Sentek Global, Inc.

Job Listings

 

BE BOLD. BE PASSIONATE. BE A SENTEKIAN.

At Sentek Global, we are always looking for highly motivated professionals, bold innovators and top industry talent. Headquartered in beautiful San Diego with worldwide capabilities and opportunities, Sentek Global is on the cutting edge in Department of Defense and commercial consulting. We’re shifting the paradigm in cybersecurity solutions, IT support, software development, engineering and sales. Not only are we looking for top talent, we’re looking for passionate contributors who will be inspired by a culture where innovation thrives. If you are interested in joining a team of collaborators, leaders, visionaries and problem-solvers, contact us today at talent@sentekglobal.com. We also invite you to take a look at our open opportunities below and create a candidate profile for future consideration. 

What is a Sen-tek-i-an?

It is a person who has a unique mindset that provides solutions one step ahead of the rest. Sentekians always push for the best while holding him or herself to the highest standards. High expectations and fused intensity is what makes a Sentekian the consultant of choice.

 

Here are our current job openings. Please click on the job title for more information, and apply from that page if you are interested.

Use this form to perform another job search

The system cannot access your location for 1 of 2 reasons:
  1. Permission to access your location has been denied. Please reload the page and allow the browser to access your location information.
  2. Your location information has yet to be received. Please wait a moment then hit [Search] again.
Click column header to sort

Search Results Page 1 of 1

Job Locations US-CA-San Diego
Job ID 2020-1233
- Generate DIACAP and RMF accreditation packages and artifacts. - Plan and execute security tests and evaluations (ST&E) and analyze results. - Draft Risk Assessment Reports (RAR), C&A Plans, Plans of Actions and Milestones (POAM’s), Security Assessment Reports (SAR), Security Assessment Plans (SAP). - Conduct required vulnerability analysis to support mitigation and residual risk determination, and eMASS data entry. - Provide security advice and assistance to system engineers and program managers on security-related matters, and develop security procedures, policies, and technical recommendations. - Review security requirements, products, configurations, and cybersecurity architectures for compliance with DoD policies. - Develop and execute security test plans, and assess cybersecurity risk of IT systems. - Participate in collaboration meetings; act as a trusted agent to program managers and cybersecurity practitioners and track critical cybersecurity processes experience in assessing a network and/or systems using cybersecurity automated tools such as Nessus, SCAP, and any applicable Security Technical Implementation Guides (STIGs) in accordance with DISA requirements. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Cybersecurity
Job Locations US-CA-San Diego
Job ID 2020-1232
- Assist the USG in evaluating C4I ship installation designs, ship installation concepts and integration analysis. - Assist USG in capturing and analyzing FMS customers’ C4I requirements to include conducting primarily ship site inspections and surveys. - Recommend strategic approaches and end-to-end C4I capabilities to meet FMS customer needs; develop accurate and justifiable cost estimates for recommended solutions. - Participate in Systems Engineering Technical Reviews (SETR) events including but not limited to: Preliminary Design Reviews (PDRs), Critical Design Reviews (CDRs), Factory Acceptance Tests (FAT), Installation Readiness Reviews (IRR), Systems Operational Verification Tests (SOVT), and other events as required. - Provide engineering and technical SME support for SETRs and other events such as system training and technical assistance visits. - Maintain expertise in current and emerging Commercial Off-the-Shelf (COTS) and Government Off-the-Shelf (GOTS) equipment/technologies in the C4I domain. - Maintain an understanding and familiarization with COMSEC procedures and management. - Remain informed of developments and trends in the cyber and information security domains. - Provide analysis and recommendations for FMS follow-on requirements for specific partners/programs systems and capabilities. - Provide technical expertise in the form of engineering inputs and risks to Integrated Master Schedule (IMS) for all activities at the individual program office level and the Saudi program. - Prepare engineering and technical artifacts and/or Technical Reports for work performed. - Travel CONUS and OCONUS in support of Taiwan program activities (internationally 2 – 4 times per year in order to support site surveys, site installations, programmatic reviews, and associated engineering activities. These international trips will be to Taiwan). - Bid and Proposal support if requested. - Other duties as assigned.
Category
Engineering
Job Locations US-PA-Philadelphia
Job ID 2020-1224
- Satisfy DoD cybersecurity requirements including CYBERSAFE, Clinger-Cohen Act compliance, IA Strategy development, System Security Accreditation Agreement (SSAA) development with supporting appendices, Certification Test and Evaluation, Security Test and Evaluation, and risk mitigation. - Conduct independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the security controls (as defined in NIST 800-37). - Maintain and or develop information systems assurance and A&A accreditation documentation. - Ensure information systems are operated, used, maintained, and disposed of in accordance with security policies and required by the authorization package and NSWCPD. - Validate the confidentiality, integrity and availability of systems, networks, and data in accordance with information systems programs, policies, procedures and goals. - Develop procedures to ensure information systems reliability and accessibility; prevent and defend against unauthorized systems, network and data. - Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on content and assessment results and documenting for the Security Controls Assessor’s (SCA) and higher-level review. - Conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate the current risk posture of the system. - Interpret and implement local information security and higher-level policies. - Coordinate all collaboration meetings and brief results to the Echelon II and CYBERCOM IA Team for obtaining approval and signature on all A&A documents, including Interim Authority to Test (IATT), Authority to Operate (ATO), and ATO's with Conditions. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Information Technology
Job Locations US-PA-Philadelphia
Job ID 2020-1223
- Satisfy DoD cybersecurity requirements including CYBERSAFE, Clinger-Cohen Act compliance, IA Strategy development, System Security Accreditation Agreement (SSAA) development with supporting appendices, Certification Test and Evaluation, Security Test and Evaluation, and risk mitigation. - Conduct independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the security controls (as defined in NIST 800-37). - Maintain and or develop information systems assurance and A&A accreditation documentation. - Ensure information systems are operated, used, maintained, and disposed of in accordance with security policies and required by the authorization package and NSWCPD. - Validate the confidentiality, integrity and availability of systems, networks, and data in accordance with information systems programs, policies, procedures and goals. - Develop procedures to ensure information systems reliability and accessibility; prevent and defend against unauthorized systems, network and data. - Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on content and assessment results and documenting for the Security Controls Assessor’s (SCA) and higher-level review. - Conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate the current risk posture of the system. - Interpret and implement local information security and higher-level policies. - Coordinate all collaboration meetings and brief results to the Echelon II and CYBERCOM IA Team for obtaining approval and signature on all A&A documents, including Interim Authority to Test (IATT), Authority to Operate (ATO), and ATO's with Conditions. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Information Technology
Job Locations US-PA-Philadelphia
Job ID 2020-1222
- Satisfy DoD cybersecurity requirements including CYBERSAFE, Clinger-Cohen Act compliance, IA Strategy development, System Security Accreditation Agreement (SSAA) development with supporting appendices, Certification Test and Evaluation, Security Test and Evaluation, and risk mitigation. - Conduct independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the security controls (as defined in NIST 800-37). - Maintain and or develop information systems assurance and A&A accreditation documentation. - Ensure information systems are operated, used, maintained, and disposed of in accordance with security policies and required by the authorization package and NSWCPD. - Validate the confidentiality, integrity and availability of systems, networks, and data in accordance with information systems programs, policies, procedures and goals. - Develop procedures to ensure information systems reliability and accessibility; prevent and defend against unauthorized systems, network and data. - Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on content and assessment results and documenting for the Security Controls Assessor’s (SCA) and higher-level review. - Conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate the current risk posture of the system. - Interpret and implement local information security and higher-level policies. - Coordinate all collaboration meetings and brief results to the Echelon II and CYBERCOM IA Team for obtaining approval and signature on all A&A documents, including Interim Authority to Test (IATT), Authority to Operate (ATO), and ATO's with Conditions. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Information Technology
Job Locations US-PA-Philadelphia
Job ID 2020-1221
- Satisfy DoD cybersecurity requirements including CYBERSAFE, Clinger-Cohen Act compliance, IA Strategy development, System Security Accreditation Agreement (SSAA) development with supporting appendices, Certification Test and Evaluation, Security Test and Evaluation, and risk mitigation. - Conduct independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the security controls (as defined in NIST 800-37). - Maintain and or develop information systems assurance and A&A accreditation documentation. - Ensure information systems are operated, used, maintained, and disposed of in accordance with security policies and required by the authorization package and NSWCPD. - Validate the confidentiality, integrity and availability of systems, networks, and data in accordance with information systems programs, policies, procedures and goals. - Develop procedures to ensure information systems reliability and accessibility; prevent and defend against unauthorized systems, network and data. - Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on content and assessment results and documenting for the Security Controls Assessor’s (SCA) and higher-level review. - Conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate the current risk posture of the system. - Interpret and implement local information security and higher-level policies. - Coordinate all collaboration meetings and brief results to the Echelon II and CYBERCOM IA Team for obtaining approval and signature on all A&A documents, including Interim Authority to Test (IATT), Authority to Operate (ATO), and ATO's with Conditions. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Information Technology
Job Locations US-PA-Philadelphia
Job ID 2020-1220
- Provide technical writing, governance, and policy development/management required to develop, evaluate Information Assurance Assessment and Authorization (A&A) for servers and systems, and validation for systems at the Naval Surface Warfare Center (NSWC). - Write and document high level-policies or strategies for Cybersecurity (CS) as guided by the Government; write technical documentation such as user manuals, reports, documentation, presentations, proposals, outlines, and summaries, and provide weekly updates regarding assigned projects and tasks including percentage of completion, concerns/issues. Report shall break out progress contractor employee. - Provide consultation, guidance and portfolio management for systems and software in compliance with Navy, DoD and federal requirements and policies. - Provide workflow support for web page and database design to meet CS program requirements and improve security of new and existing applications. The support shall include software requirements documentation, project planning, resource requirements and scheduling, configuration management, and software reengineering consultation to the Division to facilitate application consolidation, migration, retirement. - Provide support for CS Program activities including development and maintenance of Plans of Action & Milestones (POA&Ms); tracking status; provide scheduling for CS program reviews; maintain CS web site content management; document milestones and issues; document scanning; submitting metrics; and preparing presentations and final deliverable reports, as required. - Provide NAVIDAS IT Support including reviewing NAVIDAS purchase requests against DoN Policy and requirements. - Ensure the appropriate treatment of risk, compliance, and assurance from internal and external perspectives.  - Review security requirements, products, configurations and cybersecurity architectures for compliance with DoD policies. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Information Technology
Job Locations US-CA-San Diego
Job ID 2019-1178
- Perform system security engineering (including requirements flow down and system allocation), development, test, certification and operational employment of COMSEC systems which meet medium-to-high DoD/National Security System (NSS) Foreign Military Sales (FMS) Cybersecurity/Information Assurance security requirements and policies. - Assess DoD Program protection policies, processes and compliance, e.g., anti-tamper, supply chain risk management, critical functional analysis, critical program information assessment, critical technology protection to support complex Navy and C4I systems. - Perform threat analysis and identify vulnerabilities unique to these systems and provide recommendations to mitigate or remediate them. - Identify and implement toolsets that will enable secure and effective communications between warfighters. - Identify and provide COMSEC/cybersecurity/IA-related issues and policy compliance to prioritize security requirements and satisfy the internal and external stakeholders’ needs. - Prepare reports and analysis; provide recommendations to the development of Department of Defense Functional Baseline / Allocated Baseline / Product Baseline requirements and technical data packages. - Help to resolve problems that arise during all phases of acquisition life‚Äźcycle to satisfy stakeholders. - Assess technical and programmatic information to support foreign disclosure activities. - Bid and Proposal support if requested. - Other duties as assigned.
Category
Cybersecurity