311 security-"https:"-"https:"-"https:"-"https:"-"DFG-TRR" positions at Oak Ridge National Laboratory
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Requisition Id 15528 Overview: The Laboratory Protection Division is seeking a qualified Security Network Engineer. In this role, you'll ensure the stability, performance, and secure operation of
-
network, application, and/or security architecture and design. Familiarity with common protocols such as: DNS, DHCP, LDAP, SNMP, SMTP, HTTP, SSL. Special Requirement: This position requires the ability
-
tools such as Puppet or Ansible. Experience in network, application, and/or security architecture and design. Familiarity with common protocols such as: DNS, DHCP, LDAP, SNMP, SMTP, HTTP, SSL. Special
-
sciences, national security, and energy technologies, ORNL delivers the scientific discoveries and technical breakthroughs essential to fulfilling the DOE's mission through operational excellence. The ORNL
-
file. Oversee subcontractor adherence to the ORNL Integrated Safety Management requirements. Oversee subcontractor work practices for compliance with the health and safety elements of the technical
-
choice for employment. These principles are essential for supporting our broader mission to drive scientific breakthroughs and translate them into solutions for energy, environmental, and security
-
infrastructure and isotope production capabilities essential to national security and medical advancement. We are seeking a Nuclear Quality Representative to support the Radioisotope Processing Facility (RPF
-
and applied research to deliver transformative solutions to compelling problems in energy and security. Our diverse capabilities span a broad spectrum of scientific and engineering disciplines
-
solutions to compelling problems in energy and security. We are seeking a Postdoctoral Research Associate who will support the Signals Collections and Analysis Group in the Nuclear Nonproliferation Division
-
, queue statistics, and resource usage to inform planning and continuous improvement. Security and Compliance: Apply basic cyber-security principles (e.g., SSH key hygiene, least privilege, firewall rules