supports the planning, coordination, and execution of major computer network initiatives. This is a 100% on-site position.... Research, evaluate, and recommend new computer network equipment and technologies. Develop and execute contingency plans...
supports the planning, coordination, and execution of major computer network initiatives. This is a 100% on-site position.... Research, evaluate, and recommend new computer network equipment and technologies. Develop and execute contingency plans...
. To promote these efforts, Leidos is looking for a Cybersecurity Architect / Engineer – Connected Intelligent Transportation..., technical personnel and third parties. Bachelor’s degree in Computer Science, Cybersecurity, Software Engineering, Information...
. To promote these efforts, Leidos is looking for a Cybersecurity Architect / Engineer – Connected Intelligent Transportation..., technical personnel and third parties. Bachelor’s degree in Computer Science, Cybersecurity, Software Engineering, Information...
Cloud Systems Architect Employment Type: Full-Time, Mid-level Department: Information Technology We are seeking... a Cloud Systems Architect with experience with cloud infrastructure to engineer and support public, private and hybrid clouds...
Certified Solutions Architect) Formal Education Master’s degree or higher in Computer Science, Information Technology, Systems... An understanding of network protocols, firewall configurations, and Virtual Private Network (VPN) setup Experience with network...
. Architect and implement serverless solutions using AWS Lambda, API Gateway, SQS, SNS, and other relevant services. Collaborate...-native applications by implementing best practices for identity and access management (IAM), network security, monitoring...
and implement strategies for containerizing Java applications using Docker and deploying them on AWS ECS/EKS. Architect...-native applications by implementing best practices for identity and access management (IAM), network security, monitoring...
strategies for containerizing Java applications using Docker and deploying them on AWS ECS/EKS. Architect and implement... by implementing best practices for identity and access management (IAM), network security, monitoring (CloudWatch, X-Ray), and logging...
strategies for containerizing Java applications using Docker and deploying them on AWS ECS/EKS. Architect and implement... by implementing best practices for identity and access management (IAM), network security, monitoring (CloudWatch, X-Ray), and logging...