- Ensono (Richmond, VA)
- …problems. Secondary duties involve applying vendor software license keys, updating hardware configurations. Position reports to Manager , MF System Programming ... TSSRemote - United StatesJR011715 Position Summary The Mainframe System Programmer of Technical System Services primary duty is to provide expertise in solving… more
- Fairfax County Sheriff's Office (Fairfax, VA)
- …Independently composes original correspondence (eg, preparation of replies to non- technical requests) for the functional area under their own signature; ... & other software using advanced functions; Diagnoses and resolves hardware /software problems using substantive computer/software Personnel Researches and recommends… more
- Shuvel Digital (Dulles, VA)
- …US Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment ... years of directly relevant systems engineering experience such as allocation of hardware and software requirements, development of use cases and stories, Detailed… more
- Honeywell (Colonial Heights, VA)
- …The Principal Electrical Engineer reports directly to the Engineering and Technology Manager and is a key member of the Colonial Heights Maintenance Excellence ... contractor and repair work, etc. for electrical integrity. + Supports MOC program for changes required to reliability databases. + Support Maintenance Excellence… more
- Amazon (Manassas, VA)
- …troubleshooting, root cause analysis, and repair of electrical and mechanical equipment - Technical writing to support change management program - Monitor daily ... (PM) and troubleshooting, reporting to a site's Data Center Facility Manager (FM). They will maintain, operate, and troubleshoot mission-critical data center… more
- Amentum (Springfield, VA)
- …and Technology (NIST), Department of Defense (DOD), and NGA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRG). + Produce ... to identify and develop authorization boundary diagrams, architecture diagrams, and hardware and software inventories. + Analyze vulnerability scans of information… more