16 to 30 of 3,930
Provide recommendations on navigating Agency regulations and security policies for the implementation of a C2E based tool Assist in the review and assessment of contractor deliverables Able to design and understand systems operating systems, patch, configure, and interface with other mission partner organizations Closely collaborate with ISSM staff, sys admins, and cyber
Posted Today
Access Control, Environmental, Systems, and Network Monitoring Maintains strict access control to the facility by challenging, and correctly logging all visitors that access the site, according to data center procedure; Demonstrates working knowledge of the university's enterprise computer systems and network infrastructure, sufficient enough to assist other functional gr
Posted Today
Development Activities Provide administrative support to the Sr. Director of Development; Coordinate with development staff and faculty on alumni engagement events & projects and college activities; Perform and coordinate department financial reporting & reconciliations; Act as the first point of contact for the development department and handle inquiries & questions; Ens
Posted Today
Develop, implement, and maintain security policies, procedures, and controls to protect information systems and data confidentiality, integrity, and availability; Conduct security risk assessments, identify vulnerabilities and risks, and develop mitigation strategies; Monitor compliance with security policies, standards, and regulations, and report any non compliance issu
Posted Today
Lead the design and implementation of network solutions, including LAN, WAN, VPN, and other network technologies; Collaborate with other teams and stakeholders to define technical requirements, develop network architectures, and identify risks and mitigation strategies; Develop detailed network design documentation, including diagrams, technical specifications, and test p
Posted Today
Perform long term and time sensitive in depth technical analysis of malicious code (malware), analyze the inner workings, and develop defensive countermeasures. Conduct malware analysis using static and dynamic methodologies (e.g. debuggers [Ollydbg], disassembler [IDA Pro], sandbox execution, etc) Produce malware reports to disseminate to the watch floor and enterprise P
Posted Today
The Dev Ops Config Engineer will Oversee implementation or adaptation of a CI/CD orchestration for the scrum team Drive Application Modernization onboarding efforts in moving applications from on prem to Cloud environments. Build, test, and deploy applications using modern CI workflow automations and PaaS/SaaS or containerized based deployment models Requirements Five plu
Posted Today
Unleash Your Potential At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customer's success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a dedication to do the right thing for our customers, our people, and our community. Our Mission, Vis
Posted Today
Work on one or more Agile teams and with customers to design user interfaces, automate workflows, design data models, maintain and/or improve databases, in relation to customer requirements. Design and develop analytic products and system content. Adhere to release management procedures. As needed, address customer inquiries and resolve issues; provide recommendations. De
Posted Today
Provide technical guidance during a significant project in designing, coding, testing, debugging, and maintaining program. Translating and interpreting functional requirements into test cases. Maintain test environment and install new software code as necessary as needed to support applications Develop and use automated test Perform regression testing, covering full suite
Posted Today
Oversee the collection and organization of information, and the preparation, editing, and revision of numerous documents required in support of program execution to include user manuals, training materials, installation guides, and other reports and deliverables. Work in concert with multiple technical professions including cybersecurity engineers, software developers, sy
Posted Today
Oversee the collection and organization of information, and the preparation, editing, and revision of numerous documents required in support of program execution to include user manuals, training materials, installation guides, and other reports and deliverables. Work in concert with multiple technical professions including cybersecurity engineers, software developers, sy
Posted Today
Provide program Cybersecurity leadership for Leidos' ABMS DI Network Management Activities. Help develop and maintain Risk Management Framework package for accreditation of the DI Network. Provide Cyber Support for the DI Network Mission, Test, Training, and Planning Systems associated with the implementations and maintenance of the fielded systems. Plan, conduct, and man
Posted Today
Manage the resolution of customer tickets according to established Service Level Requirements (SLRs) Properly troubleshoot and resolve user computer issues including hardware and software related concerns Assist other technicians in resolving complex issues Ensure customer requirements and guidelines are identified and completed within the timeline set by the customer Ass
Posted Today
Manage the resolution of customer tickets according to established Service Level Requirements (SLRs) Properly troubleshoot and resolve user computer issues including hardware and software related concerns Assist other technicians in resolving complex issues Ensure customer requirements and guidelines are identified and completed within the timeline set by the customer Ass
Posted Today
Email this Job to Yourself or a Friend
Indicates required fields