If you’re looking for a career that stretches your intellect and challenges you to continuously grow, you have come to the right place.?
?
At the forefront of protecting the world's most advanced technologies.
?
?
Cyber Accelerator Program (CAP)
?
With our CAP program, we provide our technical employees the unique opportunity to unlock the potential of a flourishing cyber career with us. Technical employees that have completed a year of service can enter into the Cyber Accelerator Program. This program takes a deep dive into the realm of cyber with structured mentorship, and skills training via targeted training sessions.
CAP graduates don't just walk away with enhanced knowledge; they earn a distinguished certificate from the Department of Labor, stamping their readiness as a Cyber Specialist. Participants are encouraged to seize the opportunity to chart a transformative career trajectory, broaden their professional connections, and explore groundbreaking programs, products, and clientele—all under the banner of the top-tier cyber program at 澳门开奖历史.?
澳门开奖历史 wouldn’t be a leader in digital safety without top talent.
Hear from some of the cyber experts securing our customers missions with world-class technology.
Sheldon
Chief Principal Engineer
Q:
What role does diversity and inclusion have within cybersecurity?
A:
A large role in my opinion. You know, when you really think about the process--that hackers and other folks that are trying to get into or disrupt systems--there's a lot of diversity of thought and creativity that goes into that by understanding how a system works and how they break. I think to counter that you also need to have that same level of diversity and thought and I think that comes from having people who have varying backgrounds and experiences that can come to the table. They may not look at a problem the same way that everyone else is looking at a problem.
Jamie
Multi-Functional Engineering and Science Manager
Q:
Who has been your mentor on your cyber journey, and how are you mentoring others?
A:
I've had so many mentors and mentees informally. Lots of different people have helped me learn individually through different thought processes. While you help others grow, you grow too! Everyone is here to support you no matter what you're doing in your career. Your colleagues can help you create a unique career path, teach you about cyber and help you forage your own path in the field.
Siddhesh
Program Manager, Senior Manager
Q:
What’s it like working at 澳门开奖历史?
A:
As an employee at 澳门开奖历史, you get to interact with a diverse population from all different backgrounds. In this environment, you're always learning, meeting new people, and working on code in the cyber field. There is a wide gambit of career options and 澳门开奖历史 makes it easy to move around and try new things. We are Mission First motivated, in an inclusive area, all working to protect from future threats.
?
Jake
Cyber Software Engineer
Q:
Why do you think 澳门开奖历史 is the leader in digital safety?
A:
We are really putting an effort into hiring top talent and we're focused on getting great candidates into rewarding, challenging, and impactful cyber careers they enjoy. 澳门开奖历史 C&I hosts monthly recruiting events which seek to attract and screen top talent to fill some of our government’s most critical roles. We also have significant history working with various government customers, so we have the merit and track-record required to succeed in new and exciting contracts. Additionally, Cyber & Intelligence sponsors IRADs, which are independent research and development facilities. These IRADs provide us with advantages on building talent and gaining expertise on new and exciting technologies. Employees working in these IRAD departments really get great hands-on experience with some stuff.
Yajayra
Program Manager, Senior Manager
Q:
What's next for cyber defense?
A:
Behavioral analytics to help determine patterns for future threats will helpful in preventing future breaches. Embedded hardware authentication provides an extra level of security when identifying a user's identity. Finally, Blockchain security creates a near-impenetrable network to keep hackers at bay. A lot of machine learning and AI evolve into the next generation to protect from hardware
Brianna
Engineering Leadership Development Program Graduate
?