Wireless Operational Consultant Level 1 Engineering - Elkridge, MD at Geebo

Wireless Operational Consultant Level 1

Your Impact:
This position is CONTINGENT upon contract award.
Our recruiting team will follow up with you on your application.
Our hiring team will not start the interview evaluation process until award.
Skills & Tasks The Level 1 Wireless Operational Consultant shall possess the following capabilities:
Operational experience using SIGINT/EW systems in enterprise (fully-tethered), disconnected forward deployed clandestine environment), and ad-hoc environments (short-duration) for survey, collection, and targeting.
Domain experience for operations (terrestrial, airborne, maritime) with Military units, intelligence teams, and/or partners.
Assess and prosecutes exploitation against protocols such as Digital Mobile Radio, Cellular, Packet, VSAT, Push-to-Talk, and hybrid streams such as those used by Drones.
Expertise against CDMA, GSM, UMTS, LTE (4th and next generation - 5th), Wide-Bands (Bluetooth, ZigBee, etc.
), VoIP, VoLTE, embedded systems, etc.
Military Operations and/or Exercise (Unified Command, Clandestine, and Partner-Alliances) Expertise with SIGINT GOTS and COTS tools such as SEDB, DataXplorer, XKeyscore, DRT, ECI-controlled systems, HOTR, Rover, WSTL, SPRINGCLOUD, COSMICSTRIKE, SHOCKWAVE, Geo-Systems, RF, antenna selection, visualization, etc.
Job Duties Provides operational domain guidance, usage and mission Tactics Techniques and Procedures (TTPs) across diverse scenarios by the and its partners in fully connected enterprise, disconnected operations, and ad-hoc or semi-connected system modes for existing and emergent capabilities against existing and emergent technologies.
Provides combination of mission, protocol, and system level experiences to influence successful development efforts.
The Operational SME assists in the development, sustainment, and operational deployment effort of protocol exploitation, user visualization in diverse usage scenarios.
The Operational SME also influences test strategy selection, multi-sensor usage scenarios and actively engages military services, intelligence teams, technical staff, and mission capability sponsors, with the integrated solutions within threat-environments.
#SZ Here's What You'll Need:
Education Four (4) years' experience in software systems engineering in programs and contracts of similar scope, type and complexity is required with a Bachelor's degree in Electrical Engineering, Computer Science, Computer Engineering or related discipline from an accredited college or university is required.
Without a Bachelor's degree, eight (8) years of experience is required.
or (U) Three (3) years' experience in software systems engineering in programs and contracts of similar scope, type and complexity is required with a Master's degree in Electrical Engineering, Computer Science, Computer Engineering or related discipline from an accredited college or university or Two (2) years' experience in software systems engineering in programs and contracts of similar scope, type and complexity is required with a Doctorate degree in Electrical Engineering, Computer Science, Computer Engineering or related discipline from an accredited college or university.
The experience must include OCONUS, urban, and semi-autonomous usage scenarios, and TTP development.
Qualifications Experience working in a minimum of two of the following:
High Frequency (HF), Very High Frequency (VHF), Ultra High Frequency (UHF), Cellular Protocols, Wi-Fi, Angle of Arrival (AOA), Time Difference of Arrival (TDOA), and Frequency Difference of Arrival (FDOA) Certifications None required Clearance Requirements TS/SCI with Poly Essential Functions.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.