). Related fields (e.g., Engineering, Mathematics) may be considered. Information Technology (IT) or Information Systems... (IS) degrees may also be considered Relevant experience must be in computer or information systems design/development...
, and create and install custom modules as needed Monitor existing applications/systems and infrastructure, including creating... monitoring for the applications, databases, network and Cloud Determine problems within SolarWinds systems, provide solutions...
vulnerability research and demonstrate their ability to follow best practices. The candidate must be extremely detail oriented when... and developers Labor Category Requirements: CNO Analyst/Programmer IV Minimum sixteen (16) years of experience in computer...
. You will primarily operate as a reverse engineer/vulnerability analyst, and may be required to develop prototypes showcasing... with vulnerability research and exploit development. Experience with assembly language (x86/64, ARM, MIPS, etc.). Development...
, sustainment, and management of communications systems. Perform ongoing system analyst activities for programs. Perform risk...Cyber Security Specialist Key Role: Join a team of communications and systems engineers supporting engineering...
Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat... is to provide technical expertise that assists in sustaining critical mission-related software and systems to a large government...
Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat... is to provide technical expertise that assists in sustaining critical mission-related software and systems to a large government...
Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat... is to provide technical expertise that assists in sustaining critical mission-related software and systems to a large government...
Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat... is to provide technical expertise that assists in sustaining critical mission-related software and systems to a large government...
Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat... is to provide technical expertise that assists in sustaining critical mission-related software and systems to a large government...