
Gray Tier Technologies, LLC
Jobs at Similar Companies
Jobs at Gray Tier Technologies, LLC
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Security • Software • Cybersecurity
The Splunk Architect/Engineer SME will enhance Splunk architecture, maintain infrastructure, onboard new data, and support security enablement for the IRS.
Security • Software • Cybersecurity
Support cybersecurity incident response initiatives, conduct network investigations, assess security vulnerabilities, analyze anomalous activities, and develop mitigation plans.
Security • Software • Cybersecurity
The Senior Windows Engineer will support Defense customers by managing and troubleshooting Windows servers, applying security patches, and resolving user issues.
Security • Software • Cybersecurity
Support and administer the DevOps pipeline, AWS integration, automate microservice deployments, and utilize Infrastructure as Code principles with various tools and languages.
Security • Software • Cybersecurity
The Senior SOC/Cyber Network Defense Analyst supports DHS in identifying, analyzing, and responding to cyber threats using advanced cybersecurity techniques and tools.
Security • Software • Cybersecurity
Looking for a Linux Engineer to support Defense customers, requiring Secret clearance, experience with Red Hat Linux, LVM, and SELinux.
Security • Software • Cybersecurity
The Information Assurance Analyst provides cybersecurity expertise, risk management, and compliance support, while mentoring team members and developing solutions for complex problems.
Security • Software • Cybersecurity
The Cyber Incident Manager will oversee incident response for cyber threats, correlate data, assess incidents, and support critical customers for breach mitigation.
Security • Software • Cybersecurity
As a Cyber Threat Hunter SME, you will investigate cyber incidents, perform event correlation, analyze network traffic, and provide technical assistance in both remote and onsite settings.
Security • Software • Cybersecurity
The Computer Exploitation Red Team Operator tests, configures, and maintains military operating systems, working with experts to improve military readiness.
Security • Software • Cybersecurity
Join Gray Tier Technologies as a Mid-Level Elastic Engineer to develop and support scalable search and analytics solutions using Elastic Stack. Responsibilities include designing dashboards, optimizing performance, and maintaining documentation.
Security • Software • Cybersecurity
Seeking a Senior Splunk Engineer with Cloud experience for a Cybersecurity task. Responsibilities include managing Splunk installations, onboarding data, and providing operational support.
Security • Software • Cybersecurity
The Oracle Database Administrator will manage databases, oversee deployments, ensure data migration, and improve identity management in a federal environment.
Security • Software • Cybersecurity
The Systems Engineer will oversee cloud environment expansion and implementation, coordinate technical aspects, and support on-premises and cloud infrastructures.
Security • Software • Cybersecurity
The Senior Cybersecurity Analyst plans and implements measures to secure information systems, manages risks and assessments, and ensures compliance with RMF standards.
Security • Software • Cybersecurity
The Cybersecurity Engineer will ensure compliance, perform vulnerability assessments, and harden system security focusing on network C2C implementation.
Security • Software • Cybersecurity
The Network Forensics SME coordinates incident response, analyzes network threats, crafts security guidelines, and provides advanced technical assistance to DHS HIRT.
Security • Software • Cybersecurity
The Senior Forensics Analyst conducts investigations into computer and network intrusions, providing forensic support and conducting vulnerability assessments.
Security • Software • Cybersecurity
The Configuration Manager will provide configuration management support, develop procedures, maintain a CMDB, and ensure best practices in a high-tempo environment.
Security • Software • Cybersecurity
Support cybersecurity operations by monitoring cyber threats, responding to incidents, and utilizing networking protocols and analysis tools. Requires relevant certifications.