As a Network Applications Engineer you will be responsible for customer support and consulting via telephone, email and in person, software verification testing, sales support, training and technical writing initiatives for Network Systems products.
Provide full cycle support of system engineering, system administration, testing, and integration of SIGINT systems. Provide Tier 2/3 engineering support. Test and validate bug fixes, provide problem resolution and work with software developer to address issues.
The candidate will be instrumental in completing efforts at all instances of the product development life cycle to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
Specific duties will vary by project but will generally involve performing some combination of research, design, analysis, hands-on prototyping, testing, experimentation, and/or modeling and simulation of communications networks on a wide variety of projects to solve our nations most complex problems.
Create, review and update ServiceNow tickets according to established Standard Operating Procedures (SOPs). Monitor the network via Monolith and other tools and take appropriate action based on alerts and severity levels.
In this role, the candidate will provide hands-on cyber security engineering, analysis, and systems integration crossing multiple areas including: cyber situational awareness (SA), firewalls, networking, and IDS/IPS.
In this role, you will performs incident investigative analysis support and compiles technical artifacts and evidential material using security content monitoring tools, intrusion detection tools, and security information & event management tools.
The Information Systems Security Engineer shall perform; or review; technical security assessments of computing environments to identify points of vulnerability; non-compliance with established Information Assurance (lA) standards and regulations; and recommend mitigation strategies.
In this role, the selected candidate will be responsible for conducting network security architecture reviews to determine the size, and placement of intrusion monitoring equipment during the customer onboarding process.