Amentum
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Amentum
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Security • Cybersecurity
The Mid Analyst will manage case distribution to Junior Analysts, verify case products, track productivity metrics, and assist in the end-to-end processing of cases.
Security • Cybersecurity
The Office Appliance Repairer repairs office furniture and equipment, maintains inventory, drives to other sites for service, and performs various tasks as assigned.
Security • Cybersecurity
Provide CE&I design leadership for piped services during construction, supporting procurement, manufacture, installation, testing and commissioning. Manage design configuration, produce and review deliverables to standards, support supply chain queries and works acceptance testing, integrate CE&I via BIM, and ensure design aligns with safety case, validation and verification requirements.
Security • Cybersecurity
Produce all-source Identity Intelligence and TECHINT analysis and products, evaluate weapons and device data for attribution, identify technical signatures, fuse biometric and identity attributes to track individuals and networks, brief government and military clients, and deploy OCONUS on rotational assignments.
Security • Cybersecurity
Manage large, multidisciplinary engineering design projects for nuclear and federal clients in Oak Ridge. Plan, direct, and coordinate engineering activities to meet scope, schedule, budget, and compliance requirements, lead interdisciplinary teams, maintain client communication, and ensure required security and regulatory training and clearances.
Security • Cybersecurity
Lead and grow Amentum's advanced reactor capability by winning opportunities, building multidisciplinary teams, overseeing consultancy delivery, managing client relationships, and shaping strategy to scale advanced reactor programmes while ensuring safety, quality, and commercial performance.
Security • Cybersecurity
Produce IC-coordinated all-source counterintelligence analysis supporting DCSA Office of Entity Vetting. Research and analyze threats to DoD personnel, supply chains, and sensitive technologies, prepare briefings/reports, support decision-makers, and coordinate with stakeholders across DoD, IC, and law enforcement. Travel within CONUS/NCR as required.
Security • Cybersecurity
Plan and schedule preventive and corrective maintenance using a CMMS; build job plans, order and reserve parts, lead scheduling meetings, analyze work-order metrics, coordinate subcontractors, and support PM optimization and reporting for facility maintenance.
Security • Cybersecurity
The Senior Counterintelligence Evaluator conducts evaluations for DOE personnel, coordinates with Security Offices, and presents findings based on extensive counterintelligence investigations and assessments.
Security • Cybersecurity
The Mid MASINT Analyst will analyze measurement and signatures data to produce intelligence products and support USSPACECOM operations.
Security • Cybersecurity
The Logistics Specialist manages logistics functions, oversees compliance and reporting, and resolves operational challenges to support mission requirements.
Security • Cybersecurity
The Cybersecurity Manager oversees operations, compliance, and governance for cybersecurity, leading a team to protect information assets and manage risks.
Security • Cybersecurity
The MISO Planner will integrate PSYOP/MISO into operational planning, ensuring effective strategies are implemented at Combatant Commands with emphasis on mission analysis and collaboration with military and interagency operations.
Security • Cybersecurity
Support delivery of infrastructure and major construction projects by assisting with business cases, scope and change control, planning, monitoring, reporting, risk and stakeholder management, compliance, and project documentation. Coordinate with technical, commercial, and financial teams and contribute to continuous improvement and lessons learned.
Security • Cybersecurity
Provide systems safety and occupational health support for hazardous operations at a hypergolic storage facility. Perform PSM duties, risk assessments, audits, engineering calculations, procedure development, training, incident investigations, and interface with US Space Force and contractors to ensure regulatory compliance.
Security • Cybersecurity
The IT Program Manager leads large-scale IT service delivery projects, managing operations, compliance, and budget for a federal contract.
Security • Cybersecurity
The advisor will engage partner governments in counterterrorism efforts, focusing on training, organizational change, and effective policing strategies, particularly increasing women's participation in law enforcement.
Security • Cybersecurity
The Information Operations Planner advises and coordinates IO planning for U.S. combat operations, focusing on strategic communications, targeting methodologies, and assessment of information activities, requiring significant experience in military operations and clearance.
Security • Cybersecurity
Produce all-source Identity Intelligence analysis to support global missions, applying I2 tradecraft. Analyze unique human characteristics and fuse identity attributes to assess threats.
Security • Cybersecurity
As an Identity Intelligence Analyst, you'll produce all-source analysis and products focused on identifying and tracking individuals using various identity attributes and intelligence methodologies. You'll support global missions with your analytic skills, produce intelligence under oversight, and collaborate with military and government personnel while ensuring compliance with safety and quality standards.






