-
environments. Leverage cloud object storage (e.g., Amazon S3) for data staging and artifacts; implement parallel, secure data movement and lifecycle policies. Basic Qualifications: Ph.D. in Computer
-
Requisition Id 16058 Overview: The National Center for Computational Sciences (NCCS) at Oak Ridge National Lab (ORNL), which hosts several of the world’s most powerful computer systems, is seeking
-
we treat one another, work together, and measure success. Operations Handle daily operations, coordinating the delivery of IT support across cloud platform operations. Work with team members to craft
-
of the Information Technology Services Directorate at Oak Ridge National Laboratory (ORNL). Major Duties/Responsibilities Serve as the primary technical authority and program owner for the OT/ICS cybersecurity strategy, roadmap
-
candidate will bring a strong foundation in systems architecture, a working knowledge of cluster computing and scaling, and a passion for advancing the security of AI systems under real-world and simulated
-
., ML Ops for geospatial data, real-time analytics, cloud/HPC hybrid, edge geospatial compute, neuromorphic, quantum), pilot new capabilities, foster innovation partnerships (academia, industry, federal
-
organizations, regulatory agencies, peer groups, and the research community. Strong knowledge of a wide range of IT services relevant to research support, including network infrastructure, cloud computing
-
; oversee selection, configuration, ruggedization, and lifecycle support of commercial data-acquisition systems for laboratory and field use. Program development and execution Develop technical roadmaps and
-
workplace – in how we treat one another, work together, and measure success. Basic Qualifications: BS in Computer Science, Information Technology, or a related field; or equivalent experience in lieu of a
-
Requisition Id 15351 Overview: The Field Intelligence Operations Division invites candidates to apply to join the team as a Group Leader and technical expert for a newly established secure computing