scheduled and unscheduled outages with DISA and other external agencies. Configure, operate, and maintain cryptographic... environments Proficiency with long-haul data and voice transmission technologies (fiber, copper, satellite) Experience...
. Implementation of DISA Security Technical Implementation Guides (STIGs) to ensure compliance of network components. Evaluate..., managing, and configuring complex network environments, including routing, switching, and wireless technologies. Reviewing...
scheduled and unscheduled outages with DISA and other external agencies. Configure, operate, and maintain cryptographic... environments Proficiency with long-haul data and voice transmission technologies (fiber, copper, satellite) Experience...
scheduled and unscheduled outages with DISA and other external agencies. Configure, operate, and maintain cryptographic... environments Proficiency with long-haul data and voice transmission technologies (fiber, copper, satellite) Experience...
experience in executing security hardening on Windows and RHEL operating systems, utilizing approved DISA STIGs and SRGs... experience implementing new and complex technologies at an enterprise level, including: Ensuring seamless integration...
is located in the DISA EIC/ENTERPRISE ENGINEERNG DIR - MODELING & SIM ANALYSIS DIV (ORG OE33). Summary This position is being... is in the Professional Work Category at the Senior Work Level within the CES Occupational Structure. It is located in the DISA...
Detection System (IDS), and emerging sensing technologies. This role will perform hands-on integration testing, regression.... Must be able to work closely with system engineers, developers, cybersecurity engineers, and DISA stakeholders to support...
analysis, and implement performance tuning. Patch and harden Linux systems to meet DISA STIG and RMF compliance requirements... skills. Desired Certifications such as: Familiarity with container technologies (Docker, Kubernetes, ECS/EKS). Experience...
applicable Security Technical Implementation Guide (STIG) and Security Requirements Guides (SRG) for technologies used..., Evaluate-STIG, eMASSter, DISA STIG Viewer, etc. Perform detailed analyses to validate established security requirements...
standards (SOC 2, ISO 27001, FedRAMP, DISA STIG) to ensure operational integrity and audit readiness. Support and lead audits... / Palo Alto networking and security technologies Monitoring tools such as SolarWinds, Splunk, or equivalent...