cover image
Resource Management Concepts, Inc.

Resource Management Concepts, Inc.

www.rmcweb.com

3 Jobs

542 Employees

About the Company

RMC is a dedicated small business provider of exceptional management and technology solutions. We have a strong commitment to being a preferred employer by offering interesting and challenging work along with great benefits. Our highly-trained employees are consistently recognized for providing high-quality and creative solutions for challenging problems. RMC's customer base includes various U.S. Navy, Air Force, Transportation Security Administration, and Customs and Border Protection customers spread across 19 states and Washington, D.C.

Listed Jobs

Company background Company brand
Company Name
Resource Management Concepts, Inc.
Job Title
Software Developer (Full Stack)
Job Description
Job title: Software Developer (Full Stack) Role Summary: Develop and maintain software for analysis of advanced synthetic training environments, including real‑time and post‑action data visualization. Provide technical expertise in Python, C, and C++, support DevOps processes, and deliver training and demonstrations to customers. Expactations: * Perform advanced programming in Python3, C, and C++ to analyze complex simulations. * Collaborate on design enhancements and integrate new features into existing systems. * Ensure high code quality through automated builds, testing, and deployment across Linux and Windows platforms. * Maintain security compliance, including support for DoD Secret clearance requirements. Key Responsibilities: * Design, develop, and test software modules for synthetic training data analysis and visualization. * Review and evaluate Python, C, and C++ code for performance, security, and maintainability. * Implement thread‑safe, parallel processing solutions (e.g., CUDA, threaded programming). * Support DevOps lifecycle: build automation (CMake), continuous integration, version control (git), and deployment. * Deliver customer training sessions and demonstrations of software capabilities. * Document software design, code, and user procedures. * Participate in cross‑functional teams to outline future enhancements and architecture improvements. Required Skills: * Strong programming skills in Python3, C, and C++. * Experience with CMake, git, and DevOps tooling. * Familiarity with CUDA, threaded programming, and simulation modeling. * Proficiency in data analysis and visualization within both Linux and Windows environments. * Solid understanding of object‑oriented design, design patterns, and standard algorithms. * Ability to review and critique code for quality and performance. Required Education & Certifications: * Bachelor’s degree in Computer Science, Information Systems, Engineering or related discipline **AND** ≥3 years of experience, *or* 7 years of total experience in lieu of a degree. * Active DoD Secret clearance required at hiring.
Patuxent, United states
On site
26-12-2025
Company background Company brand
Company Name
Resource Management Concepts, Inc.
Job Title
Splunk Administrator w/ Linux
Job Description
**Job Title**: Splunk Administrator w/ Linux **Role Summary**: Oversee Splunk infrastructure and Linux systems, focusing on configuration, performance optimization, security, and integration with third-party data sources. Collaborate with security teams to implement logging strategies and support incident response. **Expectations**: Minimum of 5-10 years in DoD or federal programs. Strong expertise in Splunk and Linux administration required. **Key Responsibilities**: - Administer, configure, and maintain Splunk Enterprise on Linux-based systems. - Install, configure, and manage Splunk forwarders, indexers, and search heads. - Design and optimize Splunk infrastructure on Linux servers. - Troubleshoot and resolve Splunk performance issues in Linux environments. - Configure and manage Splunk apps, add-ons, and integrations with third-party tools. - Implement access controls, encryption, and security best practices for Splunk and Linux systems. - Develop automation scripts (Bash, Python) for monitoring, backups, and system configurations. - Support incident response, including investigation coordination, documentation, and reporting. **Required Skills**: - Expertise in Linux (Red Hat, CentOS) system administration, performance tuning, and troubleshooting. - Experience managing Splunk distributed environments (indexers, search heads, forwarders). - Proficiency in Linux shell scripting (Bash, Python) and Splunk Search Processing Language (SPL). - Knowledge of Splunk apps, add-ons, and custom configurations. - Solid understanding of security practices for Splunk and Linux systems. **Required Education & Certifications**: - DoD 8570.01M IAT Level III certification with Continuing Education (e.g., CompTIA CASP+, CISSP). - Splunk certifications (Splunk Certified Admin, Power User). - Linux certifications (RHCSA, LPIC-2). - Interim DoD Secret clearance to start; Top Secret clearance required post-hire.
Indian head, United states
On site
Mid level
13-02-2026
Company background Company brand
Company Name
Resource Management Concepts, Inc.
Job Title
Cyber Defense Incident Responder (Tier 2)
Job Description
Job title: Cyber Defense Incident Responder (Tier 2) Role Summary: Provide continuous network security monitoring and incident response for a large enterprise government network, conducting forensic investigations, triage, remediation, and collaboration with internal and external partners to safeguard operational integrity. Expectations: * Maintain an active Top Secret security clearance with SCI eligibility (or start with Secret clearance pending adjudication). * Operate 24/7/365 on 12‑hour shifts (alternate Saturdays, Sundays, and two Wednesdays per month). * Respond promptly to incidents, ensuring compliance with DoD Cyber Incident Handling Program (CJCSM 6510.01B) and government quality metrics. Key Responsibilities: 1. **Incident Investigation** – Analyze logs, packet captures, system images, and host artifacts to identify root causes and impact. 2. **Incident Triage** – Assess scope, urgency, and potential impact; recommend mitigation strategies. 3. **Incident Management** – Lead incidents from detection through resolution, documenting actions in line with DoD requirements. 4. **Forensics & Threat Analysis** – Conduct real‑time forensic collections, intrusion correlation, and threat analysis; perform direct remediation tasks. 5. **Collaboration** – Work with subordinate agencies, law enforcement, counterintelligence, and Red Teams on high‑profile events and insider threat investigations. 6. **Documentation & Training** – Update incident response tactics, techniques, and procedures annually; deliver quarterly training to sustain team readiness. 7. **Quality Assurance** – Maintain high standards and consistent efficiency, meeting government‑defined metrics. Required Skills: * Expert forensic analysis, threat hunting, and vulnerability assessment. * Proficiency with Tanium, Elastic/Kibana, and Microsoft Defender for Endpoint. * Strong understanding of DoD environments, frameworks, and cyber defense operations. * Advanced problem‑solving, meticulous attention to detail, and effective communication with technical and senior leadership as well as external stakeholders. Required Education & Certifications: * Bachelor’s degree in Computer Science, Cybersecurity, or related field (or equivalent experience). * Minimum 2 + years in cybersecurity incident response or related roles. * DODD 8570 IAT Level II Certification. * DODD 8570 CSSP Incident Responder Certification.
Quantico, United states
On site
04-03-2026