Lucayan Technology Solutions LLC
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Lucayan Technology Solutions LLC
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
16 Hours AgoSaved
Information Technology
The SIGINT Analyst will conduct complex analysis, develop intelligence reports, and provide insights for operational planning, requiring extensive SIGINT experience.
Information Technology
As a Level 2 Penetration Tester, you'll conduct vulnerability analysis and penetration testing, mentor junior testers, and provide recommendations to improve security posture.
Information Technology
The Cyber Defense Project Integrator will coordinate cybersecurity programs, draft reports on threats, manage project schedules, and ensure compliance with security documentation.
16 Hours AgoSaved
Information Technology
Manage identity and access management systems, oversee access controls, apply IT security measures, and contribute to compliance monitoring.
Information Technology
This Data Scientist role involves collecting and analyzing cybersecurity data, building machine learning models, creating visualizations, and supporting automation initiatives.
Information Technology
Lead advanced penetration tests, develop custom tools, identify vulnerabilities, advise on security policies, and mentor team members.
Information Technology
The Technical Lead oversees technical project execution, ensuring compliance with cybersecurity and IT standards for government programs while managing deliverables and mentoring teams.
Information Technology
Coordinate cyber defense initiatives, support integration of cybersecurity solutions, maintain project plans, and draft reports on cyber threats.
Information Technology
The IA Lead will provide guidance on Information Assurance, ensuring secure system design and compliance with relevant guidelines while leading end-to-end security engineering efforts.
Information Technology
Conduct penetration testing and vulnerability analysis to enhance security systems. Mentor junior testers and provide documentation of findings and recommendations.
Information Technology
The role involves leading complex penetration tests, providing expert guidance, developing advanced methodologies, and advising on cybersecurity policies.
Information Technology
The Senior Targeting Analyst will conduct intelligence analysis and targeting functions, support defense operations, and shape targeting strategies for mission outcomes.
Information Technology
The Training Systems Logistics Support Specialist manages logistics, scheduling, and inventory for training systems, ensuring compliance with USMC policies.
Information Technology
The IA Lead will provide guidance on Information Assurance, oversee secure system design, and ensure compliance with relevant security guidelines.
Information Technology
The Penetration Tester will lead complex enterprise-level penetration tests, provide expert guidance to government officials, develop advanced exploitation methods, and mentor junior testers.
Information Technology
As a Data Scientist, you'll collect and analyze complex datasets, develop machine learning models, communicate insights, and collaborate with teams to solve challenges.
Information Technology
The Cyber Defense Project Integrator - Level II coordinates cybersecurity initiatives, maintains project plans, drafts reports, manages schedules, and ensures compliance across government systems.
Information Technology
Lead advanced data science initiatives, mentoring teams to deliver AI/ML solutions supporting national security. Oversee predictive modeling and data analytics efforts.
Information Technology
Lead advanced penetration tests, develop tools, identify vulnerabilities, advise management on security policies, and mentor junior testers.
16 Hours AgoSaved
Information Technology
Manage identity and access management systems to secure government networks, ensuring compliance with cybersecurity standards and implementing best practices.






