Click column header to sort
Cyber Cloud Technologies is looking for a candidate who wil be Working as part of a technical team on cloud-based networks; develop and validate design options and architectures; build, deploy, and operate cloud-based networks; and document, explain, and demonstrate solutions to clients and business stakeholders.
Cyber Cloud Technologies is looking for a Information Systems Security Engineer that shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
Cyber Cloud Technologies is looking for Candidates who will be responsible for the testing of Cryptographic Key Generation software projects. Candidates will analyze functional requirements for Crypto Key Generation software projects, and conduct research to learn about the project/objectives. Candidate will develop detailed test plans and procedures, submit each for peer review and update test plans based on feedback. Upon test plan completion and approval, tests will be executed and results reported. Candidate will complete Task Order training within 30 days of arriving on project. Testing may take place in both conventional and virtualized test environments without the help of other contractor personnel.
1. Software engineering or related background
2. Experience analyzing requirements in order to identify/develop test plans/procedure
3. Development of test plans and procedures
4. Manual testing experience
1. Experience with IBM rational Clearcase/Clearquest tools
2. Experience working with VMs in Windows environment
3. Knowledge of cryptography
4. Knowledge of cryptographic key generation
Cyber Cloud Technologies is looking for a Candidate who will be responsible for the design and implementation of Cryptographic Key Generation software projects. Candidates will receive and analyze functional requirements to derive software requirements; design the software; implement the software in JAVA and develop and execute software tests prior to delivery for system integration testing. Candidate will provide specific crypto key generation project knowledge to the system integration team, as needed, and resolve problems identified by the system integration tests. Candidate will utilize a ticketing system to debug and document.
Working in a team environment, candidate will participate in peer reviews at every phase and implement appropriate changes before proceeding to the next phase. Candidate will produce monthly and weekly status reports, and may be asked to provide technical expertise to more junior team members.
Upon arrival on the program, the candidate will undergo 4-6 weeks of project specific training, to become familiar with the tools and development environment.
1. Experience with software development (Java)
2. Able to debug software
3. Experience with ticketing systems
4. Requirements analysis experience (2 yrs)
5. Requirements development experience (2 yrs)
6. Experience with technical writing/documentation
1. Experience with IBM Rational tools, MS Office
2. Experience in waterfall development methodology
3. Knowledge/experience in cryptography
Cyber Cloud Technologies is looking for multiple Hardware Engineers to analyze complex hardware systems, hardware design, architecture, network design and other technical hardware issues. Procure and perform acceptance testing on equipment. Provide hardware maintenance support, both preventive and remedial. Deploy, install, and implement hardware at Continental United States (CONUS) and Outside Continental United States (OCONUS). Prepares specifications for hardware by analyzing documented and derived system requirements. Conduct site surveys. Prepares engineering plans and site Technical Design Packages. Organize and direct hardware installations. Configure (and document configuration of) computers, networking devices, and various peripheral equipment. Prepare site installation and test reports. Ensure that problems have been properly identified and solutions will satisfy the user's requirements. Prepare reports and recommendations concerning existing and emerging hardware technologies. Provide specific input to the hardware components of system design to include end-user devices, servers, networking devices, data storage devices, and specialized processors.
Cyber Cloud Technologies is looking for a Software Engineer with C, C++
reverse engineering experience
Computer Network Operations or the military equivalent experience
Day to day activities may include the following:
Providing technical and compliance administration support for the Assessment and Authorization (A&A) of Risk Management Framework (RMF) packages, for the Marine Corps Community Services (MCCS) world-wide network (MCCSNet) and systems.
Developing, reviewing, and assessing risk boundaries, package content, and submittal requirements for all Compliance initiatives, in accordance with Payment Card Industry (PCI) Data Security Standard (DSS), Federal, DOD, DON, and HQMC Command, Control, Communications & Computers for Cyber security (C4/CY) policy and standards.
Conducting systems security audits, risk assessments, and vulnerability analysis and reporting
Providing cyber security oversight and support for HQ MCCS and subordinate field commands.
Conducting vulnerability scans, system assessments, risk analysis, and technical recommendations to validate compliance.
Assists technical staffs with development of plans of action and milestones (POAM) and tracks progress to project/task completion.
Expertise in the following areas is preferred:
A&A cloud expertise with understanding of data center and cloud computing in the following priority order:
Military equivalent training in Information Assurance and/or Computer Network Defense specialized Military Occupational Specialty (MOS) appropriate to the requirements of this position is a plus .
ACAS or Tenable Security Center Continuous View
Risk Management Framework (RMF)
Vulnerability and Risk Assessment, Analysis, and Reporting
DISA Security Content Automation Protocol (SCAP) content and Security Technical Implementation Guides (STIGS)
Security Compliance Checker, STIG Viewer, and Vulnerator
Malware and Virus prevention, detection, and remediation
Analysis of system auditing and logging
Active Directory, Microsoft System Center Configuration Manager (SCCM)
DON Application and Database Management System (DADMS)
Department of Defense (DoD) Information Technology Portfolio Repository (DITPR) /Department of Navy (DON)
Federal Risk and Authorization Management Program (FedRAMP)
Networking, System Administration Windows and Unix/Linux platforms
Database Administration and Application Development
USN and/or USMC Certification and Accreditation tools eMASS and MCCAST
Patch Management, Incident Response, and Asset/Inventory Management
DoD 8500. 01 and DoD 8510. 01 and National Institute of Technology Standards (NIST) publications
Payment Card Industry Data Security Standards (PCI DSS) Requirements
Cyber Cloud Technologies is looking for a Linux System Administrator to provide support for implementation, troubleshooting and maintenance of Information Technology (IT) systems. Manages IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2 (Escalation) problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX and Windows operating systems and installs/loads operating system software, troubleshoots, maintains integrity and configures network components along with implementing operating systems enhancements to improve reliability and performance.
Cyber Cloud Technologies is looking for a Mid / Senior System Administrator This candidate will have demonstrated proficiency in administering the Linux Operating System, VMWare, and Windows Operating System. Strong understanding of basic Window’s functions to include account administration, Active Directory, file sharing, and other common administrative activities. Desired Candidates must have experience working in and supporting a customer service organization and have experience using common system monitoring such as Zabbix. In addition, ideal candidates will have experience in using a help desk ticketing system such as SysAid or Service Now. The candidate must be willing to work in a mission critical essential position supporting 24x7 continuous operations. Standard work schedule includes IS 0600-1500 M-F however the candidate is considered a back-up for our 24x7 SSA team and will be placed on an on-call list. Team size ranges from 4 – 8 System Administrators on any given day.
• Strong Java background
• Experience in J2EE (JSP, JDBC, JMS)
• Understanding of tools for continuous software development
• Candidate must be versatile and have the ability to learn quickly
As part of a 24x7 Operations staff, perform the activities associated with the identification, prioritization, and resolution of operational issues to ensure service levels and objectives are met. Refers issues to Tier 3 staff for resolution as required, track and monitor response/resolution time, and verifies user acceptance.
Be part of a Cryptographic Product Development team in support of Cryptographic Transformation. Activities include review and assessment of existing documentation and designs, developing options for improvement or replacement of the existing systems to enhance sustainability and maintainability and proof of concept demonstration. Upon customer acceptance of a proposed design, the NG team will develop portions of the new system, possibly including hardware, material handling and control systems, and system operations software. As part of the system development phase, the NG team will conduct system integration testing (SIT) and development test and evaluation (DT&E) to include preparing test plans and procedures, and automated test harnesses/scripts
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Reviews and/or develops certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing. Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Information Assurance Certification and Accreditation Process (DIACAP) process, the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering
The Software Engineer (manual tester) analyzes diverse software systems and documents functional requirements. Works individually or as part of a team. Reviews and tests software components for adherence to the design requirements and documents test results. Executes test plans and test procedures. Resolves software problem reports. Provides specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of Commercial Off-the-shelf (COTS)/Government Off-the-shelf (GOTS) in place of new development, and requirements analysis and synthesis from system level to individual software components.
• Requires DoD 8570 compliance – at minimum, IAT Category, Level II
• Strong Linux administration and virtualization skills to include:
• OS Builds
• Linux and VM environment (VMware)
• Kick-start server configuration and implementation
• Scripting experience to include Perl and Python
Linux, VMware, YUM. Avamar (backup software), XtremeIO, Some Windows/AD would be a plus
Tasks: Software Patching using YUM, Optimizing Scripts (powershell, python, perl), Securing Windows, Linux, and VMware systems, Troubleshooting VMware, VMs, and Avamar failures
- Linux/Unix Administration
- VMware 5.5u1 Administration (15 distinct VMware Clusters)
- VMware features/technologies, including HA, VMotion, dvSwitches, and DRS
- Network Administration (Primarily Switching)
- Database Administration (SQL for VMware, Oracle for PS team)
- Server Hardware Administration (Dell Bladecenters, Dell R620-R910-series servers)
- SAN Administration (EMC, Dell EqualLogic, ExtremeIO)
- Windows Administration (XP, 7, 8.1)
- Software Defined Routing Administration (pfSense, BSD)
- Familiarity with diodes
• Experience in Java
• Experience in NiFi (Niagara Files)
• Understanding of customer cloud databases.
• Understanding of classification and how to interpret Classification Guidance
• Experience working with Regular Expressions
• Experience with Enterprise Data Headers
Two (2) years of demonstrated experience in Cybersecurity techniques and Network Analysis; three (3) years of demonstrated experience in intrusion analysis and incident response; and three (3) years of demonstrated experience with TCP/IP fundamentals, Windows and Linux/UNIX operating systems, and supporting Office applications. Demonstrated real-world incident management / incident response experience.