USTRANSCOMother related Employment listings - Scott Air Force Base, IL at Geebo

USTRANSCOM

Responsibilities & QualificationsIf you are looking to engage with a dynamic team and company contact us today!Multiple positions are available for consideration:
- System Administrator Formulates/defines system scope and objectives.
Devises or modifies procedures to solve complex problems considering computer equipment capacity and limitations, operating time, and form of desired results.
Prepares detailed specifications for programs.
Assists in the design, development, testing, implementation, and documentation of new software and enhancements of existing applications.
Works with project managers, developers, and end users to ensure application designs meet business requirements.
Formulates/defines specifications for complex operating software programming applications or modifies/maintains complex existing applications using engineering releases and utilities from the manufacturer.
Designs, codes, tests, debugs, and documents those programs.
Provides overall operating system, such as sophisticated file maintenance routines, large telecommunications networks, computer accounting, and advanced mathematical/scientific software packages.
Assists all phases of software systems programming applications.
Evaluates new and existing software products.
- Security Engineer Designs and administers programs to include policies, standards, guidelines, training programs, and a viable quality assurance process for disaster recovery.
Oversees and reviews the testing and implementation of software, data systems, and data networks to ensure that the integrity and security of all electronic data and data systems are adequately protected.
Facilitates the preparation of an organization-wide business resumption plan.
Assists in the coordination and establishment of disaster recovery programs and business resumption planning across mainframe and client server platforms.
Coordinates and monitors simulation testing across all platforms.
Designs and administers programs to include policies, standards, guidelines, training programs, and a viable quality assurance process for disaster recovery.
- Hardware EngineerProvides analysis related to the design, development, and implementation of hardware for products.
Develops test strategies, devices, and systems.
Performs stress and performance tests on a variety of computer hardware including circuit boards, processors and wiring.
- Tier I & II Support AnalystResponds to and diagnoses problems through discussion with users.
Ensures a timely process through which problems are controlled.
Includes problem recognition, research, isolation, resolution, and follow-up steps.
Supervises operation of help desk and serves as focal point for customer concerns.
Provides support to end users on a variety of issues.
Identifies, researches, and resolves technical problems.
Responds to telephone calls, email and personnel requests for technical support.
Documents, tracks, and monitors the problem to ensure a timely resolution.
Provides second-tier support to end users for either PC, server, or mainframe applications or hardware.
Interact with network services, software systems engineering, and/or applications development to restore service and/or identify and correct core problem.
Simulates or recreates user problems to resolve operating difficulties.
Recommends systems modifications to reduce user problems.
- Security Analyst and SpecialistsDetermines enterprise information assurance and security standards.
Develops and implements information assurance/security standards and procedures.
Coordinates, develops, and evaluates security programs for an organization.
Recommends information assurance/security solutions to support customers' requirements.
Identifies, reports, and resolves security violations.
Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
Supports customers at the highest levels in the development and implementation of doctrine and policies.
Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
Performs analysis, design, and development of security features for system architectures.
Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
Designs, develops, engineers, and implements solutions that meet security requirements.
Provides integration and implementation of the computer system security solution.
Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
Ensures that all information systems are functional and secure.
- Network SpecialistsProvides technical guidance for directing and monitoring information systems operations.
Designs, builds, and implements network systems.
Directs compilation of records and reports concerning network operations and maintenance.
Troubleshoots network performance issues.
Analyzes network traffic and provides capacity planning solutions.
Monitors and responds to complex technical control facility hardware and software problems.
Interfaces with vendor support service groups to ensure proper escalation during outages or periods of degraded system performance.
Manages the purchase, testing, installation, and support of network communications, including LAN/MAN/WAN systems.
Performs system-level design and configuration of products including determination of hardware, OS, and other platform specifications.
Plans large-scale systems projects through vendor comparison and cost studies.
Performs a variety of systems engineering tasks and activities that are broad in nature and are concerned with major systems design, integration, and implementation, including personnel, hardware, software, budgetary, and support facilities and/or equipment.
Provides quality assurance review and the evaluation of new and existing software products.
Provides assistance and oversight for all information systems operations activities, including computer and telecommunications/communications operations, data entry, data control, LAN/MAN/WAN administration and operations support, operating systems programming, system security policy procedures, and/or web strategy and operations.
Provides input to policy level discussions regarding standards and budget constraints.
Supervises all personnel engaged in the operation and support of network facilities, including all communications equipment on various platforms in large scale or multi-shift operations.
Supervises complex operations that involve two or more additional functions such as, but not limited to, network operations, systems security, systems software support, and production support activities.
Monitors and responds to hardware, software, and network problems.
Provides the routine testing and analysis of all elements of the network facilities (including power, software, communications machinery, lines, modems, and terminals).
Utilizes software and hardware tools and identifies and diagnoses complex problems and factors affecting network performance.
Troubleshoots network systems when necessary and makes improvements to the network- Systems EngineerProvides analysis related to the design, development, and integration of hardware, software, man-machine interfaces and all system level requirements to provide an integrated IT solution.
Develops integrated system test requirement, strategies, devices and systems.
Directs overall system level testing.
- Voice/Data EngineerProvides technical direction and engineering knowledge for communications activities including planning, designing, developing, testing, installing and maintaining large communications networks.
Ensures that adequate and appropriate planning is provided to direct building architects and planners in building communications spaces and media pathways meet industry standards.
Develops, operates, and maintains voice, wireless, video, and data communications systems (i.
e.
, VoIP, AV/VTC, ,etc.
) Provides complex engineering or analytical tasks and activities associated with one or more technical areas within the communications function.
OverviewWe are seeking to connect with current USTRANSCOM employees.
TekSynap is a fast growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment.
Technology moving at the speed of thought embodies these principles - the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers.
We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays.
Our benefit information can be found here.
Join TekSynap and discover the exciting and rewarding career opportunities in support of the Military Surface Deployment & Distribution Command (SDDC) located at Scott AFB, Il, VA with outposts in Concord, CA, Charleston, SC.
Sunny Point, NC, Joint Base Lewis-McChord, WA, Fort Eustis, VA, Beaumont, TX, Jacksonville, FL, Kuwait and Germany.
We are seeking candidates with broad IT experience to support a full suite of enterprise management Information Technology (IT) services on multiple networks and security domains, to include, Cybersecurity, Help Desk, System/Network Administration, VTC and Web Support.
Email your contact information to Kearstin McGinnis, kearstin.
mcginnis@teksynap.
com to receive details.
We look forward to engaging with you!In the meantime, please visit us at www.
teksynap.
com and learn more about our culture, contracts and leadership team.
The safety and health of our employees is of the upmost importance.
Employees are required to comply with any contractually mandated Federal COVID-19 requirements.
More information can be found here.
By applying to a role at TekSynap you are providing consent to receive text messages regarding your interview and employment status.
If at any time you would like to opt out of text messaging, respond STOP.
Additional Job Information EQUAL EMPLOYMENT OPPORTUNITY In order to provide equal employment and advancement opportunities to all individuals, employment decisions will be based on merit, qualifications, and abilities.
TekSynap does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age, genetic information or any other characteristic protected by law (referred to as protected status).
This nondiscrimination policy extends to all terms, conditions, and privileges of employment as well as the use of all company facilities, participation in all company-sponsored activities, and all employment actions such as promotions, compensation, benefits, and termination of employment.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.