You will work collaboratively with Blue Team, Red Team, and other Cybersecurity professionals on overall cyber readiness defense and system accreditation efforts. Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews.. Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc. Risk Management Framework (RMF), and the implementation of Cybersecurity and IA boundary defense techniques and various Ienabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS)
Cyber Operations Specialist Now Hiring Full and Part Time Positions You will gain critical skills in conducting both offensive and defensive cyberspace operations to protect networks and systems against cyber threats.. This role involves tasks such as detecting and countering cyber intrusions, performing vulnerability assessments, and implementing security measures to safeguard critical data.. Requirements: Attend a 46-week paid training program to gain skills and certifications in networking knowledge, cybersecurity fundamentals, system administration, incident response, cyber operations, cyber intelligence, programming, and scripting.. Additional Career Opportunities: Upon successful completion of first term contract, you are guaranteed up to 5 interviews with your choice of 1,200 industry leading organizations including COX Communication, Comcast, and Amazon.. Similar Career Fields Include: Information Security Analyst, Network Administrator, and Cybersecurity Consulting.
Entry Level Healthcare IT Analyst. Our Optimum CareerPath training program will equip you with the tools needed for your success as a Healthcare IT Analyst.. · The Healthcare IT Analyst will have primary responsibility for the design, build/configuration, testing, validation, documentation, and ongoing support for the Healthcare applications.. · Technical and functional analyst support of systems that may include Electronic Health Records platforms (Epic, Cerner), IT Project Management, ERP Systems (Workday, Oracle, PeopleSoft, UKG), ITSM applications (ServiceNow), data and analytics applications (Tableau, PowerBI), cloud deployments (GCP, Azure, AWS), and other digital platforms and services.. · US work authorization (This position is not open to any H1B /F1/ H-4 EAD OPT/STEM degrees)
Specialized training received and work experience gained in the course of service can lead to valuable credentialing and occupational opportunities in related fields in the civilian world, such as IT and network support, computer programming, web development, and information security.. A high-school diploma or equivalent is required to become an Enlisted Sailor and an Information Systems Technician.. Serving part-time as a Navy Reserve Sailor, your duties will be carried out during your scheduled drilling and training periods.. For current or former military Enlisted servicemembers, prior experience satisfies the initial Recruit Training requirement, so you will not need to go through Boot Camp again.. For those without prior military experience, you will need to meet the initial Recruit Training requirement by attending Boot Camp in Great Lakes, IL. This training course will prepare you for service in the Navy Reserve and count as your first Annual Training.
Serve as an external spokesperson and evangelist for the company's vision and associated technologies. Provide regular and efficient updates on assigned accounts to Sales and Sales Engineering management, consistently contributing to the broader team's technical mindshare. 7+ years of technical customer service experience in high-tech, indirect sales, and/or procurement environments with a record of success in driving customer adoption of technology.. Citrix Certified Expert Virtualization (CCE-V), Citrix Certified Professional - Virtualization, Citrix Virtual Apps and Desktops Service on Citrix Cloud Certified (CC-VAD-CC), Citrix Virtual Apps and Desktops Service Integration with Microsoft Azure Certified (CC-VAD-MA) or Virtual Apps and Desktops Service Integration with Amazon Web Services Certified (CC-VAD-AWS).. Microsoft Certified Azure Administrator, or Azure Solutions Architect
Key Responsibilities: Design, maintain and deploy SSIS packages that support data integration from NetSuite ERP and other systems to an operational data store and Data Warehouse.. Design, build and maintain data pipelines using Azure Data Factory, Databricks, Synapse Analytics, including ETL/ELT processes.. Use Azure DevOps best practices and tools, including CI/CD pipelines.. Experience in Azure Data Factory, Databricks, Synapse Data Warehouse and Power BI. Strong experience in SQL, ETL/ELT development, and data modeling (Star Schema, Snowflake Schema, etc. Experience with Azure DevOps. Certifications in Microsoft Azure Data Engineering or related disciplines.
Our Technician Support Specialists are instrumental in assisting TBS clients in resolving issues related to PCs, Macs, desktop applications, anti-virus software, Windows servers, smartphones, printers, and networking infrastructures.. Support Apple MacOS desktop technologies. Azure Active Directory Management Support, including Intune. -Prior MSP experience -Must be experienced with email support. -CompTIA Network+ and Security+ certifications
Experience working with OpenShift container platform and developing microservices. Experience with API documentation tools and formats, such as Swagger and Postman, to create API documentation that is comprehensive, accurate, and up to date. Experience with Java frameworks such as Spring and Spring Boot. Experience with source code management tools such as Azure DevOps, TFS, Jira or Git. Experience interacting with relational databases, such as MySQL, PostgreSQL, Oracle, or SQL Server
Participate in high-quality programme and curriculum development.. Support efforts to secure research grants as a co-researcher.. Achieve research outcome targets for the Senior Lecturer level.. Secured research grants as a Principal Investigator totaling RM50,000 or more.. Experience in higher education, teaching, curriculum development, coaching, mentoring, and high-quality presentation skills are desirable.
Use your cybersecurity background to become an FBI special agent!. The transition from technology to special agent is more than a career move—it’s an opportunity to upskill and become an expert in your field. At the FBI, you won’t just use your technical support experience; you’ll also build on it by working on cases that challenge you to think critically, adapt quickly, and collaborate with elite professionals tackling national security threats. Your ability to uncover crucial information, problem-solve, and apply your technical knowledge will help protect our nation from cyberattacks, terrorism, fraud, and evolving threats. With specialized training, real-world investigative experience, and access to cutting-edge technology, you’ll refine your troubleshooting and information security skills, enhance your expertise, and develop the foundation to become a leader in your field.