. To promote these efforts, Leidos is looking for a Cybersecurity Architect / Engineer – Connected Intelligent Transportation..., technical personnel and third parties. Bachelor’s degree in Computer Science, Cybersecurity, Software Engineering, Information...
. To promote these efforts, Leidos is looking for a Cybersecurity Architect / Engineer – Connected Intelligent Transportation..., technical personnel and third parties. Bachelor’s degree in Computer Science, Cybersecurity, Software Engineering, Information...
supports the planning, coordination, and execution of major computer network initiatives. This is a 100% on-site position.... Research, evaluate, and recommend new computer network equipment and technologies. Develop and execute contingency plans...
supports the planning, coordination, and execution of major computer network initiatives. This is a 100% on-site position.... Research, evaluate, and recommend new computer network equipment and technologies. Develop and execute contingency plans...
Cloud Systems Architect Employment Type: Full-Time, Mid-level Department: Information Technology We are seeking... a Cloud Systems Architect with experience with cloud infrastructure to engineer and support public, private and hybrid clouds...
. Architect and implement serverless solutions using AWS Lambda, API Gateway, SQS, SNS, and other relevant services. Collaborate...-native applications by implementing best practices for identity and access management (IAM), network security, monitoring...
and implement strategies for containerizing Java applications using Docker and deploying them on AWS ECS/EKS. Architect...-native applications by implementing best practices for identity and access management (IAM), network security, monitoring...
strategies for containerizing Java applications using Docker and deploying them on AWS ECS/EKS. Architect and implement... by implementing best practices for identity and access management (IAM), network security, monitoring (CloudWatch, X-Ray), and logging...
strategies for containerizing Java applications using Docker and deploying them on AWS ECS/EKS. Architect and implement... by implementing best practices for identity and access management (IAM), network security, monitoring (CloudWatch, X-Ray), and logging...