16 to 23 of 23
Sort by: Date | Relevance
include, but are not limited to Designs, develops, and implements cloud based solutions Designs cloud architecture and completes plans and specifications to develop solutions Collaborates with product managers and engineers to develop specifications for new cloud based products/services, applications, and solutions Drives the roll out of cloud management platforms, evaluat
Posted 29 days ago
include, but are not limited to Analyzes, maps, protects, or discovers vulnerabilities, intrusions, and threats in various computer network systems Conducts computer and/or network security, target development, and understands all aspects of computer/network security to include firewall administration, encryption technologies, and network protocols Reports events or incide
Posted 29 days ago
include, but are not limited to Applies ITIL experience in performance analysis and development of existing processes, procedures and methods to promote effective business and systems operations through standardization, improvement, simplification and discontinuance Provides ITIL subject matter expertise to develop, improve, integrate, measure, and report on operational pr
Posted 29 days ago
include, but are not limited to Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un packers, virtual machines, and network sniffers Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilit
Posted 29 days ago
include, but are not limited to Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Br
Posted 29 days ago
include, but are not limited to Utilize off ensive toolsets such as Metaspolit and Kali Linux to safely analyze and penetration test production networks and systems, documenting steps and procedures to produce usable vulnerability assessments for the customer Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentat
Posted 29 days ago
include, but are not limited to Provides leadership and management to the execution, definition, and strategy of enterprise applications technology projects Responsible for the end to end management of one or more medium to large sized, moderately to highly complex software development projects within the IT and operating departments Responsible for scoping, planning, exec
Posted 29 days ago
also include Preparing system documentation Automating processes with scripts Assisting other teams with OS, SQL and IIS troubleshooting Request and install CA signed certificates Maintains smooth operation of multi user computer systems, including coordination with network engineers. Monitors and manages system resources, including CPU usage, disk usage, and response time
Posted 1 month ago
Email this Job to Yourself or a Friend
Indicates required fields