill of Materials (BOM), building Basis of Estimates (BOEs)
  • Participating in the win strategy development and the capture process
  • Responding to Request for Information (RFI) and Request for Proposals (RFP)
  • Developing a deep understanding of Network, Wireless, and other Telecommunications Service offerings within the Federal marketplace in order to provide solutions to our clients’ business imperatives
  • Providing thought leadership in specialized BPO areas
  • Developing technical narratives and white-papers.
  • Works with the client lines of business, support staff, and defines technical solutions using existing client products and COTS components.
  • Will research, analyze, design, and propose architecture solutions and guidance for client pursuits
  • Makes recommendations on technical solutions needs, related applications and /or custom solutions to meet or exceed customer requirements
  • Leading the effort to support, resolve and document issues that arise in the defining integrated solution architecture Identifying technology changes or opportunities that can improve efficiency and performance of our products and its impact on subsequent processes based on industry standards and new initiatives

Qualifications:

  • Demonstrated history of leading solutions for winning proposals in the Federal market
  • 10 years of experience as a New Business Solution Architect, CTO, Enterprise Architect, Senior Technical Sales Engineer or other related senior technical leadership positon
  • 5 years of Federal Proposal experience required
  • 5 years of experience designing and implementing complex network solutions
  • Candidate Education Bachelor’s Degree in Computer Science, Information Systems, Systems Engineering, Business Administration (with relevant technical undergraduate degree), or other related field or equivalent.
  • Network certification a plus
  • Experience working for a large Telecommunications provider a plus

Skills, Knowledge & Ability:

Has extensive experience in doing business within the U.S. Federal domain, experience in architecting, designing and implementing IT programs and environments, and 10+ years of relevant IT architecture and systems engineering experience.

  • Requires advanced to expert level knowledge and understanding across multiple IT disciplines (e.g. business, technology, application and information/data) and specific technologies.
  • Extensive experience working Federal Proposals and excellent proposal writing and graphics conceptualization is required
  • The senior solution architect is responsible for analyzing and incorporating where appropriate, industry trends, and must be familiar with enterprise standards, methodology and governance.
  • The role will requires expert knowledge of the enterprise infrastructure and advanced network solutions
  • The role also requires expertise in the technology platform(s) being utilized (Ruby on Rails, .NET, J2EE, and Open Source platforms) and understanding of application, server, and network security and government requirements such as NIST RMF, FISMA, FedRAMP, and DIACAP.
  • The senior solution architect will have very strong and broad technical skills and the ability to learn new areas quickly, with the ability to drill down to the detail level of the designs. The successful candidate must demonstrate excellent technical leadership skills and have a solid understanding of the federal industry. Proven ability to articulate and implement an enterprise-wide vision for customer-focused operations.
  • Takes initiative to keep skills up to date and to maintain awareness of and, in own area(s) of expertise. Specifically: Has played a leadership role in architectural facets both within and outside the company. Demonstrates high standards of professional and ethical behavior in dealings with clients, colleagues and staff.
  • Has a comprehensive knowledge of at least one specific technology area and a broad understanding across a wide field along with a record of applying such knowledge successfully in a variety of situations.
  • Demonstrates the ability to take significant responsibility and can handle contacts of all types and at all levels. Is skilled and takes accountability for managing change and making sound and far reaching decisions alone on major issues.
  • Conversant with Federal IT strategy, policies and standards. Has working knowledge of change management, configuration management, reliability and safety methods and the use of metrics.
  • Is skilled in project risk management.
  • Communicates persuasively and effectively, both verbally and in writing; including influencing and “selling” to stakeholders. Possesses a strong ability in the use of analogy and storytelling to bring the technical subject matter to non-technical people.
  • Excellent oral and written communication skills are required
  • Demonstrates a rational and organized approach to the tasks undertaken and an awareness of the need to achieve quality. Has thorough knowledge of the system components and interfaces being designed and integrated. Has thorough knowledge of testing procedures, configuration issues and concerns, and has comprehensive understanding of project and program management techniques

Security Clearance: Minimum SECRET and eligible for TS

Qualifications:

  • Minimum of 5 years relevant work experience.
  • Prefer at least 1-2 years strong working knowledge of CyberArk core architecture, vault management, password management, and policy management Experience integrating application password management via CyberArk Providers.
  • Day-to-day activities include working with customer teams and supporting current tasks and activities.
  • Managing the CyberArk environment and dependent technologies, including Enterprise Password Vault, Central Password Manager, Password Vault Web Access, Privileged Session Manager, Windows and Linux server operating systems, F5 load balancers
  • Troubleshooting system and application accounts in a diverse systems/application architecture.
  • Administer password rotations, password malfunctions, account creations, account changes, accounts integrations, maintaining/creating new safes, and CyberArk policies.
  • Managing EPV(Enterprise Password Vault) with respect to information/systems security and identity/access management.
  • Candidates may be required to Provide end-user training and CyberArk infrastructure management.
  • Overseeing and supporting safe and platform creation
  • Assisting safe owners in the onboarding of new accounts
  • Responsible for licensing and entitlement management of the CyberArk environment, including growth and capacity planning
  • Responsible for performance tuning, providing high availability and eliminating single points of failure for the CyberArk environment
  • Provides environment & DR support (clustering, backups, SOPs etc.)
  • Performs vault/safe/platform Administration
  • Supports CyberArk Projects (upgrades, new functionality, etc.
  • Assists with external Projects / Onboarding- gather requirements which would include scope, customization, etc. and account uploads
  • Supports automation
  • Performs account ( Vault Internal) administration, monitoring and maintenance
  • Supports vulnerability management audit/compliance research and remediation
  • Provides on-call support
  • Strong background in CyberArk administration and implementation
  • Manage incidents, service requests, and change tasks in the ITSM system of record; with ownership, and escalation of issues through resolution
  • Experience with integrating PAM solutions to Splunk and/or IAM tools such as SailPoint.
  • Experience integration PAM solutions with multi-factor authenticators, namely PIV cards
  • Accurately maintain all documentation as it relates to configuration, processes, service records, asset inventories, topologies, administration manuals, job instructions, support contacts etc.
  • Ensure IT Leadership is aware of all known and identified risks to system availability, performance, reliability and security
  • Scripting, Automation, and Orchestration to drive efficiencies within IT operations
  • Partner with security and risk teams to implement and maintain security polices and configurations in accordance with corporate requirements
  • Demonstrated problem solving skills and the ability to work collaboratively with other departments to resolve issues.
  • Possess excellent written and verbal communication skills.
  • Strong requirements elicitation and conflict resolution skills.
  • Ability to work in a fast-paced environment, handling multiple priorities.

Security Clearance: Minimum SECRET and eligible for TS

Summary:

The Cyber Engineer designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, applications and/or provide mitigation strategies. The Cyber Engineer ensures system security needs are established and maintained for various objects/matters. Integrates new architectural features into existing infrastructures, design cyber security architectural artifacts, provide architectural analysis of cyber security features and relate existing system to future needs and trends. Evaluates computer software and network for threats and/or malware Collects data from a variety of network security tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs to analyze events that occur within their environment. Employs and provides computer advanced forensic tools, techniques, and intrusion support for attack reconstruction and high technology investigations, while reviewing threat data from various sources. This position may also identify network computer intrusion evidence and perpetrators.

Responsibilities include:

  • Analyze output from various security devices and malware and incident reports to improve detection of and to minimize future incidents.
  • Assess and analyze system security to identify and mitigate risks and vulnerabilities.
  • Recommend countermeasures to mitigate risks and vulnerabilities.
  • Prepare documentation, including incident reports, security recommendations, etc.

Basic Qualifications:

  • Experience in intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis.
  • Experience with standard security principles, policies, standards and industry best practices.
  • Experience with software development
  • Understanding of windows and UNIX operating systems
  • Understanding of security technologies and concepts, experience in design and implementation of secure network solutions including DMZs and web portals
  • Knowledge of Information Assurance and Information Operations technologies and development activities.
  • Understanding of the processes and guidelines for Certifying & Accrediting (DCID, ICD, NIST 800-53, SANS 20) information systems based upon experience on a large-scale development program.
  • Practical experience hardening IT systems in compliance with STE/STIG guidelines
  • Possesses or quickly develop a comprehensive understanding of Government Information Security policies, regulations, and guidelines.
  • Experience and knowledge of networking (TCP/IP, topology, sockets and security), operating systems (Windows/UNIX/Linux), and web technologies (Internet security)

Preferred Qualifications:

  • Experience with Security Event Incident Management, Log Correlation and Network Behavior Anomaly detection systems (ArcSight, QRadar , Splunk, Mazu, Arbor, etc.)
  • Experience and/or familiarity with one of more of the following: Java, Swing, Hibernate, Struts, JUnit, Perl, Ruby, Python, HTML, C, C++, .NET, ColdFusion, Adobe, Assembly language, etc.
  • Demonstrated experience and/or familiarity with VMWare and virtual machines.
  • Ability to write custom tools and modify existing intrusion detection tools.
  • Experience with Agile development methodology.
  • Experience with automated testing tools (e.g., RSpec, Cucumber, etc.)
  • Experience with one or more of the following:
    • Security COTS integration
    • Security Incident Event Management
    • Insider Threat Monitoring
    • Operating System Hardening
    • Vulnerability Assessment testing
    • Identification and Authentication schemes
    • Public Key Infrastructure and Identity Management
    • Cross Domain Solutions
    • Computer Network Exploitation (CNE)
    • Computer Network Operations (CNO)
    • Malware Analysis
    • Reverse Software Engineering
    • Security engineering

Certifications:

  • DOD 8570.1-M Compliance at IAT Level I certification required.

Security Clearance: Minimum SECRET and eligible for TS

Summary:

The System Administrator provides support for implementation, troubleshooting and maintenance of Information Technology (IT) systems. Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX and Windows operating systems and installs/loads operating system software, troubleshoots, maintains integrity and configures network components along with implementing operating systems enhancements to improve reliability and performance. Provides specific detailed information for hardware and software selection, implementation techniques and tools for the most efficient solution to meet business needs, including present and future capacity requirements. Conducts testing of network design. Maintains technical expertise in all areas of network and computer hardware and software interconnection and interfacing, such as routers, multiplexers, firewalls, hubs, bridges, gateways, etc. Evaluates and reports on new communications technologies to enhance capabilities of the network. Supports and provides Tier 1 (Help Desk) and Tier 2 (Escalation) problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers.

Responsibilities:

  • Active Top-Secret security clearance required.
  • S. Citizenship required.
  • Demonstrated experience and/or familiarity with one of more of the following shell and scripting languages: Bourne, C, Krone, Bash, Perl, Batch, VBScript, etc.
  • Demonstrated experience and/or familiarity with one of more of the following: Windows, Solaris, AIX, Red Hat, IRIX, Linux or UNIX.
  • Demonstrated experience and/or familiarity with trouble-ticket or other tracking system.
  • Demonstrated experience and/or familiarity with one of more of the following: networking protocols and applications (e.g., DNS, TCP/IP stack, sockets, console, license, NFS, SAMBA, and back-up, SAN and mail servers).
  • Manages the functionality and efficiency of a group of computers running on one or more operating systems.
  • Perform regular maintenance and troubleshooting on system.
  • Maintain the integrity and security of IT system.
  • Prepare and maintain system documentation and process documentation.
  • Interact with users
  • Adhere to policies and standards for allocation related to the use of computing resources.
  • Develop and implement system testing strategies and document results.
  • Provide advice and training to end-users.
  • Provide remote access capability for users using approved secure access methods.
  • Provide software upgrade plans for Commercial Off-the-Shelf (COTS) and Government Off-the-Shelf (GOTS) software to the Change Management process.
  • Conduct testing using approved testing procedures for all new staged hardware/software (GFE), as well as components that have been updated, received patches, and/or have been repaired.
  • Establish and maintain user accounts, passwords, etc.
  • Support shift work, as required.

Preferred Qualifications:

  • Experience or familiarity with Agile development methodology.

Certifications:

  • Relevant certifications desired (Red Hat, Microsoft, Oracle, Solaris, UNIX, etc.)
  • DoD 8570.1-M Compliance at IAT Level I required.

Summary:

Apply knowledge of Cybersecurity engineering services to conceptualize, design, and build secure technical solutions, including operationally viable and efficient applications, systems, architectures, and infrastructure. Serve as an SME in Privileged Access Management solutions design and implementation. Advise on the design and innovative integration of identity and access management toolsets in PAM to enable fine-grained access control to improve the security posture of large organizations. Analyze emerging technologies and design and build architectures and solutions to enable the secure implementation of new technologies. Provide work leadership to junior employees, as needed.

Basic Qualifications:

  • 3+ years of experience with software or systems engineering
  • 3+ years of experience with JavaScript, C#, or Web services
  • 3+ years of experience with requirements, design, implementation integration, and testing using CyberArk, Xceedium and CA PAM, or Beyond Trust
  • 3+ years of experience with designing and architecting large-scale identity and access management solutions
  • 3+ years of experience with implementing identity and access management solutions
  • Knowledge of multi-factor authentication technologies and RBAC designs
  • Ability to expand functional expertise and adapt to new capabilities based on the needs of the client -Ability to obtain a security clearance
  • BA or BS degree

Preferred Qualifications:

  • Experience with Cybersecurity Ark and SailPoint
  • Experience with Identity as a Service vendors, including PingIdentity, Oracle, and Microsoft
  • Experience with implementing PKI and PIV standards
  • Experience with federation technologies and solutions -Knowledge of information security best practices
  • Knowledge of Active Directory design and configuration
  • Knowledge of Enterprise Directory architecture
  • BS degree in CS, Software Engineering, or a related field preferred Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

Summary:

The Network Engineer maintains smooth operation of voice and data networks. Plans, evaluates, coordinates and performs installation and/or reconfiguration of hardware and software elements of data and/or voice communication network. Maintains technical expertise in all areas of voice and data networks hardware and software interconnection and interfacing, such as routers, multiplexers, firewalls, hubs, bridges, gateways, etc. May propose solutions to management to ensure all communications requirements based on future needs and current usage, configuring such solutions to optimize cost savings. Prepares or ensures that appropriate network documentation exists, including operational instructions. Provides regular monitoring and network analysis regarding short- and long-range planning for in-house systems. May coordinate third-party maintenance for network equipment. May design network or portion of network that include selection of hardware and software packages.

Clearance: Active Top Secret Clearance Required

Responsibilities:

  • Support enterprise and development network infrastructure.
  • Support maintenance, troubleshooting and IA of network.
  • Demonstrated experience and/or familiarity with one of more of the following: TCP/IP, Cisco switches, routers, VLAN configuration, firewalls, VPN, storage (SANS, RAID, etc.), Network Intrusion Device Systems, etc.
  • Demonstrated experience and/or familiarity with one of more of the following: ACLs, IAVA, DCID 6/3, STIGS, etc.
  • Evaluate, test, install and implement new and existing hardware and software across physical media, protocol stacks, switches, routers, firewalls, intrusion detection devices, and network management components.
  • Perform problem isolation and resolution of network problems through troubleshooting and devising effective solutions.
  • Install patches and maintain accurate records of program corrections and patch levels. Perform Network Management functions such as, network monitoring, network performance measurement and reporting.
  • Perform vulnerability scans, (e.g., Harris STAT, Retina).
  • Perform updates to network devices, including Firewalls, NIDS, switches, routers and crypto devices.
  • Maintain accurate records of program corrections and patch/update level.
  • Support development and maintenance of all required network policies and procedures.

Preferred Qualifications:

  • Demonstrated experience and/or familiarity with one of more of the following is required: Intrusion Detection and Prevention Systems (IDS/IPS), log analysis, malware analysis, network traffic flow, traffic and packet analysis.
  • Experience or familiarity with Agile development methodology.
  • Demonstrated experience and/or familiarity with tools used for security analysis (e.g., tcpdump, Wireshark, snort, ngrep, nmap, strings, hexdump, md5sum, systools) is required.
  • Experience with Security Event Incident Management, Log Correlation and Network Behavior Anomaly detection systems (ArcSight, QRadar , Splunk, Mazu, Arbor, etc) is required.
  • Demonstrated experience and/or familiarity with IDS systems (e.g., SNORT, SourceFire, Proventia, BroIDS) is required.

Certifications:

  • DoD 8570.1-M Compliance at IAT Level I required.
  • Certified Information Systems Security Professional (CISSP) certification preferred.

Summary:

We are seeking a Senior Ruby on Rails Application Developer to be responsible for development, testing, and maintenance of enterprise applications utilizing Ruby on Rails, ReactJS and/or React Native and related technologies. Our 60+ person development team works on great projects that leverage advanced, modern development stacks and we have a blast doing it. With over 20 applications in our portfolio, you have the ability find what interests you with the autonomy to work 100% remotely (in the US). We work on large Ruby on Rails web applications and bleeding edge React Native mobile applications with RoR backends. You will be expected to build, test, and deploy applications, enhancements or microservices for existing applications on their own utilizing Test Driven Development (TDD), Lean, and XPmethodologies. You will be responsible for full stack development including creating and executing SQL queries to verify data and troubleshoot issues. You will also facilitate technical and architectural workshops and design sessions, as well as mentor other developers.

Basic Qualifications:

  • 5+ years Ruby on Rails experience
  • Mobile First Development
  • Responsive Web Design
  • Architecture and Development Support Services for New/existing Ruby on Rail applications
  • Development using CSS and HTML 5
  • Test Driven Development
  • Behavior Driven Development
  • Automated Testing
  • Continuous Integration
  • Continuous delivery
  • Agile Development Practices (Scrum, Scumban, Kanban)
  • O&M Support for Ruby applications
  • Evaluation and recommend new software products and open source technologies
  • Document software procedures and develop software reports, plans, and products, such as
  • software development plans, software requirements specifications, software design
  • documents, software development files, source code, and test plans

Tools:

  • Ruby on Rails
  • Reactjs
  • Bootstrap 3
  • Sublime Text
  • Atom
  • HTML 5
  • CSS3
  • JavaScript
  • PostgreSQL / MongoDB / MySQL
  • Amazon Web Services
  • Fedora
  • Red Hat Linux
  • CentOS
  • Ubuntu
  • Chef
  • Gitlab, Github
  • Selenium
  • Leankit
  • JIRA
  • Cucumber
  • Brakman
  • rspec
  • Apache

Additional Desired Tools:

  • Nagios
  • Piwick
  • New Relic
  • PhoneGap – or – Accelerator
  • Jenkins
  • Web Analytics
  • Capistrano
  • Confluence
  • Sharepoint

Summary:

Within DHS, the Office of Cybersecurity and Communications (CS&C) is responsible for enhancing the security, resiliency, and reliability of the nation’s cyber and communications infrastructure.

There are 5 divisions:

  • Office of Emergency Communications (OEC)
  • National Cybersecurity and Communications Integration Center (NCCIC)
  • Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR)
  • Federal Network Resilience (FNR)
  • Network Security Deployment (NSD)

Responsibilities:

  • Determines enterprise information assurance and security standards.
  • Develops and implements information assurance/security standards and procedures.
  • Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements.
  • Identifies, reports, and resolves security violations.
  • Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
  • Supports customers at the highest levels in the development and implementation of doctrine and policies.
  • Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
  • Performs analysis, design, and development of security features for system architectures.
  • Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
  • Designs, develops, engineers, and implements solutions that meet security requirements.
  • Provides integration and implementation of the computer system security solution.
  • Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
  • Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
  • Ensures that all information systems are functional and secure.

Clearance:

  • Minimum DoD Secret (TS clearable)
  • You will need to obtain a DHS Suitability clearance

Basic Qualifications:

SOC Analysts should have expertise in one of the following specialized areas:

  • Email security
  • Digital media forensic
    Monitoring and detection
  • Incident Response
  • Vulnerability assessment and pen testing

Responsibilities:

  • Cyber intelligence analysis Supports detection, containment, and eradication of APT activities targeting customer networks.
  • Process community reporting, conduct link analysis, and collaborate with other Government cyber
    fusion teams.
  • Publish intelligence products to inform network defenders about APT activities, new detection methods, among other topics of interest.
  • Experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.

Education and Certification Requirements:

  • Bachelors degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field.
  • Minimum of 5 years of relevant experience.

Should have at least one of the following certifications: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH”

Summary:

The Software Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements.

Responsibilities:

  • Design and develop new software.
  • Maintain existing software and resolves software problem reports.
  • Modify existing software to add new features.
  • Perform individually and as part of a team.
  • Utilize software development and software design methodologies appropriate to the development environment and in compliance with customer and industry lifecycle development approaches.
  • Develop, execute and document software testing, including test cases.
  • Perform software requirement analysis, derivation and allocation.
  • Provide input to the software components of system design to include hardware/software trade-offs, software reuse, application security, and use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development.
  • Provide input to hardware (COTS/GOTS/capacity/etc.) recommendations.
  • Prepare software documentation, including user guides.

Required Qualifications:

  • Active Top Secret security clearance required.
  • S. Citizenship required.
  • Demonstrated experience and/or familiarity with one of more of the following: Java, Perl, Ruby, Python, HTML, C, C++, .NET, ColdFusion, Adobe, etc.
  • Demonstrated experience and/or familiarity with one of more of the following: SQL, Oracle, MySQL, JBDC, etc.
  • Demonstrated experience and/or familiarity with one of more of the following: Windows, Linux, Apache, TomCat, Ozone Widgets, Spring, Struts, JUnit, Hibernate, etc.

Preferred Qualifications:

  • Experience with Agile development methodology.
  • Experience with software configuration management and control tools (e.g., CVS, Eclipse, ClearCase, etc.)
  • Experience with automated testing tools (e.g., RSpec, Cucumber, etc.)

Certifications:

  • DoD 8570.1-M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP)) certification highly desired

Let Us Know How You Stand Out

Excited to work with us, but don’t see your position listed? Get in touch with us today.

WE LOOK FORWARD TO HEARING FROM YOU