Interested in finding more jobs in Mc Lean, VA? Click Here to create a Climber profile today!
Trace Systems Work Values
Interested in finding out if you are the type of person this company is looking for? Create an account and take our patented DNA assessment now to see how you compare.
Daily Duties at Trace Systems:
Installed, documented, and configured Microsoft system infrastructure. To include DHCP, Active Directory 2003, DNS, ESXi (vSphere4), and Exchange 2003. Followed and enforced Army Information Assurance (IA) standards and practices guided by TNOSC. Maintained daily and weekly logs of progress.
What they like about Trace Systems:
You give high priority to hiring firms with prestige. Market reputation and prestige of a firm may be determined through on-line research, and conversations with individuals working in your target industry. Note that firms "in the public eye" receive a great deal more critical publicity and attention than those operating with more anonymity. So as you assess your employment opportunities, be sure to seek out the positive aspects of the firm's reputation in addition to noting negative publicity the company may have received.
Tags
Automation, IT Security, Web Application Assessment, Vulnerability Management, Active Directory, Network Security, ArcSight, Microsoft Servers, Linux, Backtrack, Red Seal, McAfee Vulnerability Manager, System installation and maintenance, Foundstone, Core Impact, CyberScope, WebInspect, Microsoft SQL Server, McAfee ePolicy Orchestrator, Policy Auditor, CIS Benchmark, STIGS, Top Secret Clearance, Virtualization, Security architecture, Systems integration., Security Analysis, Network Engineering, Process Improvement, Strategic Planning, Team Leadership and Motivation, Application Security, Vulnerability Assessment, Risk Assessment, Threat Analysis, Penetration Testing, Vmware, Esxi, Reverse Engineering
Information about Trace Systems
Company Rank: Not Available
Average length of employment : 0 years
Average salary of employees: $100,000
These are some of the questions we asked our climbers about their experiences with Trace Systems:
05| | ||
Were your performance expectations clearly communicated? | 0.0 |
|
Were you recognized for meeting or exceeding expectations? | 0.0 |
|
Did you feel like your personal contribution was important? | 0.0 |
|
Was your career path clearly outlined and discussed? | 0.0 |
03| | ||
I would recommend this as a place of employment. | 0.0 | |
I believe in the purpose of this organization. | 0.0 | |
I would work for this organization again. | 0.0 | |
I feel employees are fairly compensated. | 0.0 |
Climbers who worked at Trace Systems had these interests:
Books | |
---|---|
CISSP Certification |
Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by the International Information Systems Security Certification Consor |
Magazines | |
SC Magazine |
SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall |
Websites | |
InfoWorld http://www.infoworld.com |
InfoWorld is the leading technology resource for IT managers and decision makers to identify new products and strategies to modernize IT. |
TechRepublic http://www.techrepublic.com/ |
TechRepublic helps IT decision-makers identify technologies and strategies to empower workers and streamline business processes. The site delivers a unique blend of original content by IT professionals, peer-to-peer advice from the largest community of IT |
OWASP https://www.owasp.org/ |
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldw |
SANS http://www.sans.org/ |
SANS provides intensive, immersion training designed to help you and your staff master the practical steps necessary for defending systems and networks against the most dangerous threats - the ones being actively exploited. The courses are full of importa |
