Lead Engineer Information Technology (IT) - Dulles, VA at Geebo

Lead Engineer

Company Name:
Raytheon
Lead Engineer Lead Engineer Raytheon is supporting a Federal Government customer contract for delivering technical support to customer management and providing resources for the technical
services
required to enable customer mission accomplishment. In support of the customer's strategic direction, Raytheon is looking for key individuals who can support the protection of the customer environment. Subject Matter Experts with a range of cyber security specialties are needed to support the customer team. The Lead Engineer supports the development of system capabilities from the identification of requirements through the deployment of capabilities requirements definition, design, develops system-oriented products and prepares related installation, testing, operation, and maintenance specifications and instructions. The Lead Engineer provides oversight for the definition and analysis of the system architecture to establish operating conditions, conduct tests and to define and analyze engineering proposals and related technical data in determining feasibility of developing new capabilities and/or modifying existing capabilities. The Lead Engineer is cognizant of Systems Engineering Lifecycle (SELC) processes and practices, Change Management practices, and collaborates with various Integrated Product Teams (IPTs), Project Teams, and Government entities to deliver technical solutions that achieve the customer's mission, objectives, and requirements. Responsibilities include: Provide technical direction for the development, engineering, interfaces, integration and testing of system components Works in conjunction with Program Manager and IPT Leads to size proposed changes, manage scope and risk, and to identify opportunities Ensures creative and innovative business and technology solutions to meet and/or perform to technical and functional requirements Identifies project technical risks; formulates risk mitigation strategies Ensures delivered solutions are realized in time frame committed Analyze user requirements, CONOPS and high-level system architectures to derive, develop and decompose system-level specifications Provide internal and external customers with technical designs and support to system acquisition specifications, design, proof-of-concept prototyping, development and evaluation of management information and decision support systems Interface directly with customer and the program management team Conduct trade studies, to determine possible system (hardware, software, architecture) improvements Be cognizant of system components and technologies to advise customers on obsolescence, improvements in maintainability, increased automation increased efficiencies and/or lower cost solutions centered around Total Cost of Ownership (TCO) Plan and/or support enhancement projects through requirements definition, implementation, development, operations, performance, testing, cost and schedule, training and support, and/or system disposal Perform requirement elicitation, analysis and functional allocation Provide technical oversight of program milestone reviews Ensure implementation of operational view, technical standards view, and system and services view for architectures using applicable standards (e.g., DODAF, FEAF) Guide development of technical documentation, including CONOPS, user guides, test plans, and other CDRL items Provide input to hardware (COTS/GOTS/capacity/etc.) recommendations, including support for Technology Insertion in Government Technical Reference Model (TRM) Active guidance and participation in Integrated Product Teams (IPTs) and program Engineering Review Boards (ERBs); with responsibility to foster active engagement across team members. Required skills include: Active Top Secret/Sensitive Compartmented Information (TS/SCI) security clearance required U.S. Citizenship required Experience and/or familiarity with software and system lifecycle methodologies, (e.g ISO, CMMI, ITIL) Experience with layered defense mechanisms such as, Defense in Depth, active/passive honeypots, robust key management systems, nested firewalls, intrusion detection and technologies to support these preventive measures Experience in the development of secure software practices Demonstrated, working knowledge of cyber, cyber operations and cyber analysis systems 3 years demonstrated experience in cyber security to include practices/methodologies, associated technologies, application design, and/or experience in an operational environment 2 years demonstrated experience in the design and development of cloud-based systems, architectures, and analytics development Demonstrated ability to manage software engineering projects associated with transformational and/or rapid (agile) development programs Strong understanding of security design and requirements Demonstrated ability to manage multiple teams in a dynamic environment Knowledge of Information Assurance and Information Operations technologies and development activities Understanding of the processes and guidelines for Certifying and Accrediting information systems based upon experience on a large-scale development program Experience developing system performance, availability, scalability, manageability and security solutions for mid-to-large scale programs Possesses or quickly develop a comprehensive understanding of Government Information Security policies, regulations, and guidelines Proficiency with MS Office Applications Must be able to work collaboratively across agencies and physical locations Experience interfacing directly with customer and management teams; including, conducting briefings and technical meetings for management and customer representatives Twelve (12) or more years of systems engineering experience required. A Master's degree in a related discipline may substitute for two (2) years of experience. A PhD may substitute for four (4) years of experience. Bachelor's degree in Systems Engineering, Software Engineering,
computer
Science or a related discipline is required. Advanced degree (Master's) is desired. Certifications: DoD 8570.1-M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP)) certification required Agile software development methodology certification (e.g. SCRUM Master) required Certified Systems Engineering Professional (CSEP) certification desired Project Management Professional (PMP) or similar certification desired. Desired Skills: Demonstrated experience or familiarity with Earned Value Management Systems (EVMS), compliant with ANSI/EIA Standard 748-B desired Experience with process development and deployment 3 years experience with managed services applications Experience with one or more of the following: o Security COTS integration o Operating System Hardening o Vulnerability Assessment testing o Identification and Authentication schemes o Public Key Infrastructure and Identity Management o Cross Domain Solutions o Computer Network Exploitation (CNE) o Computer Network Operations (CNO) o Malware Analysis o Reverse Software Engineering o Security engineering Certified Secure Software Lifecycle Professional (CSSLP) Raytheon Intelligence, Information and Services (IIS) provides a full range of ISR, navigation, weather, cybersecurity, training, logistics, mission support and engineering solutions for the intelligence
community
, government and commercial customers. IIS, which operates at nearly 500 sites in 80 countries, is headquartered in Dulles, VA. and generated $5.5 billion in 2012 revenues. BETS_ARC_Setter BACH_a33d1a team systems design through testing integration MYK62683JREstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.