The Systems Engineer is responsible for providing engineering support for the design, development, integration, testing, deployment, and sustainment of the customer's computer systems, applications, and network infrastructure.
The Cybersecurity Engineer is responsible for planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization’s data, systems, and networks.
The Software engineers is responsible for applying principles and techniques of engineering, mathematics, and computer science to the design, development, and testing software applications for computers and customer systems.
The System Administrator is responsible for installing and configuring software, hardware and networks, monitoring system performance, troubleshooting issues, and ensuring security and efficiency of IT infrastructure
The Technical Writer is responsible for understanding and communicating through composing and editing the technical aspects of a digital product to both highly technical and non-technical users.
The Program Integrator is responsible for combining subject matter expertise of project management, program management, risk management, and other business functions in support of customer's mission requirements.
The Acquisition Professional is responsible for supporting Government Program Managers (GPMs) in the identification and collection of Minimum Acquisition Requirements in accordance with the FAR.
The Target Analyst Reporter prepares synthesized product for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements
The Collection Manager works with the customer to Identify appropriate collection access points, methods, and/or plans necessary to exploit target networks and to satisfy specific collection requirements. They also develop, plan, and coordinate the deployment of world-wide collection systems
The Collection Targeting and Compliance Manager assists the customer in understanding appropriate authorities and policies, ensuring that its targeting tools and collection Systems are properly enabled and its Tactics, Techniques, and Procedures (TTPs) are appropriate to provide compliant targeting.
The Threat Analyst assists the customer by researching adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources, analyzing the likelihood of threat, and contributing to profiling adversarial behavior, intent, and capabilities.
The SIGINT Geospatial Analyst applies geographic information science in response to intelligence needs using SIGINT data collected from foreign systems. This includes the application of temporal and spatial thinking in interpreting SIGINT data in geographic context, spatial data manipulation, spatial data analysis, spatial statistical analysis and spatial modeling.