, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using network... systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis...
for network architecture. Conducts cost/benefit analysis and provides specific detailed information for hardware and software... environments Proven experience in virtual and physical Internet Protocol and Fiber Channel networks and routing protocols Proven...
, and enhances signal processing software (e.g., detectors, demodulators, protocol processors). Reviews and tests software components...) and Government Off-the-shelf (GOTS) in place of new development, and requirements analysis and synthesis from system level...
analysis, risk management, certification and awareness activities for various system and networking operations. Effectively..., NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web...
analysis and synthesis from system level to individual software components. Required Skills: Certified Kubernetes... administrator Container and container orchestration experience High-speed networking and network protocol experience (preferred...
analysis and synthesis from system level to individual software components. Required Experience: Experience... required to support container and container orchestration experience; high-speed networking and network protocol experience (preferred...
to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various... security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol...
to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various... security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol...
, protocol processors). Reviews and tests software components for adherence to the design requirements and documents test results... development, and requirements analysis and synthesis from system level to individual software components -Analyze user...
-protocol IP backbone and access networks 3+ years of experience in deploying, upgrading, and troubleshooting multivendor..., or security analysis tools Experience with operating, deploying, or administering Linux or Unix systems and VMWare CCNA, CCNP...
-protocol IP backbone and access networks 3+ years of experience in deploying, upgrading, and troubleshooting multivendor..., or security analysis tools Experience with operating, deploying, or administering Linux or Unix systems and VMWare CCNA, CCNP...
protocol stack, routing/switching protocols, stateful firewalls, and L3/L4 access controls (all three supported locations... in everything we do-from intelligence analysis, cyber operations and IT expertise to systems development, systems integration, and operations...
. Provides specifications and detailed schematics for network architecture. Conducts cost/benefit analysis and provides... and physical Internet Protocol and Fiber Channel networks and routing protocols Proven experience designing, optimizing...
, demodulators, protocol processors). Reviews and tests software components for adherence to the design requirements and documents...) in place of new development, and requirements analysis and synthesis from system level to individual software components...
directly with customers to understand their needs to develop protocol processing solutions that support analysts in target... tracking and analysis, and report writing. You’ll also help the client continue to modernize their software development...
directly with customers to understand their needs to develop protocol processing solutions that support analysts in target... tracking and analysis, and report writing. You’ll also help the client continue to modernize their software development...
directly with customers to understand their needs to develop protocol processing solutions that support analysts in target... tracking and analysis, and report writing. You’ll also help the client continue to modernize their software development...
collection and parsing; network & protocol analysis; tools development/analysis; vulnerability/intrusion detection; evaluation... Threat Assessment, Protocol Analysis, Vulnerability Analysis, Signals Analysis. Degree Requirements: A B.S./B...
systems, including planning, designing, evaluating, and configuring operating systems and protocol suites for virtualized... engineering and vulnerability analysis of diverse software problems. You’ll inform operational parameters for complex systems...
) and Digital Policy Management (DPM) Design, Coding, and Testing of new requirements Bug identification, root cause analysis... Policy Management and XACML Databases – SQL/Mongo LDAP protocol and directories Using REST, SOAP, XML, and JSON...