, and deploy a bi-directional AWS API Gateway capable of sending and pulling data from various source systems over a secure network... an integrated internal and external facing API Gateway across two different agencies on the same classification network...
network and forensic capabilities, providing SOPs and other integrated documentation to support the success of field users... and test all equipment prior to deployment, work with the Sponsor personnel to identify requirements issues, analyze complex...
). You will support a 200+ FTE technical development program supporting the Sponsor’s IdAM/ICAM programs located on a secure network... requirements · Support the development of enterprise software solutions within the customer’s cloud environments · Create test...
). You will support a 200+ FTE technical development program supporting the Sponsor’s IdAM/ICAM programs located on a secure network... requirements · Support the development of enterprise software solutions within the customer’s cloud environments · Create test...
programs located on a secure network. As a Software Developer you will design, develop, and implement reliable, robust... within the customer’s cloud environments Create test scripts and perform unit testing Support Front end development using...
). You will support a 200+ FTE technical development program supporting the Sponsor’s IdAM/ICAM programs located on a secure network... requirements Support the development of enterprise software solutions within the customer’s cloud environments Create test...
response and computer network operations and exploitation (CNO/CNE). Key Responsibilities: Build and test operational... Justice Information Services Division's Headquarters. Founded in 2007 by an Engineer-by-trade, Fusion Technology dedicates...
Job Description: Responsibilities As a Reverse Engineer, you will research, develop, and execute specialized... network operations and exploitation (CNO/CNE). This role requires expertise in both offensive and defensive cyber security...
challenges posed by cyber threat actors. Key Responsibilities · Build, test, and refine operational prototypes · Analyze... derived from technical analysis · Research emerging technologies, techniques, and custom tools · Reverse engineer cyber...