collateral in addressing the customers’ viewpoints and complex requirements. What we are looking for Enterprise networks (IP Layer 1-7) Enterprise network security and boundaryprotection Service provider networks (e.g DWDN, SDH, OTN) ICT vendor technologies, solutions, and products (e.g Cisco, Juniper, Pal-alto, F5, Nokia). Industry more »
analysis and systems engineering methodologies in support of requirements management and architecture development. Computer, Network and Cloud Security architectures and controls, System Hardening, Secure BoundaryProtection architectures and controls, Cryptographic controls (Data at Rest, Data in Transit, Public Key Infrastructure (PKI)), Security Monitoring and System Security Audit. National more »