By Light Professional IT Services

  • Subject Matter Expert (Optical Engineer)

    Job Locations US-MD-Fort Meade
    # of Openings
    Information Technology
    TS/SCI w/ Polygraph
  • Overview

    Defines requirements from a project's inception to its conclusion for a particular IT subject matter area. Analyzes and evaluates recommendations for system improvements, optimization, development, and maintenance efforts in the following specialties:

    • Information systems architecture
    • Networking; telecommunications
    • Automation; communications protocols
    • Risk management/electronic analysis software
    • Life-cycle management
    • Software development methodologies
    • Modeling and simulation.


    • Manages schedules to meet Government requirements. Meets with the clients, stakeholders, and customers to define technical project scope. Gathers Government requirements, and performs analyses of technology improvement, optimization, development, maintenance and software applicability plans.
    • Reviews and provides system engineering resources to meet customer mission requirements, coordinates optimization activities to ensure customer technical goals are considered.
    • Designs, develops, and modifies Threat software using scientific analysis and mathematical models to predict and measure outcomes and consequences of design as required in response to expanding mission, changes in objectives or upgrades in Agency networks and systems.
    • Formulates training objectives ,scenarios, and procedures to develop training course content for
    • Government personnel on the Insider Threat Analysis Software.
    • Modifies existing software to correct errors, adapt to new hardware, or improve threat software performance.
    • Builds and Deploys software enhancements to resolve issues with Windows and Linux operating systems, and TCP/IP network software.
    • Coordinates and performs research and engineering to identify and incorporate new data sources, produce new processing and reporting capabilities, integrate with other Government systems and/or processes, or upgraded or reconfigured government systems.
    • Investigates and implements innovative solutions to threat-monitoring challenges. Implements enterprise-level networking or security products or similar projects.
    • Performs risk management. Identifies project risks and determines the administrative or engineering means to mitigate the risk.
    • Investigates, develops, and applies statistical methods, counterintelligence and computer forensic analysis techniques to troubleshoot any issues and resolve challenging network or analysis problems.
    • Uses software utilities and hardware functionalities to resolve analogous operating issues.
    • Collaborates with Government to discuss/resolve emerging threats, issues and changes in operating scope. Documents and briefs Government technical and management staff.
    • Provides end-to-end research implementation, test, deployment, debugging, operation and analysis of insider threat data and software.
    • Applies TCP/IP networking and advanced packet analysis tools to support software customization.
    • Builds implementations of analysis techniques into the tool per customer request and performs analysis to determine the security and effectiveness of existing and proposed customizations.
    • Provides cause and effect analysis of new/potential sources of unauthorized access to networks, databases and systems and potential mitigation strategies.
    • Collaborates with Government to discuss/resolve technical issues and/or changes in operating scope. Documents and briefs Government technical and management staff.
    • Provides documentation for, and briefs to Senior level Government Officials.
    • Identifies project risks and determines the administrative or engineering means to mitigate the risk.
    • Provides the overall technical direction of the project.
    • Coordinates and performs research and engineering to identify/resolve issues, develop new capabilities, and innovate new technologies.


    • Twelve (12) years' experience and a Bachelor's degree in Network systems engineering, programming languages, scientific computing, high-performance computing, or related fields is required.
    • A Masters (MS), or Doctor (Ph.D.) degree in Software Engineering, Computer Engineering, Computer Science, or related field from an accredited college or university may be substituted for experience ( MS = 2 years, Ph.D. = 4 years).



    • Security +

    Special Requirements/Security Clearance

    • TS/SCI w/ Polygraph required

    An Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities



    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed