In this role, you will include installation and upgrade of security-related products, monitoring and tuning system performance, establishing user access controls, database security, defining new/modified database tables, and device configuration and planning.
In this role, the selected candidate will develop and uses scripting tools and automation to develop real-time monitoring, metrics, certification and quality assurance applications. Participate in the research, analysis, design, testing and implementation of complex computer network security/protection technologies for company information and network systems/applications.
To help you find the most relevant
jobs, we've come up with an approximate compensation for this
position. This is based on similar jobs with compensation
$70K to $116K -Tupelo, MS
In this role, the selected candidate will be responsible for defining, designing and developing cyber training related software. This work would include defining detailed cyber training modules based on customer requirements and leading their integration into the training platform.
The selected candidate will be responsible for service request fulfillment design, development and implementation lifecycle of standard service requests tied to the delivery of infrastructure services specific to the respective infrastructure technology platform.
The candidate must have a TS/SCI clearance and be familiar with presenting and developing curriculum for students within the Cyber Security Field. The instructor will also be responsible for monitoring students' progress, reviewing students' work and grading assessments.