- Leidos (Pearl Harbor, HI)
- …integration, content development, and system architecture.Working with ** Elastic Stack ** (Elasticsearch, Logstash, Kibana), the individual would lead a ... andmetrics. PRIMARY RESPONSIBILITIES: + Monitorandoptimizethe performance of content within the Elastic Stack clusters to ensure high availability, reliability,… more
- Huntington Ingalls Industries (San Antonio, TX)
- …(tuning and optimization, Search and Indexing Operations, mapping, monitoring) understanding of Elastic Stack ( Elastic , Logstash, Beats, Kibana, Fluent, ... Our deep expertise in network architecture, software and hardware development, cybersecurity and the electromagnetic environment uniquely enables us to support… more
- Sealing Technologies (Columbia, MD)
- …+ Experience with defensive cyber operations tools and technologies (eg, Splunk, Elastic Stack ). + Experience with defensive cyber operations tactics, ... Requirements + Bachelor's or Master's degree in Computer Science, Cybersecurity , or a related field. + At least 8...At least 8 years of experience in software development, cybersecurity , or a related field, with a focus on… more
- Leidos (Odenton, MD)
- …technical teams on the program, establish logical and physical architectures, lead technical designs, determine priorities, scope additional work, and oversee the ... planning and development of capabilities, and will lead the resolution of complex technical challenges as they arise. The Solution Architect will support new… more
- Battelle Memorial Institute (Augusta, GA)
- …are contingent upon program award.** As **Network Security Analyst** you will lead a team to collect information, identify vulnerabilities, analyze risk to mission, ... for continuous learning and solid understanding of networks, protocols, and cybersecurity in the form of TCP/IP, packet structure, protocol characteristics,… more
- Battelle Memorial Institute (Chantilly, VA)
- …Battelle's Cyber team is seeking a **Network Security Analyst** to lead a team to collect information, identify vulnerabilities, analyze risk to ... for continuous learning and solid understanding of networks, protocols, and cybersecurity in the form of TCP/IP, packet structure, protocol characteristics,… more