Systems Engineering and Technical Support

Company Name:
KeyLogic Systems
KeyLogic is seeking outstanding candidates with industry experience to join our expanding team!
Systems Engineering and Technical Support

College Park, MD
Job Code:
KeyLogic is expanding within the Intelligence Community. We are recruiting Computer Scientists with an Active Department of Defense Top Secret/SCI Clearance (CI Poly preferred) in the College Park, MD area.
Develop and test automated methods for continuous, real-time analysis of diverse SIGINT data for indicators of significant events in the Middle East and North Africa. These events include disease outbreaks, civil unrest, regime change and elections, terrorist activity, and military activity.
Clearance requirements:
TS with CI Poly
Technical Systems Engineering and Technical Assistance (SETA) Support
Support to technical tasks related to statistics, mathematics, and computer science. Technical support to the Government Program Manager includes:
Analysis and tracking of performers' technical deliverables and publications
Coordination of test and evaluation activities, specifically those carried out by the performers, with Government Experts' review of performer evaluation / validation approaches and results
Preparation of drafts of briefings and reports for the program
Independent review and summary of technical literature
PhD (or qualified masters with 3yrs experience) in:
Mathematics ...or
Computer Science
At least two years research experience in as many of the following areas as possible:
Time series analysis
Test analysis
Event ontologies
Machine Learning
Program Evaluation
Strong writing, communication, and organization skills
A minimum of two years' experience in supporting a program manager is DESIRED
Knowledge of the U.S. SIGINT system (including SIGINT database repositories)
Experience /working knowledge of digital network intelligence (DNI)
Experience / working knowledge of dialed number recognition (DNR) methodologies
About KeyLogic:
KeyLogic Systems specializes in Knowledge Management, Program Management, and Portfolio and Performance Management solutions that enable our customers to make better business decisions for their organization. KeyLogic's performance has earned the company a solid reputation for high standards, proactive solutions and an outstanding commitment to the customer, best exemplified by our 97% customer satisfaction rating and our record of never having a one-time customer. All of our customers have provided repeat business.
KeyLogic has achieved fourteen consecutive years of growth since its founding in 1999. KeyLogic serves as the prime contractor on nearly 75% of its contracts, with work split almost evenly between the defense and civilian sectors. Our client list includes the Department of Defense (DoD), where we provide services for the Defense Information Systems Agency (DISA) and the U.S. Army and Navy, Environmental Protection Agency (EPA), Departments of Labor (DOL), Energy (DOE), Transportation (DOT) and Treasury (including the Internal Revenue Service (IRS)), General Services Administration (GSA), and the National Aeronautics and Space Administration (NASA).
KeyLogic has successfully attained a Capability Maturity Model Integration for Development (CMMI-DEV) Maturity Level 3 Rating. CMMI-DEV is a process improvement approach for software engineering and organizational development that provides organizations with the essential best practices needed to meet business goals. Only three-percent of small and medium federal contractors have achieved CMMI Maturity Level 3. KeyLogic joins this distinguished group.
As a result of the company's rapid growth and success, KeyLogic has been recognized by Washington Technology and Inc. magazines as one of the fastest growing private companies working in today's government contracting market.
KeyLogic Systems, Inc. is Proud to be an Equal Opportunity Employer.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.