Sort by
Refine Your Search
-
development. Experience with DSP/FPGA/Microcontroller/Microprocessor (such as Raspberry Pi) platforms for controller development. Network and develop collaborative R&D with other groups and divisions internally
-
risk analysis. Computational dosimetry using stylized, voxel and mesh-type anthropomorphic phantoms Compilation and evaluation of radionuclide decay data and the construction of environmental source
-
senior engineers and other IT and IA professionals to ensure the confidentiality, integrity, and availability of network services in compliance with government security regulations. As part of our team
-
, scalable computing and networking infrastructure, along with robust software management and deployment practices. This position resides in the Controls Integration Group within the Control Systems Section
-
the Information Systems Security Manager (ISSM) in the certification and accreditation (C&A) of systems/networks and implementation of cyber security requirements and procedures across the National Security
-
in accordance with environmental, safety, health, and quality requirements. The Technical Operations Manager has technical oversight responsibility for design/management of network, fiber and security
-
interface across multiple layers—from user-facing applications, system infrastructure and networking. You will apply systems engineering principles throughout the lifecycle (requirements, architecture
-
, software quality assurance, and cyber security. Additionally, you will ensure conformance to software requirements through effective software quality assurance activities, providing the basis for planning
-
unique opportunity to shape the future of scientific discovery by attracting and securing top-tier scientific and technical talent. As a trusted advisor to hiring managers and business leaders, you will
-
provide guidance on secure design approaches for OT systems and interfaces with enterprise IT and research networks Participate in penetration testing activities and cybersecurity exercises where