- Chenega Corporation (Fort Carson, CO)
- …TACLANE operating platforms. + Monitor and maintain operational capability and security standards on network management systems, including Tivoli Netcool, Info ... Architecture Center, Cisco Identity Services Engine, Juniper JUNOS Space, Cisco Security Manager, Cisco Wireless LAN Controllers, and other related NMS operating… more
- TestPros (Sterling, VA)
- …include Program Management, Program Oversight, Process Audit, Intelligence Analysis, Cyber Security , NIST SP 800-171 Assessment and Compliance, ATO Support, Computer ... Independent Verification and Validation (IV&V), Quality Assurance (QA), Compliance, and Research and Development (R&D) services. TestPros is an Equal Opportunity… more
- SMX (Washington, DC)
- …with design and implementation, virtualization, operating systems, storage, networking, security , and have technical cloud expertise. Services performed include, but ... management analysis processes, statistical methods, and advanced technical and analytical research techniques to determine cloud solutions based on client cloud… more
- CACI International (Sterling, VA)
- …license plate reading technologies, data analytics, IoT, and other border security technologies. Basic responsibilities include: + Research , design, and ... Development and hardware integration for the Department of Homeland Security (DHS). As a member of the ITI2.1 Team,...RDBMS (version 12c or higher) running on Linux and Windows Server environments This position is contingent on funding… more
- TekSynap (Fort Shafter, HI)
- …+ Management and apply DoD STIGs and IAVAs to ensure compliance with relevant security and NSA CSfC requirements. + Be able to develop and modify system scripts. ... CSfC solutions + Familiarity with Certificate Authority configuration (ISC CertAgent/MS Windows Server/Red Hat Certificate systems) + Preparing test reports and… more
- TD Bank (Mount Laurel, NJ)
- …with a focus on efficiency, reliability, scalability, and security ; includes planning, evaluating, recommending, designing, operationalizing, and supporting ... processes, procedures, tools and other relevant technology areas (eg Architecture, Infrastructure, Security etc.) from a design / support / solutions perspective +… more
- Applied Research Solutions (Dayton, OH)
- …for the best customer experience possible. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated ... using DoD (US Department of Defense) standard vulnerability tools such as Nessus Security Center. + Audit all Virtual Machines in the environment are reporting… more
- Cipher Tech Solutions (Vienna, VA)
- …maintaining strong proficiency in software development, reverse engineering, and vulnerability research . You will apply your foundational knowledge of RE, VR, and ... proficiency in reverse engineering with an aptitude for performing vulnerability research . + Must be possess strong verbal/written communications skills that enable… more
- Tyto Athene (Washington, DC)
- …to support threat monitoring, detection, event analysis, and incident reporting. The Security Operations Center is a 24/7 environment. You will be responsible for ... analysis of inbound and outbound internet traffic, suspicious e-mail messages, and cloud security logs. You will also be responsible for the generation of client… more
- Amentum (Honolulu County, HI)
- …+ Perform network modeling, analysis, and planning. + Design network and computer security measures, and research and recommend network and data communications ... interfaces to ensure effective integration and optimal network performance. + Research , design, test, and evaluate new technologies and solutions. Maintain an… more