Click column header to sort
GDIT is currently seeking an Accountant in Westwood, MA to join our team. In this role you will be part of the Accounts Receivable Department and performing analysis tasks that are currently performed by the AR Manager and AR Supervisor by contributing to the customer service activities we provide to our internal customers and management.
Task and responsibilities in this role include, but are not limited to the following:
- Keep track of the overpayments and short payments made in order to send out a monthly report to the user community.
- Keep track of all credit invoices created and the reason for them and send this out monthly to the user community for comments.
- Post cash in Oracle as required.
- Respond and resolve service tickets received in the SCSM system.
- Assist with researching and resolving unapplied payments that have been received.
- Be responsible for IDI’s that need to be paid off in AR.
GDIT is actively pursuing an immediate opportunity to continue the modernization of the Provider Enrollment Chain of Ownership System (PECOS) for the Centers for Medicare & Medicaid Services (CMS). If awarded, GDIT will implement CMS’s new vision of PECOS modernization efforts, with a heavy emphasis on ensuring that the end-user experience for provider and administrators meets the high standards set by Medicare, America’s most popular healthcare brand. GDIT is seeking truly knowledgeable talent that understand the provider lifecycle, are knowledgeable with the data structures and are highly skilled in their technical execution.
This position will support the Centers for Medicare and Medicaid Services (CMS) PECOS 2.0 redesign. The ideal candidate will promote high quality, use of best practices and an outstanding user experience (UX). The Full Stack Developer will independently identify and resolve UX pain points, will stay current with regard to PECOS/web technology and will require minimal management direction/supervision.
Role and Responsibilities
· Actively participate in the entire application lifecycle
· Elicit and fulfill front-end and back-end requirements
· Develop functional and fast-responsive web applications, using markup languages
· Enhance/leverage mobile-based and web-based features
· Troubleshoot UI and ensure optimal performance
· Fix bugs and improve usability
· Employ the latest technology to re-build legacy apps
· Perform training and support development activities
· Utilize/promote best practices, including reusable code
**Position requires an in-scope TS/SCI clearance and polygraph.**
The Security Administrative Specialist provides support to the Office of Security and Counterintelligence (OS&CI) senior managers in areas of division and operational administrative security functions. The services shall support the offices of the agency and others as required.
- Maintain tracking records and filing systems; archives files as necessary
- Recommend new administrative support processes
- Execute agency and local Directorate/Office security in and out processing requirements
- Issue security related equipment; records; receipts; or supplies
- Maintain a schedule of appointments for a manager or offices
- Schedule polygraph testing
- Answer security related telephone calls; directs calls to the appropriate branch or office; and take messages
- Research; records; and reports statistical analysis for historical and planning purposes
- Provide security support for passing; verifying; and receiving clearances; confirming Sensitive Compartmented Information (SCI) security eligibility; processing visitor requests; processing requests for agency Badges; and processing Visit Certifications and Perm Certifications
- Update security data; run inquiries; provide quality control; develop reports using various IC and/or DoD databases
- Provide support coordinating; tasking and managing security action responses from internal agency; other Government; and industry organizations
- Maintain and update appropriate security related databases
- Provide administrative/customer support duties for access control and physical security support to the agency Headquarter buildings
- Issue and manage badges for Headquarters personnel and visitors
- Update data; provide quality control; run reports; and use the Monitor Dynamics Inc. system and Lenel Systems for proper badging; Visit Request and Badging System (VRBS); Access Polygraph Investigative Collection System (APICS); and others as needed
- Process certifications for access via fax; email; electronic message format and IC databases for visitors' access for daily visit or multiple visits up to one year
- Assist with badge issues; provide visitors information support; directions and assist in contacting visitor POC
- Assist with onboarding and out-processing of personnel to include badge creation for new personnel and badge destruction for departed personnel as well as assist in updating accesses for personnel
- Assist in the set-up and conduct of the weekly briefing for new personnel introduction to the agency
- Provide guidance and assist with security specific needs for office renovations and move management activities; such as; but not limited to; review of furniture for classified information; review of facilities for SCI Facility requirements; working with facilities and communication personnel to assist in defining requirements; scheduling moves; etc.
- Assist with work pertaining to the procurement; inventory control; and destruction of cryptographic material utilized by the agency
- Serve as an OS&CI Custodial Property Officer tracking security related equipment and accountable property for the respective branches
- Conduct security in-briefings and de-briefings related to security compartmented programs and office specific programs
- Support field offices; including polygraph; to include generating tasking lists; providing program and personnel security requests for examinations
- Interface in person and telephonically with outside federal agencies; requesting reports; referring and scheduling examinations; and answering general questions about the agency polygraph program
- Work with agency Program Security Officers to process requests for examinations; gather or provide information about prospective examinees
- Research; record; and report population statistical data for analysis and planning purposes of operational polygraph travel missions
- Collect; interpret; and produce weekly; monthly and yearly branch reports and statistics which includes multiple data reports from APICS
- Schedule; organize; and prepare read-aheads for the adjudication board and log/prepare all customer correspondence packages from the branch for mailing
- Provide administrative support for case tracking and provide monthly reports to management
- Coordinate logistics for off-site locations; provide logistical class configurations and reproduction of course materials
- Update and archive student training records with OS&CI provided courses
- Participates in special projects as required.
This role is not yet funded
Performs production assembly operations on electronic or electro-mechanical components or subassemblies.
1. Performs a wide variety of electronic and electromechanical subassembly and assembly operations to build up and assemble complex units such as power supplies, modules, chassis drawers, cable harnesses, PC boards, electronic systems, and subassemblies.
2. Uses visual aids, wiring lists, schematics, blueprints, and verbal and written instructions to assemble, modify, rework or reassemble units.
3. Identifies and selects components to be integrated into subassembly and assembly units.
4. Makes own set-ups, alignments, and adjustments, maintaining tolerance in accordance with instructions.
5. Disassembles, modifies, reworks, refurbishes, reassembles, and tests units as required.
6. Identifies failure trends and reports results.
7. May provide guidance and work leadership to lessexperienced assemblers.
8. Participates in special projects as required.
Desired prior experience:
- Experience with handheld electronics equipment, specifically underwater navigation equipment
- Experience performing preventive and corrective maintenance on underwater equipment
- Experience conducting maintenance or operator training of other electronics technicians and end users
- Experience in either the Explosive Ordnance Disposal (EOD) or Naval Special Warfare (NSW) communities
- 5-10 years’ military experience
**Position requires an active in-scope TS/SCI clearance and polygraph.**
The Security Control Assessor (SCA) is the Information Assurance (IA) Independent Validation and Verification (IV&V) role in the Risk Management Framework (RMF) workflow. The SCA role requires an IA professional with in-depth system security knowledge and skills to provide Assessment & Authorization (A&A) support throughout a systems lifecycle. The SCA conducts full and partial assessments of security controls implemented on customer owned and sponsored Information System’s (IS), enhances IS security awareness of Directorates & Offices’ staff, ensures proper IS security resources are appropriately applied as well as acts as IS liaison between the Directorates & Offices and the Government.
- Review information systems for compliance with applicable DCID, ICD, and directives and guidance
- Provide IS security advice and guidance in accordance with applicable DCID, ICD, and directives and guidance to Government and industry partners for the protection of data at all classification levels including SCI
- Provide IS technical guidance and support in preparing responses for USG approval to A&A questions asked by Government and industry partners;
- Evaluate and recommend approval, disapproval, or waiver(s) for IS processing national security data at industry and/or Government facilities
- Support development and implementation of directives and guidance for Information Assurance, Information Technology, and Information Management policies
- Provide input for consideration in the promulgation of future IS security policy
- Support and/or conduct site visits and assessments to inspect and verify IS reports and plans at industrial and Government locations as approved by the Government, and provide a written report for review and approval by the USG;
- Track completion of the Security Assessment Package and report status;
- Support the preparation of the Security Assessment Report (SAR). The SAR contents include, but is not limited to the, Summary of Assessment results and Authorization Recommendation;
- Review, coordinate, and respond to IS security issues as requested by the Government;
- Perform short term (less than 90 days) CONUS and OCONUS travel to conduct site security inspections when approved by the Government;
- Provide A&A support to the Government for the protection of special programs and tactical operations related activities.
- Participates in special projects as required
GDIT is seeking an experienced software application developer with healthcare related practice management application experience to join a dynamic team supporting modernization and enhancements for a Federal healthcare delivery system.
Researches; designs; develops and/or modifies enterprise-wide systems and/or applications software.
Designs; develops; codes; tests; and debugs complex new software products; or makes significant enhancements to existing software.Researches and integrates design strategies; product specifications; development schedules; and user expectations into product capabilities.Resolves complex hardware/software compatibility and interface design considerations.Conducts investigations and tests of considerable complexity.Researches emerging technologies to determine impact on application execution.Provides input to staff involved in writing and updating technical documentation such as user manuals; system documentation; and training materials.Troubleshoots complex problems and provides customer support for software operating systems and application issues.Advises hardware engineers on machine characteristics that affect software systems; such as storage capacity; processing speed; and input/output requirements.Prepares reports on analyses; findings; and project progress.Provides guidance and work leadership to less-experienced software engineers.May serve as a technical team or task leader.Maintains current knowledge of relevant technology as assigned.Participates in special projects as required.
Researches, designs, develops, and/or modifies enterprise-wide systems and/or applications software.
Information Security Analyst Senior
US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team.
1. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
2. Performs Cybersecurity activities (formally known as IA - Information Assurance) for a large program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
3. Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.
4. Conduct network and system audits for vulnerabilities using Security Technical Implementation Guides (STIGs), ACAS vulnerability scanner, and DISA SCAP to mitigate those findings for Solaris, Linux, Windows, and associated network operating systems.
5. Ability to create, track and review Plan of Action and Milestones (POA&Ms) and conduct solution identification to assist in problem remediation and resolution.
6. Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats.
7. Carries out DoD Risk Management Framework (RMF) in accordance with DoD 8510 to ascertain information systems' security posture by utilizing security control validation activities and coordinating security testing.
8. Maintain the Security Accreditation status, including system documentation of multiple DoD classified networks and interconnected systems
9. Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for SAVs, ST&Es, and CCRI
10. Evaluate firewall change requests and assess organizational risk.
11. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
12. Assists with implementation of counter-measures or mitigating controls.
13. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
14. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
15. Provides guidance and work leadership to less-experienced technical staff members.
16. Maintains current knowledge of relevant technology as assigned.
17. Participates in special projects as required.
• Experience identifying valid threat targets across various mission AORs and conducting all-source target analysis using multiple tools and databases; minimum of one year experience with IC targeting tools
• Ability to prepare messages on targets and communicate results through the preparation of targeting packages.
• Demonstrated experience with customer targeting
• Bachelor’s Degree or higher in accounting, business, economics or finance (preferred) or demonstrate strong understanding of global finance through experience or knowledge
• Demonstrated experience using customer messaging system
• Minimum of one year of experience working with foreign partners.
• Minimum of one year of experience providing training or giving presentations to foreign partners.
Hardware Support/Maintenance Technician (L3)
GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide.
Principal Duties and Responsibilities:
An I2TS 3 Hardware Support/Maintenance Technician:
· Conducts hardware maintenance and minor installations on equipment listed in the specified task
order and understands the inter-operational relationships of all components to the extent required to
perform maintenance services
· Undertakes minor system tasks (e.g., loading software, rebooting systems) in support of hardware maintenance and operations functions
· Installs and incorporates new releases, updates, or other changes to COTS hardware and software (diagnostics failures or potential failure predictions)
· Operates and applies automated hardware management and diagnostics systems (to include remote management and diagnostics) and interprets findings to maintain, repair, or upgrade hardware
· Plans, executes, and provides recommendations for preventative maintenance as approved by government personnel
· Provides recommendations on spares, spares program, planning, and tracking operational spares and bench stock
· Provides technical assistance to responding field service personnel
· Assists in repairing computers, printers, digital senders, etc.
Desirable Skills / Experience:
- Perform STIGs & IAVA implementation for system devices, perform imaging of systems, CERP replacement, etc.
- Ability to interact with customers on a daily basis providing guidance and procedures concerning account requests, e-mail, home directories, file access/storage, local procedures, etc. as required to ensure mission success
- Perform Level I/II Active Directory functions such as unlocking accounts, creating and issuing accounts, etc.
- DoD 8570.01-M IAT Level II Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract
- Required Security Environment Certification: CompTIA Security+ CE or equivalent
- Computing Environment certification: MTA 98-349, Windows Operating System Fundamentals
- TS/SCI required
- Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract
- Position may require lifting of objects (i.e. IT Hardware), reaching/bending/kneeling (i.e. plug in cables) and other moderately strenuous activity
Accessibility and Accommodations
For Individuals with Disabilities, Medical Conditions, or Physical or Mental Impairments:
General Dynamics IT is committed to ensuring that our employment process is open to all individuals. General Dynamics IT provides reasonable accommodations to individuals who need assistance during any part of the employment process due to a disability, medical condition, or physical or mental impairment. Reasonable accommodations are considered on a case-by-case basis.
• If you need assistance to navigate General Dynamics IT's Careers website or to apply for a position, please send an email to email@example.com or call 703-995-3003. Please provide your contact information and let us know how we can assist you.
• If you are selected for further consideration and need an accommodation for any part of the application or interview process, please notify your Recruiting Representative. Please note that this email address and/or phone number should only be used for inquiries concerning a request for accommodation. All other inquiries should be sent to firstname.lastname@example.org
to see your rights under the Family Medical Leave Act.
for a summary of your equal employment opportunity rights on the "EEO is the Law" poster.
to view the Pay Transparency Policy Statement
GDIT participates in E-Verify. Download the PDF for more details
GDIT participa en E-Verify. Descargue el PDF para más detalles.
General Dynamics Information Technology is an Equal Opportunity and Affirmative Action Employer. We welcome and encourage diversity in our workforce. It is the policy of General Dynamics IT to provide equal employment opportunity to all employees and qualified applicants without regard to race, color, religion, national origin, sex, age, disability, pregnancy, sexual orientation, gender identity, transgender status, genetic information, protected veteran status, or any other protected characteristic under federal, state or local laws. We invite and encourage former employees to explore new opportunities with us. Rejoining the company can enhance newly acquired skills and build on the strong fundamental skills developed at General Dynamics. Employees that return to the company may be eligible for reinstatement of some benefits based on total years of service.