At Secure Technologies Group we offer a steady and challenging career path. We have tremendous opportunities for those self-starting professionals who are looking for a challenge and are ready for a change. To meet the demands of the industry’s ever changing salary environment, Secure Tech has modernized our compensation package to maximize total compensation to our employees. For a work environment that’s fast-paced and high-performance as well as stable and growth-oriented, apply today!
**ALL POSITIONS REQUIRE: TS/SCI W/ FULL SCOPE POLYGRAPH**
Sr. System Engineer
Analyzes user’s requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. Ultimate responsibility for the technical integrity of work performed and deliverables associated with the Systems Engineering area of responsibility. Communicates with other program personnel, government overseers, and senior executives.
Job Experience Required
: Twenty (20) years experience as a SE in programs and contracts of similar scope, type and complexity is required. Demonstrated experience in planning and leading Systems Engineering efforts is required. Five (5) years of additional SE experience may be substituted for a bachelor’s degree. Research background and knowledge of NC2 and/or PCM (Physical Cryto Material).
Additional experience required:
Provide technical direction for the development, engineering, interfacing, integration, and testing of all components of complex PKI hardware/software systems to include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management.
- Create documentation including authorization memorandums, Certificate Practice Statements, Certificate Policies, Cross-Certification Arrangements, key transfer and equipment move approvals. Develop and update policies for interoperability with DoD, federal, industry and partner nations for PKI enabled devices and applications. Understand ITAR requirements and actively work with CACI export control to stay in compliance.
- Assist in audits, resolve discrepancies, evaluate results, create POA&Ms, evaluate audit reports.
- Conduct and/or approve end-to-end system trade analyses to optimize PKI Root Certification Authority operations over its life-cycle through the proper balance of risk and security.
- Recommend courses of actions to government personnel. Experience interacting with senior-level government executives. Serve as a member of the Configuration Control Board (CCB). Participate and provide support to the government representatives at DoD, federal and international working group meetings.
- Develop PKI solutions for various projects. Support mobility, commercial solutions for classified, unmanned aircraft vehicles, RCVS, NPE, TMS, token development as well as other programs involving PKI. Interact with key personal to understand and explain details of those solutions.
- Maintain knowledge of current and evolving agency, national, and international standards applicable to the system development of interest. Apply and enforce use of suitable standards to ensure consistency and interoperability of developer hardware and software.
- Participate in algorithm migrations, cybersecurity evaluations and threat analysis.
- Develop system design alternatives that consider life cycle cost, reuse, complexity, risk, system expansion, and growth.
Provide support to security authorization activities in compliance with the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering.