they may apply to hardware/embedded systems. Hands-on experience with hardware penetration testing techniques, including soldering, probing chips, removing, and reworking components, and hardware debugging. Knowledge of Linux, Unix, QNX and/or Windows Operating Systems. Knowledge of Application and Network Protocols and design. Adept in reverse engineering, firmware analysis, and exploitation techniques. Strong understanding of embedded systems More ❯
Navy training documents and material Employs Instructional Design practices to design curriculum to support operations and maintenance training Experience with Common Weapon Launcher, AN/BYG-1 Familiarity with Linux/Unix systems Ability to handle multiple projects and work well under pressure Previous Navy experience is a plus Proven conflict management skills Strong leadership skills consistent with a team More ❯
degree (or equivalent) in Computer Science or a related field; relevant practical experience will also be considered Proficiency with programming languages like Go, Bash, Python 5+ years' experience with Linux system administration Experience with virtualization and orchestration technologies like Kubernetes and Docker Swarm Experience with system management tools like Terraform, Chef, Puppet or Ansible Experience with hybrid cloud environments spanning More ❯
NAC. Familiarity with cloud platforms: AWS, GCP, Azure, and Microsoft Office 365. Knowledge of information security standards including ISO 27001, PCI-DSS, GDPR. Strong grasp of IT domains including Linux, Windows, networking, containers, IAM, and monitoring. Understanding of ISO27001, ISO27005, NIST security controls, WAF, and network segmentation. Desirable Extras: Experience leading peer reviews and collaborating with cloud solution architects. Ability More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯
security monitoring and response capabilities. Demonstrate a strong security engineering and architecture background to best understand how to employ the most effective and efficient security monitoring. Strong fundamentals of Linux, MacOS, and Windows operating system internals. Demonstrate effective communication of security issues to management and others. Maintain detection use case and SIEM configuration guidelines and standards for security. Proficiency creating More ❯