- UIC Government Services and the Bowhead Family of Companies (Stumpy Point, NC)
- …or Air Traffic Controller (ATC), Weapons Director, a previous range control officer or equivalent test experience. + Military or civilian experience in the ... **Overview** Range Control Officer (PTR-2024-21971): Bowhead seeks to network with... Officer (PTR-2024-21971): Bowhead seeks to network with Range Control Officers for an upcoming/potential effort, toprovide oversight, direction,… more
- CDM Smith (Rodanthe, NC)
- …of construction inspection: 1) Roadway 2) Bridges 3) Drainage 4) Erosion & Control 5) Maintenance & Traffic . Candidate will work under limited supervision ... or direct supervision depending on the demonstrated knowledge for the assignment. Work will require the knowledge of materials, methods, and equipment used in highway construction; knowledge of geometry and basic mathematics; ability to read, interpret and… more
- Actalent (Charlotte, NC)
- …Land Use Planning + Permitting, Utility Coordination, and Geotechnical Understanding + Traffic Impact Analysis, Erosion & Sediment Control + Construction ... Management & Engineering Oversight + Business Development & Client Relationship Management + Billing, Budgeting, and Proposal Development Qualifications + Bachelor's degree in Civil Engineering (required) + Professional Engineer (PE) license strongly preferred… more
- General Dynamics Information Technology (Morrisville, NC)
- …of the adversary activity and movement within USPS environment + Analyze network traffic to identify command and control (C2) communications + Analyze ... attachments and URLs for malicious code + Recommend detection and containment mechanisms for exploit and or intrusion related attempts + Work with law enforcement if needed for handoff of investigations + Manage email security using ProofPoint, monitor for… more
- CDM Smith (Raleigh, NC)
- …transportation infrastructure construction projects such as roadway, bridge, drainage, erosion & control , and maintenance and traffic field site locations. - ... Maintain relationships with clients and contractors to ensure construction activities are on schedule and meeting contract requirements. - Estimate manpower needs, schedule, and assign work to meet completion date deadlines set by client. - Supervise the work… more
- CDM Smith (Asheville, NC)
- …transportation infrastructure construction projects such as roadway, bridge, drainage, erosion & control , and maintenance and traffic field site locations. - ... Maintain relationships with clients and contractors to ensure construction activities are on schedule and meeting contract requirements. - Estimate manpower needs, schedule, and assign work to meet completion date deadlines set by client. - Supervise the work… more
- Nightwing (Morrisville, NC)
- …of Cybersecurity problems which may require mitigating controls + Analyze network traffic to identify exploit or intrusion related attempts + Recommend detection ... attempts + Provide subject matter expertise on network-based attacks, network traffic analysis, and intrusion methodologies + Escalate items which require further… more
- City of Durham (Durham, NC)
- …improvements identified in the Durham Bike+Walk Plan, and other transportation traffic , safety and roadway improvements funded through either federal, state, or ... reviews technical presentations, reports, land development applications, plats, agreements, traffic reports, engineering and construction drawings, contracts, plans (including… more
- General Dynamics Information Technology (Morrisville, NC)
- …at least some exposure to AI/ML projects + 2+ years' experience in network traffic analysis + Strong working knowledge of: + Boolean Logic + TCP/IP Fundamentals + ... Network Level Exploits + Threat Management + Knowledge of Control Frameworks and Risk Management techniques + Identification of Cybersecurity problems which may… more
- General Dynamics Information Technology (Morrisville, NC)
- …cloud resources based on real-time demand. Leverage AI algorithms to analyze network traffic and user behavior to detect anomalies and potential security threats. + ... algorithms to analyze massive volumes of data from various sources (network traffic , logs, user behavior) to identify anomalies and suspicious patterns indicative of… more