Pueo is known for bringing the best talent and unique tools to every opportunity. Pueo's Parliament (aka workforce...) is composed of professionals who are seeking the opportunity to work in a business with an organization that thrives on career...
This role is responsible for assisting PUEO Business Solutions ESITA III Program Management Office in the daily... as Project Manager for special projects for Cyber Security, including assisting in the development of strategies, business cases...
Pueo is known for bringing the best talent and unique tools to every opportunity. Pueo's Parliament (aka workforce...) is composed of professionals who are seeking the opportunity to work in a small business with a flat organization that thrives...
Pueo is known for bringing the best talent and unique tools to every opportunity. Pueo's Parliament (aka workforce...) is composed of professionals who are seeking the opportunity to work in a small business with a flat organization that thrives...
within multi-tiered architectures Experience with translating client's needs into ICAM business requirements and solutions...OVERVIEW: Our customers require assistance in establishing robust enterprise-wide solutions for Identity and Access...
and tools Develop processes to evaluate and improve all operating systems, hardware, software, and firmware solutions Work... solutions to complex technical issues Provide follow-up reports (technical findings, feedback, resolution steps taken) for root...
GENERAL DUTIES: The candidate will provide technical support and troubleshooting for hardware and software issues across the organization. The candidate will install, configure, and maintain desktop and laptop computers, software applica...
This role is responsible for leading evaluations and ensuring the effectiveness of security controls for classified information systems and Platform Information Technology (PIT) in accordance with the Risk Management Framework (RMF). Assign...
GENERAL DUTIES: Correlating incident data to identify specific trends in reported incidents Recommending defense in depth principles and practices (i.e. Defense in Multiple Places, layered defenses, security robustness, etc.) Performing...