Systems Architectother related Employment listings - Ashburn, VA at Geebo

Systems Architect

The most security-conscious organizations trust Telos Corporation to protect their vital IT assets.
The reputation of our company rests on the quality of our solutions.
Explore what you can bring to our solutions in information assurance, secure networks, secure enterprise messaging, and identity management.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, remote work opportunities and 401k.
Our employees enjoy more than just a great work environment! This position, located at our headquarters in Ashburn, VA, is for the design, development, implementation, test, and documentation of secure networking solutions.
Responsibilities:
Performs a variety of systems architecture tasks and activities that are broad in nature and are concerned with systems design, integration, implementation, and sustainment, including hardware, software, and user support activities.
Supports information assurance-related activities, analyzes problems related to information assurance, and provides engineering and technical support in solving these problems.
Supports design, development, implementation, and testing of networking solutions as required to meet customer requirements and works with internal and external inputs to develop these solutions.
Qualifications:
An active DoD Secret Clearance is desired, with the ability to obtain a Top Secret Clearance.
Bachelors Degree in a related technical discipline (preferably Networking, Telecommunications, Network Security) or the equivalent combination of education, professional training or work experience (6 yrs.
) 8
years of IT experience is required, 3 years of solution design and development for various network devices Has demonstrated in depth knowledge and work history in solution design, solution validation and verification, documentation and deployment Has demonstrated experience in deploying systems in accordance with DoD network security requirements Has demonstrated knowledge of firewalls, VPNs, Virtual Machines, Servers Has in depth understanding of system integration in the Cloud Has strong troubleshooting skills Has demonstrated work history supporting strong communication skills both written and oral on technical topics Can function successfully as a technical lead or technical member of a team Computing Environment Certification in at least one of the following, with preference given to Palo Alto:
Palo Alto VMware SolarWinds Juniper AWS Cisco Must have and maintain an active, current CompTIA Security
CE or equivalent DoD 8570 Certification qualifying for designation as IAT Level II A professional attitude regarding attention to detail and customer service and excellent organizational skills are required The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship Ability for some travel as required Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment.
Telos Corporation participates in the E-Verify program.
Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration (SSA) and/or the Department of Homeland Security (DHS) of your authorization to work in the United States.
Telos and its subsidiaries are Affirmative Action/Equal Opportunity Employers encouraging women, minorities, individuals with disabilities, and veterans to apply.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.