Recent Searches

You haven't searched anything yet.

1120 Deputy Program Manager Jobs in Washington, DC

SET JOB ALERT
Details...
FEDITC LLC
Washington, DC | Other
$139k-185k (estimate)
6 Months Ago
VTG
Washington, DC | Full Time
$122k-164k (estimate)
3 Days Ago
Booz Allen Hamilton
Washington, DC | Other
$100k-133k (estimate)
3 Days Ago
SAIC
Washington, DC | Full Time
$153k-205k (estimate)
1 Week Ago
hntb
Washington, DC | Full Time
$143k-190k (estimate)
1 Month Ago
Amyx
Washington, DC | Full Time
$143k-190k (estimate)
1 Month Ago
Sellers & Associates, LLC
Washington, DC | Full Time
$118k-154k (estimate)
1 Month Ago
ANALYGENCE, Inc.
Washington, DC | Full Time
$134k-179k (estimate)
2 Months Ago
Ironclad Technology Services LLC
Washington, DC | Full Time
$138k-183k (estimate)
0 Months Ago
gTANGIBLE Corporation
Washington, DC | Full Time
$135k-180k (estimate)
3 Months Ago
Protection Strategies Inc
Washington, DC | Full Time
$99k-135k (estimate)
3 Weeks Ago
VTG Defense
Washington, DC | Full Time
$139k-185k (estimate)
8 Months Ago
EMERGING TECH
Washington, DC | Full Time
$143k-190k (estimate)
1 Month Ago
Three Saints Bay, LLC
Washington, DC | Full Time
$116k-154k (estimate)
1 Month Ago
GATEWAYVENT
Washington, DC | Full Time
$115k-154k (estimate)
1 Month Ago
Jamison Professional Services, Inc. (JPS)
Washington, DC | Full Time
$134k-179k (estimate)
9 Months Ago
MindPoint Group LLC
Washington, DC | Full Time
$167k-202k (estimate)
3 Days Ago
Booz Allen
Washington, DC | Full Time
$107k-142k (estimate)
1 Month Ago
americansystems
Washington, DC | Full Time
$127k-157k (estimate)
1 Month Ago
Celestar Corporation
Washington, DC | Full Time
$102k-134k (estimate)
1 Month Ago
Synchron, LLC
Washington, DC | Full Time
$114k-147k (estimate)
1 Month Ago
americansystems
Washington, DC | Full Time
$100k-121k (estimate)
5 Months Ago
EMCOR Group, Inc.
EMCOR Group, Inc.
Washington, DC | Full Time
$114k-147k (estimate)
9 Months Ago
US Office of the Secretary
Washington, DC | Full Time
$169k-212k (estimate)
1 Month Ago
DC Water Candidate Experience site
Washington, DC | Full Time
$147k-186k (estimate)
9 Months Ago
Deputy Program Manager
FEDITC LLC Washington, DC
$139k-185k (estimate)
Other 6 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

FEDITC LLC is Hiring a Deputy Program Manager Near Washington, DC

Job Details

Level: Experienced
Job Location: Washington DC - Washington, DC
Position Type: Full Time
Education Level: 4 Year Degree
Salary Range: Undisclosed

Description

FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.

Overview of position:

FEDITC is seeking a Deputy Program Manager to work in the DC area. A United States Citizenship and a Public Trust and DHS EOD clearance is required to be considered for this position.

Responsibilities:

  1. Program Management and Team Leadership:
    • Lead and coordinate security engineering teams ensuring project objectives are met.
    • Facilitate Integrated Project Team (IPT) meetings, manage agendas, and ensure distribution of meeting minutes.
    • Develop and deliver essential management plans like the Integrated Project Master Plan, Quality Control Plan (QCP), and Transition-Out Plans.
    • Ensure accurate weekly and monthly program management reporting, including the Program Management Review for the Information Transformation Program-ITP.
  2. Risk Management:
    • Employ risk management practices as defined in the PMBOK across all security engineering projects.
    • Identify and mitigate impacts of network changes with external organizations.
  3. Project Planning and Execution:
    • Create and maintain project plans detailing objectives, labor resources, task durations, and overall schedules.
    • Act as the Implementation Manager for various security engineering projects requiring Change Requests (CRs).
  4. Technical Security Expertise:
    • Manage configurations, updates, and modifications of security hardware and software including firewalls, IDPS, and related HSEN equipment.
    • Provide subject matter expertise for the analysis of security architectures, compliance with Federal regulation and policy, and commercial security best practices.
  5. Change Management:
    • Participate in DHS/OCIO change management processes regarding security network architecture and design changes.
    • Develop materials for internal and external presentations regarding network architecture and design changes.
  6. Security Architecture and Solutions Design:
    • Advise on, review, and assess DHS systems, applications, and technical infrastructures for compliance, reliability, and security implications.
    • Design security solutions and maintain design documentation and security application and hardware design strategies.
  7. Communication and Coordination:
    • Collaborate with other DHS Components to identify network monitoring needs and implementation requirements.
    • Conduct meetings with vendors, management, service providers, and DHS Components as needed.
  8. Knowledge Management:
    • Maintain and manage a network and security engineering knowledge repository.
    • Manage all action items for each IPT.
  9. Application Development and Integration:
    • Develop cybersecurity support applications and integrate them into the cybersecurity infrastructure.
    • Prototype, test, and implement applications ensuring effective machine to machine communication for automated processing within SOC operations.
  10. Requirement Analysis:
    • Define requirements for cybersecurity support applications including dashboard displays, process automation, and interface applications.
  11. Security Tool Maintenance and Administration:
    • Administer, maintain, and optimize security tools, devices, application systems, servers, and sensors.
    • Maintain SIEM applications to collect and aggregate data from various security-relevant devices.
  12. Technical Security Expertise:
    • Install and/or modify network and/or endpoint security elements to maintain optimal coverage and performance.
    • Configure and manage security tools to optimize data correlation, event discovery, and detection.
  13. Compliance and Assessment:
    • Interface DHS Enterprise and systems information into the SIEM tool, perform asset categorization and prioritization.
    • Conduct security impact assessments and assist with vendor product evaluations.
  14. Documentation and Reporting:
    • Create and maintain tool tuning and operation O&M SOPs/CONOPS and functional or operational documentation.
    • Provide a monthly report on Software and Maintenance Renewals and the Software License Inventory.
  15. Process Improvement and Enhancement Proposals:
    • Propose enhancements for tool and process improvement to the Government for evaluation and prioritization.
    • Identify shortfalls in the current capability and recommend improvements to current processes.
  16. Capacity Management and Performance Tuning:
    • Establish a SIEM capacity management process and plan.
    • Tune capabilities to improve efficiency and revise content as needed to enhance performance.
  17. Asset and License Management:
    • Track and manage SOC security devices, physical property, and asset management.
    • Manage all software licensing on behalf of the DHS SOC and assist with requirements gathering and systems analysis for new software requirements.
  18. Operational Support and Collaboration:
    • Support O&M and feature development for the DHS incident tracking system, and integrations with the SOAR tool.
    • Collaborate with the network engineering team regarding evaluation, testing, design, and implementation of a security architecture.
  19. Technology Research and Recommendations:
    • Identify and research emerging devices, tools, and applications relevant to cybersecurity.
    • Make recommendations to DHS Management regarding the potential roles of emerging technologies within the cybersecurity infrastructure.
  20. Documentation and Planning:
    • Prepare and maintain various plans, design documents, and security authorization documentation as per project or organizational requirements.
  21. Acquisition and Procurement Management:
    • Prepare acquisition schedules and plans, create product descriptions or work statements, and conduct product comparisons to manage and track procurement of necessary resources or technologies.
  22. Software and License Management:
    • Manage Software and Maintenance Renewals, keep track of Professional Support Hours, and maintain a Support License Inventory Report.
  23. Project Objectives
  • Secure robust and secure engineering services and support that align with or surpass customer demands and anticipations, with a focus on achieving 99.95% availability or higher alongside adhering to DHS security standards.
  • Consistently explore avenues to leverage IT in enhancing the performance of the contract.
  • Exhibit enhanced performance, reliability, security, and cost-efficiency in service delivery throughout the contract duration.
  • Uphold superior service levels in a cost-effective manner.
  • Enable audit and oversight mechanisms to ascertain superior service delivery at a fair and reasonable cost.
  • Establish a proficient management information system for precise, timely project status and performance data.
  • Formulate, execute, and sustain suitable inventory, security, quality control, architecture standards, and reporting protocols based on industry best practices.
  • Create and maintain a system aligning with federal government standards and mandates, ensuring DHS’s compliance.
  1. ITIL-Based Continuous Service Improvement Objectives:
  • Offer guidance in fostering and sustaining value for clients through improved service design, introduction, and operation.
  • Enhance network capabilities, performance, and minimize network downtime.
  • Amplify service quality concerning availability, bandwidth, latency, and problem resolution time to satisfy diverse Quality of Service (QoS) demands of HSEN end-users.
  • Conduct impact assessments on overall network QoS.
  • Ensure proactive detection, identification, and resolution of network issues to prevent end-user impact.
  1. Technical and Management Approach and Methodologies:

Security Engineering Support Services:

  • Planning and Requirements Development: Identify security requirements and plan for their implementation.
  • System Design and Analysis: Design security systems and analyze their efficacy in meeting the outlined security requirements.
  • Operational Support: Offer operational support to ensure the security systems are functioning as intended.
  • Documentation and Reporting: Document the design, implementation, and operational procedures of the security systems and report on their performance.

Security Architecture Support Services:

  • Security Tool Architecture for Security Operations Monitoring: Design and implement security tool architecture to facilitate continuous monitoring of security operations.
  • Three-Year Architecture Roadmap Development: Create a forward-looking three-year architecture roadmap based on security requirements.
  • High-Level Design Documentation for Security Engineers: Provide high-level design documentation to guide Security Engineers in implementing and maintaining security systems.

Evaluation Criteria:

  • Assess the comprehension of the security requirements for the entire project to ensure effective and concurrent management of DHS requirements.
  • Evaluate the proposed approach or methodology and its associated strategy for implementing the described security-centric approach, ensuring the ability to develop and complete all security-related deliverables with the highest quality within the proposed timeline.
  1. Program Management and Team Leadership requirements for Security Operations:
    • Coordination and management of security engineering teams.
    • Facilitating Integrated Project Team (IPT) meetings including agenda preparation, meeting facilitation, and distribution of meeting minutes.
    • Developing, revising, and delivering essential management plans such as Integrated Project Master Plan, Quality Control Plan (QCP), and Transition-Out Plans.
    • Weekly and monthly reporting including Program Management Review for the Information Transformation Program-ITP.
  2. Risk Management:
    • Employing risk management practices as defined in the Project Manager Body of Knowledge (PMBOK) throughout all security engineering projects.
    • Identifying, resolving, and/or mitigating network change impacts to and from external organizations.
  3. Project Planning and Execution:
    • Creating and maintaining project plans detailing objectives, labor resources, task durations, and overall schedules.
    • Acting as Implementation Manager for various security engineering projects requiring Change Requests (CRs).
    • Generating or assisting in the generation of project documentation such as scope statements, business requirements documents, CONOPs, and functional requirements.
  4. Technical Security Expertise:
    • Understanding and managing configurations, updates, and modifications of security hardware and software including firewalls, Intrusion Detection and Prevention Systems (IDPS), and related HSEN equipment.
    • Providing subject matter expertise for expert analysis of security architectures, compliance with Federal regulation and policy, and commercial security best practices.
    • Developing and maintaining a multi-stage system to ensure that security engineering projects are approved and maintained within a knowledge repository.
  5. Change Management:
    • Participating in DHS/OCIO change management processes including security network architecture and design changes.
    • Developing materials for internal and external presentations regarding network architecture and design changes.
  6. Security Architecture and Solutions Design:
    • Advising on, reviewing, and assessing DHS systems, applications, and technical infrastructures for compliance, reliability, and security implications.
    • Recommending and designing security solutions, maintaining design documentation, and security application and hardware design strategies.
    • Recommending improvements to security architecture to implement a DevSecOps operating philosophy and address current and anticipated data and processing needs.
  7. Communication and Coordination:
    • Working closely with other DHS Components to identify network monitoring needs and implementation requirements.
    • Conducting meetings as needed with vendors, management, service providers, and DHS Components.
  8. Knowledge Management:
    • Maintaining and managing a network and security engineering knowledge repository, including managing all action items for each IPT.
  9. Application Development and Integration:
    • Develop cybersecurity support applications and integrate them into the cybersecurity infrastructure.
    • Prototype, test, and implement applications, ensuring effective machine to machine communication for automated processing within SOC operations.
    • Utilize APIs for tool and process automation, and deploy integrated applications within the cybersecurity infrastructure.
  10. Requirement Analysis:
    • Define requirements for cybersecurity support applications including dashboard displays, process automation, and interface applications.
  11. Security Tool Maintenance and Administration:
    • Perform administration, maintenance, configuration, patching, upgrades, and optimization of security tools, devices, application systems, servers and sensors.
    • Maintain Security Information and Event Management (SIEM) applications to collect and aggregate data from various security-relevant devices.
    • Create and maintain standard Tool Maintenance Design Documentation, Test Plans, and diagrams of new or revised solutions.
  12. Technical Security Expertise:
    • Install and/or modify network and/or endpoint security elements, tools, and other systems to maintain optimal coverage and performance.
    • Configure and manage security tools to optimize data correlation, event discovery, and detection.
    • Provide security device signature maintenance and performance reports.
  13. Compliance and Assessment:
    • Interface DHS Enterprise and systems information into the SIEM tool, perform asset categorization and prioritization.
    • Conduct security impact assessments, assist with vendor product evaluations, and provide impact analysis for new software/products.
  14. Documentation and Reporting:
    • Create and maintain tool tuning and operation O&M SOPs/CONOPS, functionality or operational documentation.
    • Provide a monthly report on Software and Maintenance Renewals and the Software License Inventory.
    • Review network Systems Engineering Lifecycle (SELC) and provide comments regarding the evaluation, testing, design and implementation of security architecture.
  15. Process Improvement and Enhancement Proposals:
    • Propose enhancements for tool and process improvement to the Government for evaluation and prioritization.
    • Identify shortfalls in the current capability and recommend improvements to current processes.
  16. Capacity Management and Performance Tuning:
    • Establish a SIEM capacity management process and plan.
    • Tune capabilities to improve efficiency and revise content as needed to enhance performance.
  17. Asset and License Management:
    • Track and manage SOC security devices, physical property, and asset management.
    • Manage all software licensing on behalf of the DHS SOC, and assist with requirements gathering and systems analysis for new software requirements.
  18. Operational Support and Collaboration:
    • Support Operations and Maintenance (O&M) and feature development for the DHS incident tracking system, and integrations with the SOAR tool.
    • Collaborate with the network engineering team regarding evaluation, testing, design and implementation of a security architecture.
  19. Technology Research and Recommendations:
    • Identifying and researching emerging devices, tools, and applications relevant to cybersecurity.
    • Making recommendations to DHS Management regarding the potential roles of emerging technologies within the cybersecurity infrastructure.
  20. Documentation and Planning:
    • Preparing and maintaining a Capacity Management Plan, detailing process and statistics.
    • Drafting System Design Documents as per requests to detail the architecture and design of systems.
    • Creating Concepts of Operations (CONOPS) documents as requested to outline the operational concepts and associated details of systems.
    • Preparing Security Authorization (SA) Process Documentation including Security Plan, Contingency Plan Test Results, Configuration Management Plan, Security Assessment Plan, Security Assessment Report, and Authorization to Operate Letter.
    • Updating Security Authorization documentation as needed prior to Authorization to Operate (ATO) expiry.
    • Updating SIEM Data Architecture on a regular basis to ensure it meets evolving needs.
    • Drafting a SIEM capacity management process and plan to ensure the adequate capacity is maintained for effective operations.
    • Providing Logging Capability Recommendations to enhance or optimize logging capabilities within the cybersecurity infrastructure.
    • Developing and maintaining a Disaster Recovery Plan to ensure preparedness and resilience in case of adverse events.
    • Creating Individual Project Charters as requested to outline the scope, objectives, and other crucial aspects of individual projects.
  21. Acquisition and Procurement Management:
    • Preparing an Acquisition Schedule to manage and track the procurement of necessary resources or technologies.
    • Drafting an Acquisition Plan to detail the strategy for procuring necessary resources or technologies.
    • Creating Product Descriptions or Work Statements to detail the specifications and requirements of products or work to be acquired.
    • Conducting Head to Head Product Comparisons to evaluate different products against specified criteria and requirements.
    • Drafting Functional, Operational, and Technical Requirements documents to detail the necessary requirements for systems or projects.
  22. Software and License Management:
    • Managing Software and Maintenance Renewals to ensure all necessary software remains up to date and supported.
    • Keeping track of Professional Support Hours and maintaining a Support License Inventory Report to ensure compliance and adequate support availability.

Qualifications


Qualifications:

  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field.
  • A minimum of 5 years of experience in managing IT operations, security, engineering, or a related area, with a focus on delivering successful contracts.
  • Prior experience in leading sizable teams, with a track record of managing a team of around 40 individuals and coordinating with multiple government leads across different areas.
  • Demonstrated experience in ITIL-based Continuous Service Improvement methodologies.
  • Exceptional knowledge of network and security protocols, tools, and platforms.
  • Ability to manage multiple projects concurrently and meet tight deadlines.
  • Excellent communication, documentation, and interpersonal skills.
  • Demonstrated experience in managing and delivering on contracts, with a focus on achieving project objectives and ensuring customer satisfaction.
  • Strong technical acumen with a solid understanding of the latest security principles, techniques, and protocols.
  • Ability to work collaboratively with other departments to resolve complex issues with innovative solutions.
  • Demonstrated ability to work in a fast-paced, deadline-oriented work environment.

Certifications:

  • Certifications such as CISSP, CISM, CISA, or PMP are highly desirable.

Clearance:

  • Active Public Trust/DHS EOD Clearance is required.
  • Must be a US Citizen and pass a background check.
  • Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as requested by FEDITC and/or required by FEDITC’S Client(s)/Customer(s)/Prime contractor(s).

FEDITC, LLC. is committed to fostering an inclusive workplace and provides equal employment opportunities (EEO) to all employees and applicants for employment. We do not employ AI tools in our decision-making processes. Regardless of race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran. FEDITC, LLC. ensures that all employment decisions are made in accordance with applicable federal, state, and local laws. Our commitment to non-discrimination in employment extends to every location in which our company operates

Job Summary

JOB TYPE

Other

SALARY

$139k-185k (estimate)

POST DATE

10/26/2023

EXPIRATION DATE

04/25/2024

Show more

FEDITC LLC
Other
$48k-64k (estimate)
4 Days Ago
FEDITC LLC
Other
$125k-167k (estimate)
4 Days Ago
FEDITC LLC
Other
$97k-127k (estimate)
4 Days Ago

The job skills required for Deputy Program Manager include Leadership, Program Management, Planning, Analysis, Collaboration, Presentation, etc. Having related job skills and expertise will give you an advantage when applying to be a Deputy Program Manager. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Deputy Program Manager. Select any job title you are interested in and start to search job requirements.

For the skill of  Leadership
Family Preservation Services- DC
Full Time
$118k-141k (estimate)
3 Days Ago
For the skill of  Program Management
Sellers & Associates, LLC
Full Time
$113k-139k (estimate)
1 Month Ago
For the skill of  Planning
Boardwalk Bar & Arcade
Full Time
$23k-29k (estimate)
Just Posted
Show more

The following is the career advancement route for Deputy Program Manager positions, which can be used as a reference in future career path planning. As a Deputy Program Manager, it can be promoted into senior positions as a Project Manager Sr. - Construction that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Deputy Program Manager. You can explore the career advancement for a Deputy Program Manager below and select your interested title to get hiring information.

hntb
Full Time
$143k-190k (estimate)
1 Month Ago

If you are interested in becoming a Deputy Program Manager, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become a Deputy Program Manager for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on Deputy Program Manager job description and responsibilities

Deputy program managers who work for government agencies or contractors often must obtain a security clearance.

02/12/2022: Portsmouth, NH

Assist the PM in providing liaison with partner nation officials to facilitate equipment delivery, identify venues and determine future requirements.

03/27/2022: Eugene, OR

Assist the PM in providing liaison with partner nation officials to facilitate equipment delivery, identify venues and determine future requirements.

02/23/2022: Knoxville, TN

Assist with the scheduling and delivery of briefings.

02/13/2022: San Diego, CA

Assist PM with arrangements for billeting and local transportation of mission personnel in-country.

03/04/2022: Lima, OH

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on Deputy Program Manager jobs

have a thorough knowledge about the program.

04/10/2022: Richland, WA

Must be people smart and with good interpersonal abilities.

01/31/2022: Long Beach, CA

Must be proficient with Microsoft Office Suite and Microsoft Office Project.

04/17/2022: Knoxville, TN

Ability to work within the context of political and operational security organizations at the national and international levels.

03/25/2022: Juneau, AK

Established capability to handle individuals or groups from numerous levels and backgrounds.

02/21/2022: Sioux City, IA

Show more