Criterion Systems, Inc.

Job Listings


Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.

Use this form to perform another job search

The system cannot access your location for 1 of 2 reasons:
  1. Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
  2. Your location information has yet to be received. Please wait a moment then hit [Search] again.
Click column header to sort

Search Results Page 1 of 6

Job Locations US | US-LA-New Orleans | US-MO-Kansas City
- Maintain global and application admin settings as required. - Maintain and troubleshoot scheduled production housekeeping and report jobs. - Troubleshoot failed installation and promotion jobs. - Customize ChangeMan ZMF user exits, create/maintain custom reports, update skeleton code as required. - Customize and implement selectable options (such as OFM). - Work with the DISC mainframe systems team to implement COBOL 6.x. - Install patches as required. - Maintain both test and production started tasks (STCs) in NFCplex and TESTplex. - Sync versions of all executable libraries in NFCplex to TESTplex using FDRABR utilities. - Sync versions of VSAM master files in TESTplex by restoring from daily backups in NFCplex. - Participate in DR drills and system upgrade tests. - Install all changes utilizing “ChangeMan on ChangeMan”. The CMNA app is used for this purpose at NFC.         - Perform all ChangeMan user assistance as required. - Work with USDA Project Managers as required to ensure ChangeMan processes/user assistance are incorporated where necessary.
Clearance Requirement
Public Trust
Category
Information Technology
ID
2021-2075
Job Locations US-MO-Kansas City
- Define and regularly report on program metrics and measurement. - Ensure all stakeholder parties are appropriately informed and aligned. Surface decision points and mis-alignment; proactively seek out and manage objections and competing perspectives. - Continuously monitor program exposure and ensure appropriate risk communication, escalation, and risk mitigation plans are in place. - Drive continuous improvement; challenge the status quo and proactively identify gaps and opportunities - Provide excellent communication; effectively achieve appropriate transparency and set expectations. - Effectively partner & present with senior executives. - Have deep understanding of Program and Project Management best practices and strong organizational skills - Develop, implement, and monitor day-to-day operational systems and processes that provide visibility into goals, progress, and obstacles for our key initiatives - Build and maintain relationships with all department heads to make decisions regarding operational activity and strategic goals - Ability to streamline and implement new structures and roles that create speed, efficiency, and support rapidly shifting business demands - Plan, monitor, and analyze key metrics for the day-to-day performance of the operations to ensure efficient and timely completion of tasks  
Clearance Requirement
Public Trust
Category
Information Technology
ID
2021-2074
Job Locations US-DC
- Responds to, diagnoses and resolves problems through discussion with users. - Ensures a timely process through which problems are controlled. Includes problem recognition, research, isolation, resolution, and follow-up steps. - Provides support to end users on a variety of issues. - Identifies, researches, and resolves technical problems. - Responds to telephone calls, email and personnel requests for technical support, documenting every contact. - Documents, tracks, and monitors the problem to ensure a timely resolution. - Provides 1st and 2nd tier support to end users for PC applications and hardware via remote tools and deskside visits - Interact with network services, software systems engineering, and/or applications development to restore service and/or identify and correct core problems. - Simulates or recreates user problems to resolve operating difficulties. - Recommends systems modifications to reduce user problems. - Possesses and applies expertise on multiple complex work assignments. - Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. - Operates with appreciable latitude in developing methodology and presenting solutions to problems. - Contributes to deliverables and performance metrics. - Utilizes the ServiceNow ticketing system to track all work
Clearance Requirement
Public Trust
Category
Information Technology
ID
2021-2072
Job Locations US-NV-Las Vegas
- Manages government furnished equipment (GFE) procured in support of NNSA projects and operations - Performs shipping and receiving activities, reviewing packaging for potential damage to contents; confirming accuracy and completeness of delivery against purchase orders and shipping manifests - Performs equipment movement, distribution, and spares management for government furnished equipment (GFE) - Assists with deployment of equipment to customer regional offices and home offices; arranges delivery logistics, tracking of inventory, and communicates with the customer regarding schedule, disposition, and shipping concerns - Executes defined processes for managing and tracking GFE throughout the asset lifecycle - Tracks and maintains an inventory of all assets throughout the asset lifecycle according to defined federal property management requirements and procedures - Performs regularly scheduled asset inventories in accordance with govt. and dept. policies and guidance Including Quarterly Sensitive Asset Inventories Ensures compliance with federally mandated regulations and laws - Facilitates equipment delivery, returns, relocations, storage and ownership transfers - Ensures organizational awareness concerning property policies and procedures - Conducts investigations of lost, damaged, or destroyed property and reporting of - Maintains the IARC asset database and updates records as necessary - Works both independently and collaboratively with local and remote staff - Prioritizes and executes tasks in a high-pressure environment - Demonstrates strong inventory and time management skills - Generates reports on periodic and ad hoc basis
Clearance Requirement
Ability to obtain and maintain a security clearance
Category
Administrative/Clerical
ID
2021-2071
Job Locations US-VA-Arlington
We are seeking a Systems Security Analyst to support a recently awarded contract in Arlington, VA.  Once hired you will be responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.  You will also be responsible for the following:   - Provide cybersecurity guidance to leadership. - Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). - Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. - Verify and update security documentation reflecting the application/system - Verify minimum security requirements are in place for all applications security design features - Evaluate the adequacy of security designs. - Apply cybersecurity and privacy principles to organizational requirements - Document current as-is and desired to-be states and performs gap analysis for proposed new or changed systems or processes. - Consult with stakeholders to elicit, evaluate, develop and document business needs - Create use cases to facilitate the elicitation of functional requirements - Creates data models, analyze and document data requirements, data elements and data flows. - Documents a system's or processes’ purpose and preliminary concept of operations. - Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules. - Collaborate with architects and system / process designers to refine potential solutions into an optimum solution while maintaining compliance with security objectives and constraints. - Facilitate stakeholder and business sign-off on selected solution - Participates with the project testing team to ensure that testing requirements support identified use cases, functional, security and User Experience requirements. - Assesses the effectiveness of cybersecurity measures utilized by a proposed new or changed system(s). - Participates with the change management team to develop training and implementation materials assure a smooth deployment of the project to stakeholders and business entities
Clearance Requirement
Public Trust
Category
Information Technology
ID
2021-2067
Job Locations US-MO
Criterion Systems is seeking a mission-focused Information Systems Security Manager to support and contribute to our government customer’s success in St. Louis, MO. The individual in this position must be a motivated team player that strives for professional and technical excellence in managing Information Systems. Primary Responsibilities include, but are not limited to:  - Responsible for the cybersecurity of a program, organization, system, or enclave. - Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. - Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. - Advise senior management (e.g., Chief Information Officer [CIO]) on risk levels and security posture. - Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements. - Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture. - Collect and maintain data needed to meet system cybersecurity reporting. - Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. - Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. - Ensure that security improvement actions are evaluated, validated, and implemented as required. - Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. - Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s). - Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. - Establish overall enterprise information security architecture (EISA) with the organization's overall security strategy. - Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed. - Evaluate cost/benefit, economic, and risk analysis in decision-making process. - Identify alternative information security strategies to address organizational security objective. - Identify information technology (IT) security program implications of new technologies or technology upgrades. - Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. - Interpret and/or approve security requirements relative to the capabilities of new information technologies. - Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program. - Lead and align information technology (IT) security priorities with the security strategy. - Lead and oversee information security budget, staffing, and contracting. - Manage the monitoring of information security data sources to maintain organizational situational awareness. - Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency. - Manage threat or target analysis of cyber defense information and production of threat information within the enterprise. - Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection. - Oversee the information security training and awareness program. - Participate in an information security risk assessment during the Security Assessment and Authorization process. - Participate in the development or modification of the computer environment cybersecurity program plans and requirements. - Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations. - Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans. - Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities. - Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents. - Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters. - Recognize a possible security violation and take appropriate action to report the incident, as required. - Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements. - Recommend policy and coordinate review and approval. - Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. - Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. - Use federal and organization-specific published documents to manage operations of their computing environment system(s). - Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. - Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. - Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2066
Job Locations US-VA-Springfield
Criterion Systems is seeking a mission-focusedAdvanced Data Analyst to support and contribute to our government customer’s success in Springfield, VA. The individual in this position must be a motivated team player that strives for professional and technical excellence in Advanced Data Analytics. Primary Responsibilities include, but are not limited to: - Examines data from multiple disparate sources with the goal of providing security and privacy insight. - Designs and implements custom algorithms, work-flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. - Examines data from multiple disparate sources with the goal of providing security and privacy insight. - Designs and implements custom algorithms, work-flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.   - Examines data from multiple disparate sources with the goal of providing security and privacy insight. - Designs and implements custom algorithms, work-flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. - Analyze and define data requirements and specifications. - Analyze and plan for anticipated changes in data capacity requirements. - Develop data standards, policies, and procedures. - Manage the compilation, cataloging, caching, distribution, and retrieval of data. - Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements. - Provide recommendations on new database technologies and architectures. - Analyze data sources to provide actionable recommendations. - Assess the validity of source data and subsequent findings. - Collect metrics and trending data. - Conduct hypothesis testing using statistical processes. - Confer with systems analysts, engineers, programmers, and others to design application. - Develop and facilitate data-gathering methods. - Develop strategic insights from large data sets. - Present technical information to technical and nontechnical audiences. - Present data in creative formats. - Program custom algorithms. - Provide actionable recommendations to critical stakeholders based on data analysis and findings. - Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method. - Effectively allocate storage capacity in the design of data management systems. - Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems. - Utilize different programming languages to write code, open files, read files, and write output to different files. - Develop and implement data mining and data warehousing programs.  
Clearance Requirement
Top Secret/SCI/CI Poly
Category
Information Technology
ID
2021-2060
Job Locations US-VA-Springfield
Criterion Systems is seeking a mission-focusedTarget Network Analyst to support and contribute to our government customer’s success in Springfield, VA. The individual in this position must be a motivated team player that strives for professional and technical excellence in Target Network Analysis. Primary Responsibilities include, but are not limited to:  - Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. - Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them. - Provide expertise to course of action development. - Classify documents in accordance with classification guidelines. - Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. - Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. - Identify and conduct analysis of target communications to identify information essential to support operations. - Conduct nodal analysis. - Conduct quality control to determine validity and relevance of information gathered about networks. - Conduct target research and analysis. - Determine what technologies are used by a given target. - Apply analytic techniques to gain more target information. - Generate and evaluate the effectiveness of network analysis strategies. - Gather information about networks through traditional and alternative techniques. - Generate requests for information. - Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. - Identify collection gaps and potential collection strategies against targets. - Identify network components and their functionality to enable analysis and target development. - Make recommendations to guide collection in support of customer requirements. - Provides subject matter expertise to development of exercises. - Perform content and/or metadata analysis to meet organization objectives. - Profile targets and their activities. - Provide target recommendations which meet leadership objectives. - Review appropriate information sources to determine validity and relevance of information gathered. - Reconstruct networks in diagram or report format. - Research communications trends in emerging technologies.
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2052
Job Locations US-NV-Las Vegas
- Follow up on technical issues with operations and call center teams and all stakeholders in resolution process. - Support software and hardware issues and ensure stable system performance. - Execute systems administration tasks in support of system performance tuning on workstations, applications or network infrastructure in support of Microsoft Windows operating systems services. - Observe industry best practices, standards, and procedures. - Partner with other team members to integrate Linux/Unix services with Microsoft Windows systems. - Support maintenance and monitoring of the system/server infrastructure to include patching, system upgrade, backup, and configuration. - Conduct problem management process (root cause analysis) attempt to determine the real or underlying cause of an incident in order to prevent future recurrences. - Support forensic analysis, triage, and break fix of system server/server related trouble tickets. - Perform account management, including user account creation and deletion. - Perform certification and professional development training to remain current on technologies and to improve skill sets and efficiency.
Clearance Requirement
DOE Q
Category
Information Technology
ID
2021-2051
Job Locations US-NV-Las Vegas
Criterion Systems is seeking a Network Operations Center (NOC) Analyst to support a government customer in Las Vegas, Nevada. The candidate will be part of a Service Desk / Network Operations team working in a 24x7x365 environment. The position requires interaction with cyber security personnel at customer sites, various levels of management, and outside agencies. Position can include up to 10% travel, local and nationwide. Applicant must be a positive, flexible, self-starter requiring minimal supervision, and able to excel in a fast-paced environment. Communication skills are critical with the ability to verbalize and provide documentation to both technical and non-technical audiences. Applicants must be detail-oriented and have the ability to multi-task effectively.   - This position requires shift work based on 24x7x365 operations. - Support the current reporting of weekly and monthly enterprise metrics. - Follow up on technical issues with Operations engineering team and all stakeholders in resolution process. - Support accurate updates of service tickets and tracking problems to resolution. - Maintain enterprise customer point of contact information. - Provide initial remote troubleshooting, analysis, and triage of reported events. - Act as both an external and internal facing point of contact to facilitate handling of problem reports and escalate technical issues and communicate network status. - Support software and hardware issues and ensure stable system performance. - Observe industry best practices, standards, and procedures. - Support maintenance and monitoring of the system/server infrastructure to include patching, system upgrade, backup, and configuration. - Tracking and documenting daily work tasks and issues and communicating them with the rest of the team. - Receive and document subscriber site security incident reports, and communicate to appropriate parties. - Assist in account management for internal users and external subscriber organizations. - Perform certification and professional development training to remain current on technologies and to improve skill sets and efficiency. - Update management on operational and staffing issues. - This position may require shift work. - Develop and maintain workflows and standard operating procedures for the Service Desk / Network Operations Center.
Clearance Requirement
DOE Q
Category
Information Technology
ID
2021-2050
Job Locations US
Day-to-day responsibilities include (but not limited to): - Identify, capture, and win new, long-term business opportunities leveraging the company’s core capabilities to position the company for large, long-term program and services opportunities. - Manage capture processes and effectively communicate to senior internal management as well as and external partners. - Responsible for new business development planning and new opportunity identification. - Develop and brief Bid/No-Bid recommendations and capture strategies for new business opportunities. - Develop and implement call plans with government customers to identify their key goals, missions and priorities, and map these to company capabilities. - Responsibilities extend across all phases of Business Development including market analysis, marketing to customers, capture plan development and execution, developing winning strategies to capture new business, and participating in proposal development with executive summary writing and color team reviews.
Clearance Requirement
Ability to obtain and maintain a security clearance
Category
Sales
ID
2021-2049
Job Locations US-VA-Springfield
Criterion Systems is seeking a mission-focusedExploitation Analyst to support and contribute to our government customer’s success in Springfield, VA. The individual in this position must be a motivated team player that strives for professional and technical excellence in Exploitation Analytics. Primary Responsibilities include, but are not limited to:  - Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. - Conduct and/or support authorized penetration testing on enterprise network assets. - Perform penetration testing as required for new or updated applications. - Apply and utilize authorized cyber capabilities to enable access to targeted networks. - Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements. - Apply and obey applicable statutes, laws, regulations and policies. - Perform analysis for target infrastructure exploitation activities. - Collaborate with other internal and external partner organizations on target access and operational issues. - Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers. - Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. - Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access. - Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. - Examine intercept-related metadata and content with an understanding of targeting significance. - Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development. - Identify gaps in our understanding of target technology and developing innovative collection approaches. - Identify, locate, and track targets via geospatial analysis techniques. - Lead or enable exploitation operations in support of organization objectives and target requirements. - Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. - Monitor target networks to provide indications and warning of target communications changes or processing failures. - Produce network reconstructions. - Profile network or system administrators and their activities.
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2048
Job Locations US-NV-Las Vegas
Criterion Systems is seeking a Network Engineer in Las Vegas, Nevada. Once hired, you will execute operations, maintenance and engineering of network infrastructure devices and applications. It will require you to execute installation activities, interface with network operations, project team members, and with customers to resolve Tier 2 and Tier 3 escalations. You will support requirements analysis, design efforts, engineering, operations and maintenance (O&M). Addionally you will provide subject matter expertise and innovation regarding networking technologies and be a part of a team charged with delivery of technology solutions and optimization of IT infrastructure and operations throughout the systems support life cycle.   - Support customer interface, requirements analysis, and development of policies, procedures in accordance with industry best practices. - Complete assigned tasks independently,or as part of a larger project team. - Configure network infrastructure device operating systems, determine hardware specifications, and validate system performance. - Execute performance tuning, operational process development, and security configuration management in accordance with best practices, standards, and procedures. - Operate and maintain network infrastructure devices including, but not limited to patching, system upgrade, backup, and system configuration. - Conduct root cause analysis to determine the real or underlying cause of an incident in order to prevent future recurrences. - Support analysis, triage and break/fix of infrastructure system-related trouble tickets. - Develop and document standard operating procedures and best practices in the technical repository. - Produce detailed network design documents and diagrams. - Support management reporting requirements. - This position will require occasional after-hours support and on-call rotation to support operational needs. - Some limited travel required (<20%).
Clearance Requirement
Ability to obtain and maintain a security clearance
Category
Information Technology
ID
2021-2047
Job Locations US-VA-Springfield
Criterion Systems is seeking a mission-focused Cyber Operator to support and contribute to our government customer’s success in Springfield, VA. The individual in this position must be a motivated team player that strives for professional and technical excellence in Cyber Operations. Primary Responsibilities include, but are not limited to:  - Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executing on-net operations. - Analyze internal operational architecture, tools, and procedures for ways to improve performance. - Analyze target operational architecture for ways to gain access. - Collaborate with development organizations to create and deploy the tools needed to achieve objectives. - Conduct access enabling of wireless computer and digital networks. - Conduct collection and processing of wireless computer and digital networks. - Conduct exploitation of wireless computer and digital networks. - Conduct network scouting and vulnerability analyses of systems within a network. - Conduct on-net activities to control and exfiltrate data from deployed technologies. - Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies. - Conduct open source data collection via various online tools. - Conduct survey of computer and digital networks. - Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers). - Detect exploits against targeted networks and hosts and react accordingly. - Develop new techniques for gaining and keeping access to target systems. - Edit or execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems. - Exploit network devices, security devices, and/or terminals or environments using various methods or tools. - Facilitate access enabling by physical and/or wireless means. - Identify potential points of strength and vulnerability within a network. - Maintain situational awareness and functionality of organic operational infrastructure. - Operate and maintain automated systems for gaining and maintaining access to target systems. - Conduct cyber activities to degrade/remove information resident in computers and computer networks. - Process exfiltrated data for analysis and/or dissemination to customers. - Provide real-time actionable geolocation information. - Record information collection and/or environment preparation activities against targets during operations designed to achieve cyber effects. - Test and evaluate locally developed tools for operational use. - Test internal developed tools and techniques against target tools.
Clearance Requirement
Top Secret/SCI/CI Poly
Category
Information Technology
ID
2021-2046
Job Locations US-MO
Criterion Systems is seeking a mission-focusedVulnerability Assessment Analyst to support and contribute to our government customer’s success in St. Louis, MO. The individual in this position must be a motivated team player that strives for professional and technical excellence in Vulnerability Assessment Analysis. Primary Responsibilities include, but are not limited to:  - Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. - Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. - Conduct and/or support authorized penetration testing on enterprise network assets. - Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. - Maintain knowledge of applicable cyber defense policies regulations, and compliance documents specifically related to cyber defense auditing. - Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. - Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews). - Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications). - Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2045
Job Locations US-MO
Criterion Systems is seeking a mission-focusedAdvancedSoftware Developer to support and contribute to our government customer’s success in St. Louis, MO. The individual in this position must be a motivated team player that strives for professional and technical excellence in Advanced Software Development. Primary Responsibilities include, but are not limited to:  - Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.  - Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. - Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. - Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews. - Apply secure code documentation. - Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules. - Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program. - Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. - Consult with engineering staff to evaluate interface between hardware and software. - Correct errors by making appropriate changes and rechecking the program to ensure that desired results are produced. - Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. - Develop secure code and error handling. - Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. - Identify basic common coding flaws at a high level. - Identify security implications and apply methodologies within centralized and decentralized environments across the enterprise's computer systems in software development. - Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life. - Perform integrated quality assurance testing for security functionality and resiliency attack. - Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities. - Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. - Prepare detailed work-flow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language. - Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing. - Store, retrieve, and manipulate data for analysis of system capabilities and requirements. - Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. - Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. - Identify and leverage the enterprise-wide version control system while designing and developing secure applications. - Consult with customers about software system design and maintenance. - Direct software programming and development of documentation. - Supervise and assign work to programmers, designers, technologists and technicians, and other engineering and scientific personnel. - Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate. - Identify and leverage the enterprise-wide security services while designing and developing secure applications (e.g., Enterprise PKI, Federated Identity server, Enterprise Anti-virus solution) when appropriate. - Conduct trial runs of programs and software applications to ensure that the desired information is produced and instructions and security levels are correct. - Develop software system testing and validation procedures, programming, and documentation. - Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance. - Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities. - Determine and document software patches or the extent of releases that would leave software vulnerable.
Clearance Requirement
Top Secret/SCI/CI Poly
Category
Information Technology
ID
2021-2044
Job Locations US-VA
Criterion Systems is seeking a mission-focused Advanced Enterprise Architect, to support and contribute to our government customer’s success in Virginia. The individual in this position must be a motivated team player that strives for professional and technical excellence in Enterprise Architecture. Primary Responsibilities include, but are not limited to:  - Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. - Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration. - Employ secure configuration management processes. - Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.  Identify and prioritize critical business functions in collaboration with organizational stakeholders. - Provide advice on project costs, design concepts, or design changes. - Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). - Analyze candidate architectures, allocate security services, and select security mechanisms. - Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements. - Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. - Write detailed functional specifications that document the architecture development process. - Analyze user needs and requirements to plan architecture. - Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. - Develop enterprise architecture or system components required to meet user needs. - Document and update as necessary all definition and architecture activities. - Integrate results regarding the identification of gaps in security architecture. - Plan implementation strategy to ensure that enterprise components can be integrated and aligned. - Translate proposed capabilities into technical requirements. - Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture. - Integrate key management functions as related to cyberspace.
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2042
Job Locations US-VA-Springfield
Criterion Systems is seeking a mission-focusedVulnerability Assessment Analyst to support and contribute to our government customer’s success in Springfield, VA. The individual in this position must be a motivated team player that strives for professional and technical excellence in Vulnerability Assessment Analysis. Primary Responsibilities include, but are not limited to:  - Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. - Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. - Conduct and/or support authorized penetration testing on enterprise network assets. - Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. - Maintain knowledge of applicable cyber defense policies regulations, and compliance documents specifically related to cyber defense auditing. - Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. - Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews). - Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications). -  Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2041
Job Locations US-VA
Criterion Systems is seeking a mission-focusedAdvanced Information Systems Security Manager, to support and contribute to our government customer’s success in Virginia. The individual in this position must be a motivated team player that strives for professional and technical excellence in Advanced Information Systems Security Management.  Primary Responsibilities include, but are not limited to:  - Responsible for the cybersecurity of a program, organization, system, or enclave. - Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. - Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. - Advise senior management risk levels and security posture. Cost/benefit analysis of information security programs, policies, processes, systems, and elements. - Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture. - Collect and maintain data needed to meet system cybersecurity reporting. - Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. - Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. - Ensure that security improvement actions are evaluated, validated, and implemented as required. - Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. - Establish overall enterprise information security architecture (EISA) with the organization's overall security strategy. - Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed. - Identify alternative information security strategies to address organizational security objective. - Identify information technology (IT) security program implications of new technologies or technology upgrades. - Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. - Interpret and/or approve security requirements relative to the capabilities of new information technologies. - Lead and align information technology (IT) security priorities with the security strategy. - Lead and oversee information security budget, staffing, and contracting. - Manage the monitoring of information security data sources to maintain organizational situational awareness. - Manage the publishing of Computer Network Defense guidance. - Oversee the information security training and awareness program. - Participate in an information security risk assessment during the Security Assessment and Authorization process. - Participate in the development or modification of the computer environment cybersecurity program plans and requirements. - Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities. - Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents. - Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters. - Recognize a possible security violation and take appropriate action to report the incident, as required. - Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements. - Recommend policy and coordinate review and approval. - Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered. - Track audit findings and recommendations to ensure that appropriate mitigation actions are taken. - Use federal and organization-specific published documents to manage operations of their computing environment system(s). - Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. - Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. - Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk. - Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.
Clearance Requirement
Top Secret/SCI/CI
Category
Information Technology
ID
2021-2040
Job Locations US-VA
Criterion Systems is seeking a mission-focusedAdvanced Data Analyst to support and contribute to our government customer’s success in Northern Virginia. The individual in this position must be a motivated team player that strives for professional and technical excellence in Advanced Data Analytics. Primary Responsibilities include, but are not limited to: - Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.   - Examines data from multiple disparate sources with the goal of providing security and privacy insight. - Designs and implements custom algorithms, work-flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. - Analyze and define data requirements and specifications. - Analyze and plan for anticipated changes in data capacity requirements. - Develop data standards, policies, and procedures. - Manage the compilation, cataloging, caching, distribution, and retrieval of data. - Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements. - Provide recommendations on new database technologies and architectures. - Analyze data sources to provide actionable recommendations. - Assess the validity of source data and subsequent findings. - Collect metrics and trending data. - Conduct hypothesis testing using statistical processes. - Confer with systems analysts, engineers, programmers, and others to design application. - Develop and facilitate data-gathering methods. - Develop strategic insights from large data sets. - Present technical information to technical and nontechnical audiences. - Present data in creative formats. - Program custom algorithms. - Provide actionable recommendations to critical stakeholders based on data analysis and findings. - Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method. - Effectively allocate storage capacity in the design of data management systems. - Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems. - Utilize different programming languages to write code, open files, read files, and write output to different files. - Develop and implement data mining and data warehousing programs.
Clearance Requirement
Top Secret/SCI/CI Poly
Category
Information Technology
ID
2021-2039