- Eliassen Group (Huntersville, NC)
- ** Linux Infrastructure Analyst IV ** **Huntersville, NC** **Type:** Contract **Category:** Engineer **Industry:** Energy **Reference ID:** JN ... Recommended Jobs **Description:** _Hybrid in Huntersville, NC_ We are seeking a skilled Linux Systems Administrator to join their dynamic team. This role is pivotal… more
- Nightwing (Sterling, VA)
- …The DHS's Hunt and Incident Response Team (HIRT) secures the nation's infrastructure . HIRT provides DHS's front-line response for cyber incidents and proactive ... on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Nightwing provides HIRT advanced technical… more
- Nightwing (Sterling, VA)
- …and Incident Response Team (HIRT) secures the Nation's cyber and communications infrastructure . HIRT provides DHS's front line response for cyber incidents and ... across physical locations - Proficiency with common operating systems (e,g, Linux /Unix, Windows) **Desired Skills:** - Proficiency with two or more of… more
- Nightwing (Sterling, VA)
- …and Incident Response Team (HIRT) secures the Nation's cyber and communications infrastructure . HIRT provides DHS's front line response for cyber incidents and ... approach to problem solving - Proficiency with common operating systems (e,g, Linux /Unix, Windows) Desired Skills: -Understanding of SaaS, PaaS and IaaS in the… more
- Chenega Corporation (Washington, DC)
- …entities. Additionally, OIMT manages the complex and varied Information Technology (IT) infrastructure for the Department of the Interior (DOI) Indian Affairs (IA) ... Technician III (https://chenegamios.catsone.com/careers/94145-Cyberstar/jobs/16590766-Desktop-Technician-III) Desktop Technician IV Desktop Technician V (https://chenegamios.catsone.com/careers/94145-Cyberstar/jobs/16590767-Desktop-Technician-V)… more
- SAIC (Washington, DC)
- …technical and administrative support to facilitate operations of critical MARS infrastructure and services. This effort focuses on providing a comprehensive set ... to: + Design, implement, and maintain cybersecurity measures to protect infrastructure from cyber threats. + Perform risk assessments, vulnerability assessments, and… more