Company Detail

The Andean Group
Member Since,
Login to View contact details
Login

About Company

Job Openings

  • Python ETL Developer with Security Clearance  

    - Mc Lean
    The Sponsor's business environment is fast-paced and dynamic. The Spon... Read More
    The Sponsor's business environment is fast-paced and dynamic. The Sponsor maintains a network, records system, and other analytical applications to collect and analyze data on the Sponsor's business operations. The Sponsor's goal is to improve the integrity and usability of its data collected during its day to day operation. It performs this duty through the development of software systems. The Sponsor requires support specializing in development and maintenance of software that extracts, transforms, and loads data from various data formats into data models. The Sponsor also requires expertise that will appropriately secure those capabilities. Work Requirement: Software Development The Contractor shall work within a data engineering team. This team works closely with operations officers, analysts, and external engineers to gather requirements and refine systems. The Contractor shall assess and validate development requirements across Sponsor organization. The Contractor will develop software to extract, transform, and load data. The Contractor shall help architect and implement a framework for extraction, transformation, and loading data. The Contractor shall assess and validate system integration requirements across Sponsor organization. The Contractor shall provide Operations and Maintenance (O&M) for Sponsor's data related software systems. The Contractor shall finesse cyber data models. Required Skills:
    1. Demonstrated experience identifying and validating requirements for Extract, Transform, and Load systems. 2. Demonstrated experience developing software. 3. Demonstrated experience in Python development. 4. Demonstrated experience in integrating new technology stacks into software systems. Desired Skills:
    1. Demonstrated experience with NiFi. 2. Demonstrated experience with Kafka. 3. Demonstrated experience with Logstash. 4. Demonstrated experience with SQL. 5. Demonstrated experience with building modular systems. 6. Understanding of the Cyber Security domain. Read Less
  • FRONT END DEVELOPER with Security Clearance  

    - Mc Lean
    Front End Software Developer to support and All Source Data Modeling a... Read More
    Front End Software Developer to support and All Source Data Modeling and Analysis team. Provide Front End Developer support to deliver a prototype application frontend Interface utilizing JavaScript, Angular, and a containerized (Docker and/or Kubernetes is preferred), cloud (AWS) development platform, Elasticsearch integration, and AWS tools. The application supports integrations that tie into other applications that support AI models on the backend. Read Less
  • DevOps Engineer. with Security Clearance  

    - Mc Lean
    The Sponsor supports a diverse set of corporate goals across the organ... Read More
    The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Sponsor requires subject matter expertise in technical risk analysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Sponsor's technical risk assessment activities. The Sponsor also requires software development to maintain an online infrastructure, evaluating and extracting relevant data, web development, and software coding. WORK REQUIREMENTS: Contractor Support; HHR; Yes • The Contractor shall perform technical risk assessments and provide technical risk mitigation guidance on the use of various enabling technologies. • The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk assessor's judgement. • The Contractor shall apply consistent and systematic investigative practices to comprehensively assess risks, identify and characterize threats and vulnerabilities. • The Contractor shall evaluate system or network operations using network management platforms, network scanning tools, auditing functions, PCAP captures, and log reviews. • The Contractor shall analyze system, network, or cloud configurations for mis-configured settings, configurations not required for deployment, removal of test scripts to minimize the configuration to fulfill the specific deployment. • The Contractor shall analyze hardware and software used in a system or network for origin of manufacturer, known vulnerabilities, outdated hardware or software. • The Contractor shall remain current with existing and future technologies to assist the Sponsor with identifying associated risks of implementing proposed technologies. • The Contractor shall provide guidance of potential cyber threats, attacks, and exploitations and advise decision-makers of the inherent risks and mitigation to the Sponsor's equities. • The Contractor shall ensure appropriate risk mitigation considerations are baked in early in the development cycle, and risks and vulnerabilities are well understood and appropriately mitigated. • The Contractor shall organize and schedule work to effectively manage a case load • The Contractor shall track, document, and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture. Required Skills:
    1. Cyber Security Support: 2. Demonstrated experience analyzing IT systems for cyber security vulnerabilities. 3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities. 5. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. 6. Demonstrated experience with multiple OS's, including Windows, Linux, and OSX. 7. Demonstrated experience with Microsoft Windows ver.; 7, 8, 10, 2008R2, 2012, 2012R2, or 2016. 8. Demonstrated experience with cloud computing technology and hypervisors such as HyperV, VMWare ESX, or Virtual Box. 9. Demonstrated experience with transitioning security domains and use of cross domain appliances. 10. Demonstrated experience with network management systems, network storage, backup systems, and disaster recovery (DR) architectures. 11. Demonstrated experience performing technical risk assessments and providing technical risk mitigation guidance. 12. Demonstrated experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated. 13. Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs. 14. Demonstrated experience creating concise and well-structured written assessments. 15. Certifications: CISSP Certification. Desired Skills:
    1. Cyber Security Support 2. Demonstrated experience with the Sponsor's IT review boards. 3. Demonstrated experience with providing recommendations to IT architecture and design reviews. 4. Demonstrated experience with the Sponsor's security policies and regulations. 5. Demonstrated experience providing recommendations in technical standards, security standards, and operational assurance. 6. Demonstrated experience with USG standards such as Intelligence Community Directive (ICD) 503, Federal Information Processing Standards (FIPS), National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60. 7. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. Read Less

Company Detail

  • Is Email Verified
    No
  • Total Employees
  • Established In
  • Current jobs

Google Map

For Jobseekers
For Employers
Contact Us
Astrid-Lindgren-Weg 12 38229 Salzgitter Germany