Technical Positions ARE Available

Join Our Team

If you are a competent IT technician or computer programmer who understands not only the fundamentals of common enterprise software and hardware but also non-standard systems, see if you meet the following requirements:

Literate in multiple forms and levels of encryption. Must be confident in the handling of encrypted data and be able to encrypt or improve the encryption of data within portable devices and large storage environments.

Used programs such as or similar to PeerBlock, ServicesRepair, Zoek, FRST64, Sophos Products, Avast Anti-Virus, Malwarebytes, CCleaner, Auslogics Registry Cleaner, Autoruns, Processes Explorer, MCShield, LockHunter, Gpg4win, GPA, Kleopatra, 7-Zip, Recuva, Avant Browser, VMWare, VirtualBox, Revo Uninstaller, VeraCrypt, SIFT, OpenVAS, Nessus, FTK Manager, Metasploit, Nexpose, BurpSuite Pro, Nmap, IDA Pro, GDB, Paros, OllyDbg, SiLK, Kali Linux, Steller Products, AlienVault OSSIM, BackBox, Firemon, Splunk, NTA Monitor, Wireshark, Apache Benchmark, Leviathan, Backtrack, Microsoft EMET, Openvas, Retina, DSniff, Aircrack, OCL-Hashcat, Netcat, Grep, Awk, Sed, janusNet Products, HTML Guardian, TDSSKiller, OSXCollector, Sleuth Kit, Lynis, Sandboxie, Little Snitch, Zen/NMap, EaseUS, Cuckoo Sandbox, PeStudio, acunetix, OmniPeek, and much, much more to be explored during interviews.

Familiar with Installation, Configuration, and Integration of current and active legacy Windows and Linux Server and Client operating systems. This also includes Apple Macintosh OS releases along with Juniper Software Products, IBM Software Products, Sophos Products, Cisco Systems Products, Tripwire Products.

Understand developer guidelines for the implementation and roll-out of Services and Features within Server-side operating systems. Adept in Endpoint Detection and Response solutions.

Can perform setup of routing hardware from stand-alone consumer electronics to enterprise Unit level in- series and rack builds. Able to correct integrated IoT inefficiencies.

Certification holding applicants are welcome for the following listed certs and also those not listed: ACIS, Asterisk, CCNP, CTP, SSVVP, CCIE, CCNP, JNCIE-ENT, Network+, WCNA, 175ACMT, BICSI Technician, Cisco CCT*, CompTIA A+, CompTIA Server+, CCE, CFCE, CHFI, GCFA, GCFE, CSFA, LPIC, MCSE, RHCE, Server+, VCP6-DCV, CAHIMS/, CPHIMS, CompTIA Healthcare IT Technician, CPHIT, HCISSP, RHIA*, CEH, CISM, CISSP, GSEC, Security+, CCIE Wireless, CCNA Wireless, CCNP Wireless, CWNA, CWTS, GIAC GAWN, JNCIS-WLAN, CompTIA Linux+, LPIC, Oracle Linux OCA, Oracle Linux OCP, RHCA, RHCE, RHCSA, LFCS, LFCE, AWS-CSA Professional, EMC Cloud Architect (EMCCA), CompTIA Cloud+, MCSE: Private Cloud, VMware VCP6 - Cloud*

Have the ability to spot inadequate cabling layouts and vulnerable hardware accessory exposure. Can visually identity suspicious hardware products such as internally integrated or externally inserted Key Logging devices.

Able to detect suspicious actions within the Data Center environment such as movement violations of personnel and materials or access to systems by unfamiliar means.

Experience with scanning for and removing Malware of many forms with automated means and manual reading of code to delete corrupted file paths, etc. Can perform Penetrating Testing. Competent in fundamentals of Code Review.

Have knowledge of active and past (but still present) Crimeware, Rootkits, Viruses, Worms, Spyware, Phising Scams, Spammers, Trojans, Riskware, Suspicious Packers, Malicious Tools, Adware, Bots, Bugs, Ransomware, Mobile-Centric Infections, DDoS Attacks, Keyloggers, Zero Day Attackers, Phising Scams, XSS, SQLi, App Vulnerabilities, Defacement, Hijackers, APTs, Lures, Deviant Hacktivism, Brute-Force Attacks, etc.

Capable of performing data recovery and carrying out forensic investigation of hard drives. Preferable familiarity with Guidance Software products.

Observed and interacted with Biometric Security and Data Systems, Surveillance Systems, Diagnostics Systems, etc. Able to uphold Biometric Identity Management protocols.

Cloud computing security research exposure. Having studied this growing sector of Information Technology. Proficient in deployment of Validation and Compliance services

Up-to-date with current industry trends and market data. Able to convey ideas and findings to others within the Cyber Security sector as well as IT-centric customer employees.

Proficient in updating BIOS, and Firmware. Familiarity with compliance regulations such as GDPR, ePrivacy, Right To Be Forgotten, PCI-DSS, HITECH, HIPAA, NIST, FERPA, FISMA, SOX, GLBA, ISO, FFIEC, OCC, OTS, NCUA, GLBA, etc.