- Huntington Ingalls Industries (Springfield, VA)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture , reverse engineering, software and hardware development uniquely enable us ... leading the next evolution of national defense - the data evolution - by accelerating a breadth of national...customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet… more
- The Metamorphosis Group (Chantilly, VA)
- …based project + Lead the implementation teams with creating physical and logical data models + Advise project, application and other relative teams to assure ... alignment with enterprise data strategy + Collaborate with business and users to...of IC technology projects for technical software/systems engineering & architecture + Experience leading technical software/systems development life-cycle in… more
- Capital One (Mclean, VA)
- …and drive well-educated decisions across product, engineering, design, and data science representatives + Deep focus on execution, follow-through, accountability, ... **Preferred Qualifications:** + 7+ years of experience designing and building data -intensive solutions using distributed computing + 3+ years of experience in… more
- Huntington Ingalls Industries (Roanoke, VA)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture , reverse engineering, software and hardware development uniquely enable us ... leading the next evolution of national defense - the data evolution - by accelerating a breadth of national...customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet… more
- CGI Technologies and Solutions, Inc. (Fairfax, VA)
- …this video you consent to Google/YouTube processing your data and using cookies -Learn more (xweb.asp?clid=21001&page=cookiespolicy#integrationofyoutube) . ... security policies, protocols and procedures to protect the organization's data and systems. * Monitor network traffic for security...* Work with IT teams to ensure secure network architecture and provide training to staff on security best… more
- Amazon (Arlington, VA)
- …can solve the world's toughest hiring problems. Key job responsibilities Use data science and machine learning to drive business insights, centralizing dashboards, ... online (A/B) experiments to evaluate proposed solutions based on in-depth data analyses; - Effectively communicate technical and non-technical ideas with teammates… more
- Amazon (Arlington, VA)
- …create value * Demonstrate in-depth technical capabilities, including legacy and data center technology, and professional knowledge * Establish technical credibility ... firm and their companies, leveraging your understanding of enterprise architecture , mergers and acquisitions, migration, cost optimization of IT infrastructure,… more
- Huntington Ingalls Industries (Springfield, VA)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture , reverse engineering, software and hardware development uniquely enable us ... leading the next evolution of national defense - the data evolution - by accelerating a breadth of national...customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet… more
- Huntington Ingalls Industries (Springfield, VA)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture , reverse engineering, software and hardware development uniquely enable us ... leading the next evolution of national defense - the data evolution - by accelerating a breadth of national...customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet… more
- CoStar Realty Information, Inc. (Arlington, VA)
- …and maintain secure reference architectures and playbooks for web/mobile, microservices, data pipelines, serverless, Kubernetes, and other common design patterns. + ... owners to embed security controls into application blueprints including authn/z, data protection, service-to-service trust, API gateway, service-mesh, safe use of… more