- Black Bear Technology Solutions, LLC (Adelphi, MD)
- …leading system administration activities. This position oversees the installation, configuration , maintenance, and integrity of computing systems and software. The ... to and resolve complex system administration issues. + Conduct quality control and performance management efforts for optimal system uptime. Required Qualifications:… more
- BigBear.ai (Columbia, MD)
- …best practices such as Scrum and Kanban methodologies Experience with version control systems (eg, Git) along with understanding of basic configuration ... management principles About BigBear.ai BigBear.ai is a leading provider of AI-powered decision intelligence solutions for national security, supply chain management, and digital identity. Customers and partners rely on Bigbear.ai's predictive analytics… more
- Northrop Grumman (Linthicum Heights, MD)
- …in an environment of continuous feedback. Ensures implementation of Software Configuration Management (SCM), code quality, and code coverage with automated testing ... with Linux and Ansible + Experience with Jira, Jenkins and Git/Version Control Software + Ability to express technical information clearly at different… more
- BigBear.ai (Columbia, MD)
- …events with supported decision points Establish and employ Data & Configuration Management capabilities Support Data Authentication group functions; and comply with ... sampling schemes to optimize the information/resource balance and to control testing uncertainties Select, coordinate, and calibrate Instrumentation, collection and… more
- Verint Systems, Inc. (Annapolis, MD)
- …Experience working in a remote team environment + Experience with Git version control + 3+ years' experience with VMware, Containerization + 5+ years' experience ... **Preferred Skills:** + Proficiency in Linux service development, system configuration , shell scripting + Proficiency of containerized technologies (Docker etc.)… more
- Amentum (Columbia, MD)
- …office. **Responsibilities:** + Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures ... of the following areas: Cybersecurity principles and technology, including access/ control , authorization, identification and authentication, PKI, network and enterprise… more