- ISYS Technologies (Schriever, LA)
- …to the Federal Government. Whether the focus is on space exploration, national security , cyber security , or cutting-edge engineering applications, I2X is ... etc. Qualifications + 7 years of technical experience in cyber -defense or cyber security related...Agile frameworks for software development + Linux operating systems ( Red Hat, Kali, etc.) + Windows operating systems +… more
- Gilead Sciences, Inc. (Foster City, CA)
- …should have skills that include: + **Domain Expertise:** Expert level knowledge of Cyber Security Engineering capability areas, including Endpoint Security ; ... will report directly to the Executive Director IT - Head of Security Architecture, Engineering, and Delivery...Rights Management, and PKI. + Strong understanding of NIST cyber security framework, and MITRE attack matrix… more
- Pennsylvania State University (Reston, VA)
- …members to apply. You will: + Research cutting edge techniques and technologies for cyber security + Leverage expertise in cyberspace operations to develop novel ... needs and investigate solutions to emerging requirements. + Assist the Offensive Security Department Head in maintaining relationships with sponsors through… more
- ISYS Technologies (Boulder, CO)
- …to the Federal Government. Whether the focus is on space exploration, national security , cyber security , or cutting-edge engineering applications, I2X is ... start, must be SCI eligible (preferred) + Adept with Red Hat Linux + Familiarity with Microsoft Windows +...admin with cyber knowlege in Splunk / cyber security suite on a development program… more
- ISYS Technologies (OH)
- …to the Federal Government. Whether the focus is on space exploration, national security , cyber security , or cutting-edge engineering applications, I2X is ... and maintain an enterprise services environment consisting of Windows servers, Red Hat Enterprise Linux servers, and network appliances.* Assist mission partners… more
- ISYS Technologies (Offutt AFB, NE)
- …to the Federal Government. Whether the focus is on space exploration, national security , cyber security , or cutting-edge engineering applications, I2X is ... Intelligence Community emulations including identifying adversary courses of action; red lines and thresholds; employment tactics, techniques, and procedures; and… more