Provides the technical leadership and direction in implementing enterprise information/data management practices.
- Responsible for leading and engaging in information/data management projects including the Enterprise Information Architecture, information models and flows, data dictionaries, data standards, and data quality standards and processes.
- Responsible for developing and maintaining the logical Enterprise Information Architecture that enables seamless information interoperability of systems from transaction systems, document management systems and information delivery systems.
SilverEdge is a premier provider of innovative cyber, software and intelligence solutions addressing everyday challenges to meet mission goals across the DOD and Intel Communities and beyond. We are seeking a Cyber Software Engineer.
SilverEdge is seeking candidates for the position of IT Program Manager.
• Collect, format, and analyze data from multiple systems for dashboard and reporting tools.
• Develop and maintain dashboards using technologies like PowerBI and ServiceNow.
• Interface with counterparts across the enterprise to address issues.
• Serve as the Quality-of-Service (QoS) representative for the assigned area, monitor QoS feedback, and participate in related sessions.
• Attend meetings as directed.
• Prepare recurring and ad hoc briefings or documents for dissemination.
SilverEdge is seeking candidates for the following position: The Finance Administrator III will work within our travel cards branch, which plans, monitors, and administers over 12,000 travel cards. As part of the duties for this position, we expect the candidate to participate in the administration of the office, oversee credit card accounts listed under internal identifiers, and assist maintaining private industry partnerships. This is a strategic-heavy office that has a small personnel footprint but critical impact. The work unit is comprised of one staff member and three additional contractors (including candidate).
The candidate is expected to work with autonomy and minimal supervision/guidance in a dynamic and complex environment....
SilverEdge is seeking candidates for the following position: Project Manager-Sr
SilverEdge is a premier provider of innovative cyber, software, and intelligence solutions, addressing mission-critical challenges for the Department of Defense (DoD), Intelligence Community (IC), and beyond. We are dedicated to delivering impactful results to meet mission goals through cutting-edge technology and expertise. We are seeking a ServiceNow Developer/Administrator to join our dynamic team. This individual will play a pivotal role in developing innovative and effective solutions for our DoD customers within the IC sector.
Role Overview
As a ServiceNow Developer/Administrator, you will work in a dynamic environment to support ServiceNow applications and workflows. You will collaborate with stakeholders to design ITSM...
SilverEdge is a premier provider of innovative cyber, software and intelligence solutions addressing everyday challenges to meet mission goals across the DOD and Intel Communities and beyond. We are seeking a candidate to analyze and resolve complex problems associated with server hardware, applications, and software integration. Configure and manage Unix and Windows operating systems and installs/loads operating systems software, troubleshoot , maintain integrity of and configure network components, along with implementing operating systems enhancements to improve reliability and performance.
SilverEdge is a premier provider of innovative cyber, software, and intelligence solutions, addressing mission-critical challenges for the Department of Defense (DoD), Intelligence Community (IC), and beyond. We are dedicated to delivering impactful results to meet mission goals through cutting-edge technology and expertise. We are seeking a Telecommunications Specialist-FE to join our dynamic team. This individual will play a pivotal role in developing innovative and effective solutions for our DoD customers within the IC sector.
Role Overview
The Telecommunications Specialist-FE will provide critical technical expertise to maintain and support innovative hardware, software, and network systems and applications....
SilverEdge is seeking candidates for the following position: Software Developer
This position specifically seeks domain knowledge in Logistics, Warehouse Management Systems (WMS), and Inventory Management. As the customer desires system modernizations under fairly aggressive deadlines, knowledge in these areas (or with systems of similar complexity among components of a larger eco-system) will better position the candidate for success.
SilverEdge is seeking candidates for the following position: User Interface (UI) Developer to build new mission-critical application on a high-performing development team. Work will be completed in an iterative fashion using scrum techniques with inputs from the Project Manager, IT Division Leadership, Technical Director, and Subject Matter Experts and other business stakeholders. This position is located in the Herndon, Virginia area.
The ServiceNow Developer will develop automation capabilities using software development best practices. The candidate will design, develop, test and deploy systems using continuous integration/continuous delivery.
The Software Developer will develop automation capabilities using software development best practices. The candidate will design, develop, test and deploy systems using continuous integration/continuous delivery.
Security Clearance: Active, in-scope US Government issued Top Secret Clearance w/ FS Poly
Due to the nature of the work and contract requirements, US Citizenship is required.
SilverEdge is seeking an experienced Intelligence Analysts for our client’s operational requirements on a mission focused program within a challenging, dynamic setting located in the Virginia area. Successful candidates in this position will collaborate with a diverse group of individuals across the intelligence community and directly contribute to processes that shape government policy. Candidates will conduct in-depth research, perform rigorous time sensitive analysis, and distill this analysis into actionable insights
The Systems Engineer oversees the development and implementation of systems and processes. The Systems Engineer ensures the integrity and availability of organizational information and information systems. The Systems Engineer will bring together the full range of technical and business competencies needed to assist the program manager and senior customer management with the successful achievement of enterprise audit, and disaster recovery compliance, which are consistent with organizational goals and objectives.
The Systems Administrator to support a customer’s IT environment. The responsibilities include system installations, configuration, control, maintenance, troubleshooting, security, monitoring, and documentation of procedures in support of the IT environment. The Systems Administrator will also support the development team to ensure successful application deployments in support of the various projects. The Systems Administrator will work in a team environment, communicating and coordinating work among several other developers and systems engineer team members,
The SharePoint Developer will develop automation capabilities using software development best practices. The candidate will design, develop, test and deploy systems using continuous integration/continuous delivery.
The ServiceNow Developer will develop automation capabilities using software development best practices. The candidate will design, develop, test and deploy systems using continuous integration/continuous delivery.
The Software Developer will develop automation capabilities using software development best practices. The candidate will design, develop, test and deploy systems using continuous integration/continuous delivery.
The Software Developer provides engineering and programming support to projects and infrastructure support activities. The successful candidate
- Designs and develops enterprise applications in a Web environment.
- Develops, creates, and modifies general computer applications software or specialized utility programs.
- Analyzes user needs and develops software solutions.
-
The Scrum Master provides support to projects and infrastructure support activities. The successful candidate is responsible for hosting daily stand-up (scrum) meetings, sprint planning sessions, reviews, and retrospectives, working with Product Owners to maintain product backlogs, removing obstacles/impediments impacting sprints.
The Systems Administrator will be responsible for data extraction, transformation and load (ETL), data mapping, data extraction, analytical support, operational support, database support, application development and associated maintenance of production systems. This is a fast-paced, dynamic team in a process oriented environment. Experience with biometric technology, and large-scale (Terabytes) databases is highly desired. The Systems Administrator supports data scientists and analysts in a mission oriented High Performance Computing environment. The candidate will perform day-to-day Linux systems administration duties.
The IT Program Manager will lead a software development effort using Agile methodologies. The ideal candidate will have experience with customer requirements, meeting schedule and delivery expectations, managing risks and providing regular communications.
The Systems Engineer will maintain a strong awareness of technical trends in information technology, develop and maintain a strong awareness of on-going IT projects, and business unit requirements. The candidate must be able to apply the project management model selected for a given development effort. Responsibilities also include providing analysis, design, development, deployment, and life cycle support for innovative hardware systems and applications. Responsibilities include being able to develop end-to-end cost analysis for projects, ensuring systems being developed comply with the enterprise technical architecture, helping project and program teams prepare for the sponsor project...
The Data Scientist will create data science and data engineering products that include data models, data ingestion/transform, analytics which may include machine learning, and some form of output as either a machine-readable format (e.g. file output, database output, standard/streaming output) or a user interface or dashboard.
The Cyber Security Engineer ensure highest levels of information system security.
The successful candidate will:
- Support the Customer’s risk management framework by evaluating, implementing and enforcing security policies that align with the customer’s security needs.
- Manage the A&A Process for multiple projects from concept to Authority to Operate (ATO).
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.