Solutions³ LLC
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Solutions³ LLC
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Information Technology • Consulting
Manage cyber incident responses for government clients, perform investigations, develop mitigation plans, and assist in service restoration.
Information Technology • Consulting
The Technical Writer & Editor III will create and edit cybersecurity documents, work with teams to prepare technical deliverables, and manage documentation effectively.
Information Technology • Consulting
The Cybersecurity Vulnerability Analyst will analyze vulnerabilities, assess risks, coordinate cybersecurity operations, and contribute to incident management efforts in federal cybersecurity.
Information Technology • Consulting
The Lab Manager III will oversee incident response investigations, develop mitigation strategies, manage lab procedures, and provide technical support for users across multiple systems.
Information Technology • Consulting
The Cloud Engineer will design and implement secure cloud infrastructure using Red Hat technologies, automate tasks, and collaborate on security compliance.
Information Technology • Consulting
The Incident Manager II analyzes cyber threats, supports vulnerability management, and improves threat intelligence capabilities while coordinating across agencies.
Information Technology • Consulting
As an Incident Manager II, you will analyze and respond to cyber threats, enhance vulnerability management efforts, and produce intelligence reports.
Information Technology • Consulting
The Incident Manager II will analyze cyber threats, provide intelligence support, recommend countermeasures, and enhance vulnerability management capabilities.
Information Technology • Consulting
Manage a lab environment, perform systems administration, implement cybersecurity solutions, and support technology deployment while ensuring system security and performance.
Information Technology • Consulting
The Incident Manager III will analyze and respond to cyber threats, improving vulnerability management capabilities and supporting intelligence analysis.
Information Technology • Consulting
The Incident Manager I role involves responding to cyber incidents, analyzing incident data, and coordinating incident management efforts to restore services for government agencies.
Information Technology • Consulting
The Incident Manager III will manage cyber threats, gather intelligence, collaborate with stakeholders, and enhance vulnerability management capabilities.
Information Technology • Consulting
The Incident Manager III will analyze and respond to cyber threats, support vulnerability management, produce reports, and collaborate across teams.
Information Technology • Consulting
The Incident Manager II will analyze cyber threats, support vulnerability management efforts, and collaborate with stakeholders to counter emerging threats. Responsibilities include gathering intelligence, producing reports, and identifying intelligence gaps.
Information Technology • Consulting
Conducts network investigations, coordinates incident response, analyzes anomalous activities, provides recommendations, and assists with real-time incident handling. Requires strong knowledge of cybersecurity policies and network protocols.
Information Technology • Consulting
Analyze network traffic to identify threats, validate alerts, document incidents, perform cyber defense trend analysis, and respond to attacks.
Information Technology • Consulting
The role involves assisting in incident response investigations, conducting network analysis, and providing recommendations for network security improvements.
Information Technology • Consulting
The Incident Manager II will analyze cyber threats, support vulnerability management, and enhance threat intelligence capabilities to improve the organization's cybersecurity efforts.
Information Technology • Consulting
The Lab Manager III will design, implement, and maintain SharePoint capabilities, provide ongoing technical support, and manage project components to support cybersecurity efforts.
Information Technology • Consulting
Manage cyber threats through intelligence analysis, support vulnerability management, collaborate with stakeholders, and improve capabilities with training and research.






