Applications Development and Security Specialist with Security Clearance Education, Training & Library - Washington, DC at Geebo

Applications Development and Security Specialist with Security Clearance

Overview VTG is looking for an Applications Development and Security to provide support to PEO IWS Information Technology & Data and Infrastructure managementPosition will be onsite in our Washington DC officeWhat will you do?o Identify contractor personnel and qualifications to support the functions of the PEO IWS Activity Chief Information Officer (CIO) and the Enterprise Architect supporting the ACIO teamThe Activity CIO develops, implements, and maintains the contribution to a set of overarching Information and/or Data Strategies issued by:
NAVSEA, DoN, and DoDProvide support to both PEO IWS's internal management needs as well as provide an external liaison support function between PEO IWS, NAVSEA CIO, DON CIO, and, as required, other related external organizations to harmonize and leverage information requirements across the DoN Enterprise.
o Assist the NMCI/NGEN Chief Information Officer (CIO) for PEO IWS by reviewing and reporting on the compliance of information systems policies, certification, and accreditationsProvide assistance in the development and implementation of enterprise business resources business rules, sharepoint, any other relevant information systems, in addition to developing and maintaining an effective system to troubleshoot IT technical issues.
o Recommend solutions for areas that consistently pose problems, for government review and implementation, informed by, as applicable to the identified problem area or related solution, the following document sets:
DoD instructions such as DODIs 5000.
82, 01, 8320.
02, 8520.
02, 8500.
01, 85100.
01, and / or 8530.
01;DoDM 5000.
04-M-1; CJCSIs 3170.
01H, 6212.
01E, 6212.
01F, and / or 65101.
01F; NAVSEAINST 5239.
2B, and / or 9400.
2A; PEO IWS Enterprise Product Life Cycle and / or Management Integrated Data Environment Documents.
o Support the review of and strategic direction of all PEO IWS computerized and manual systems; information processing equipment; software applications used for acquisition, storage and retrieval; communication systems used for operationsDocument those that PEO IWS requests resources for Program Object Memorandum (POM) process, and those used by PEO IWS, but POM'd for by othersIdentify PEO IWS end users and per-user costsDetermine scalability to enable growth as PEO IWS grows internally, or as a liaison support function to organizations such as MDA and DASN (Ships).
o Support the overall management and day-to-day operations of the Information Technology functions, as used by PEO IWSThis includes monitoring the status of all unique and leveraged investments by PEO IWS in data centers, technical service centers, help desks, communication networks (voice and data), computer systems operations and maintenance, integrated data environments.
o Provide assistance in support of NAVSEA-provided technical and management support for the Non-Classified Internet Protocol Router Network (NIPRNet) and Secret Internet Protocol Router Network (SIPRNet) equipment and facilities used by PEO IWS at all of their sites, whether these are provided through the Navy & Marine Corps (NMCI) or a follow-on systemProvide direct, on-site IT support services for daily operations by individuals and in conference rooms outfitted with government-provided IT.
o Support business case analysis in support of the Activity CIO prior to submission of new or updated Information Technology application requests on NAVSEA's technological infrastructureThe business case analysis shall include a crosswalk of Information Requirements against the application's current and projected functionality, its acquisition and maintenance costs, and its projected maturity to minimize impact on the current end-user workforce at deploymentThe business case analysis shall also include a voting or consensus building approach for PEO IWS organizations to support the information investment.
o Support Vulnerability Assessment against the aggregation and accurate delivery of PEO IWS Business Information hosted in various unclassified Commercial and Government Off-the-Shelf applications and databases used by PEO IWS.
o Provide support services for internal management of technical issues and actions as well as external liaison and support among PEO IWS, the NAVSEA CIO, and the DoN CIO.
o Develop and maintain tools, databases, and web sites for PEO IWS management needs not provided by the CIO infrastructure, or other source such as Small Business Innovation Research (SBIR)These databases and data therein shall have a minimum of Government Unlimited rightsProtect the data integrity and pedigree of all PEO IWS information produced and stored as corporate information and maintain business practices to ensure that all PEO IWS information maintained is in compliance with the Clinger-Cohen Act (CCA).
o Provide software development for on-going and future digital transformation as PEO IWS's IT landscape evolves (e.
g.
, Application Programing Interfaces).
o Provide annual Data/Information Strategy unique to PEO IWS to serve as an addendum to other overarching strategies within the PEO IWS chain of command.
o Provide support for agile program management and agile trainingsDo you have what it takes?o No required related professional experienceo Secret Clearance Recommended Skills Agile Methodology Business Ethics Crosswalk Databases Information Systems Information Technology Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.