Facilitate the exchange of information, techniques, and best practices for promoting software and hardware assurance as part of the DoD systems engineering and system security engineering ( SSE ) processes.
The candidate will be instrumental in completing efforts at all instances of the product development life cycle to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
The successful candidate must have a proven experience with Linux and UNIX and will be able to provide examples of how he or she has used automation to create efficiencies and integrate with APIs to connect tools and enhance functionality.
Performs a variety of forensic and electronic discovery services, including digital evidence preservation, forensic analysis, data recovery, tape recovery, electronic mail extraction, and database examination.
The Database ISSO is responsible to the System Owner (SO) and Information Systems Security Manager (ISSM) or the Chief Security Officer (CSO) for ensuring that an appropriate operational security posture is maintained for an assigned Information System (IS) which will have a significant Oracle Database component.
This position provides strategic and tactical design and support for a complex and large (600+ WAN sites) network infrastructure. Responsible for the successful daily operations and maintenance of the networks in the data center, stores and corporate environments.
Provide full cycle support of system engineering, system administration, testing, and integration of SIGINT systems. Provide Tier 2/3 engineering support. Test and validate bug fixes, provide problem resolution and work with software developer to address issues.
As a Network Applications Engineer you will be responsible for customer support and consulting via telephone, email and in person, software verification testing, sales support, training and technical writing initiatives for Network Systems products.
You'll be part of a world-class team in a fast-paced environment that has the entrepreneurial feel of a start-up. This is an opportunity to operate and engineer systems on a massive scale, and to gain top-notch experience in cloud computing.
The Information Systems Security Engineer shall perform; or review; technical security assessments of computing environments to identify points of vulnerability; non-compliance with established Information Assurance (lA) standards and regulations; and recommend mitigation strategies.
Perform research, design, analysis, hands-on prototyping, testing, experimentation, and/or modelling and simulation to address complex questions regarding network design, security, and performance that are faced by a variety of company's customers.