1 to 5 of 5
Sort by: Date | Relevance
The Computer Operator II (CO II) shall perform duties as assigned such as Imaging assets, Adding & Removing systems from the site OU in Active Directory, Issuing Bit locker Recovery Keys, and Utilization of the Remedy ITSM Ticket System to manage end user Tickets. The COII may also perform basic IT tasks such as setting up new systems, copying user data, troubleshooting basic issues and elevating
Posted 2 months ago
The Senior Storage Engineer is an IT specialist who minimizes costs by maximizing Storage Area Network (SAN) capacity. Design and management of SAN storage for an Enterprise Level organization consisting of a mixture of NetApp and EMC hardware and software. Researching and implementing IT systems that allow for elimination of unnecessary files thus maximizing space. Analyzing system performance an
Posted 3 months ago
Development of puppet manifests for providing configuration management of deployed Red Hat Enterprise Linux (RHEL) systems Research and development for solutions to upcoming requirements for system availability monitoring and statistical analysis software Development of migration strategy from current Postfix based email system to Zimbra Deployment of RHEL based systems to the field System perform
Posted 4 months ago
The Cyber Insider Threat Analyst shall conduct technical analyses of user activity data and alerts to identify indicators of insider threats. In addition to producing investigative leads, analysts are expected to review data pursuant to directed requests in support of civil, workplace, counterintelligence, or law enforcement inquiries/investigations. Analysts shall compile results of analyses into
Posted 10 months ago
Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations Thoroughly document all activities conducted on customer networks Create post assessment reporting that describes findings and their risks, exploitation procedures, and remediation's. Potentially assist customers with mitigations of findings Maintain current knowledge of security vulnerabilities, to
Posted 10 months ago
Email this Job to Yourself or a Friend
Indicates required fields