Overview
On Site
USD 150,000.00 - 170,000.00 per year
Full Time
Skills
DoD
Computer Hardware
Computer Science
IPS
IDS
Linux+
Security Clearance
Law
LAN
WAN
Security+
SEC
Technical Support
Cisco Certifications
Cisco
Certified Ethical Hacker
Cyber Security
Information Security
Network Security
Linux
Unix
Shell Scripting
Bash
Command-line Interface
cron
RPM
Red Hat Linux
Debian Linux
LVM
EXT
XFS
NFS
SMB
Server Message Block
Internet
File Systems
RAID
Recovery
Disaster Recovery
High Availability
Load Balancing
Clustering
Virtualization
Kernel-based Virtual Machine
Virtual Machines
QEMU
Docker
Kubernetes
Ansible
Puppet
Progress Chef
Scripting
Python
Perl
Ruby
Nagios
Zabbix
Grafana
Security-Enhanced Linux
iptables
TCP
Secure Shell
SSL
TLS
PKI
Management
LDAP
Active Directory
Network Administration
Intellectual Property
IP
Subnetwork
Routing
Dragon NaturallySpeaking
DNS
DHCP
Virtual Private Network
Proxies
Web Servers
Apache HTTP Server
Nginx
Apache Tomcat
Database
Servers
MySQL
PostgreSQL
MongoDB
Redis
Backup
rsync
TAR
Data Compression
Performance Tuning
Optimization
Resource Management
CPU
Network
Debugging
Incident Management
Change Management
Configuration Management
Version Control
Git
Apache Subversion
Technical Writing
Systems Architecture
Infrastructure Architecture
Amazon Web Services
Microsoft Azure
Google Cloud
Google Cloud Platform
Cloud Computing
DevOps
Continuous Delivery
Continuous Integration and Development
Jenkins
GitLab
Continuous Integration
Vulnerability Scanning
Penetration Testing
Data Security
HIPAA
Health Insurance
Accountability
Sarbanes-Oxley
ITIL
IT Infrastructure
Project Management
Agile
Scrum
Kanban
Collaboration
Communication
Conflict Resolution
Problem Solving
Analytical Skill
Leadership
Mentorship
Instructional Design
Documentation
Reporting
KPI
SLA
Vendor Management
Budget
Cost Management
Return On Investment
Risk Management
Strategic Planning
Help Desk
Service Desk
Identity Management
Authentication
Authorization
Accounting
Auditing
Regulatory Compliance
Job Details
Piper Companies is looking for a Cyber Security Support Engineer to join a government contractor in Dayton, OH. This role requires the candidate to have an active Secret Clearance
Essential Duties of theCyber Security Support Engineer:
Qualifications of theCyber Security Support Engineer:
Compensation for theCyber Security Support Engineer:
This job opens for applications on 3/6/25. Applications for this job will be accepted for at least 30 days from the posting date
#LI-ONSITE
#LI-BM2
linux, network, sys admin, systems administrator, lan, local area network, wan, wide area network, sec+, security +, sec +, user support, ccna, network engineer, cisco, security, penetration testing, red team, blue team, vulnerability, certified ethical hacker, Cyber Security, Information Security, Network Security, Linux, Unix, Shell Scripting, Bash, Command Line Interface (CLI), Kernel, Systemd, Init, Daemons, Cron Jobs, Package Management, RPM (Red Hat Package Manager), DEB (Debian Package), YUM, APT, DNF, Software Repositories, LVM (Logical Volume Manager), Filesystem, EXT4, XFS, Btrfs, NFS (Network File System), SMB (Server Message Block), CIFS (Common Internet File System), RAID (Redundant Array of Independent Disks), Backup, Restore, Disaster Recovery, High Availability, Load Balancing, Clustering, Virtualization, KVM (Kernel-based Virtual Machine), QEMU, Docker, Containers, Kubernetes, OpenShift, Ansible, Puppet, Chef, SaltStack, Automation, Scripting, Python, Perl, Ruby, Monitoring, Nagios, Zabbix, Prometheus, Grafana, Logging, Syslog, Logrotate, Security, SELinux, AppArmor, Firewalld, Iptables, TCP Wrappers, SSH (Secure Shell), SSL/TLS, Certificates, PKI (Public Key Infrastructure), User Management, Group Management, LDAP (Lightweight Directory Access Protocol), Active Directory, PAM (Pluggable Authentication Modules), Authentication, Authorization, Accounting, Network Configuration, IP Addressing, Subnetting, Routing, DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), VPN (Virtual Private Network), Proxy Servers, Web Servers, Apache, Nginx, Tomcat, Database Servers, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, Backup Solutions, Rsync, Tar, Compression, Gzip, Bzip2, Xz, Performance Tuning, System Optimization, Resource Management, CPU, Memory, Disk I/O, Network I/O, Troubleshooting, Diagnostics, System Logs, Kernel Logs, Application Logs, Debugging, Error Handling, Incident Response, Change Management, Configuration Management, Version Control, Git, SVN (Subversion), Documentation, Technical Writing, System Architecture, Infrastructure Design, Cloud Computing, AWS (Amazon Web Services), Azure, Google Cloud Platform (Google Cloud Platform), Hybrid Cloud, Multi-Cloud, DevOps, CI/CD (Continuous Integration/Continuous Deployment), Jenkins, GitLab CI, Travis CI, Security Audits, Vulnerability Scanning, Penetration Testing, Compliance, GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), SOX (Sarbanes-Oxley Act), ITIL (Information Technology Infrastructure Library), Project Management, Agile, Scrum, Kanban, Team Collaboration, Communication Skills, Problem-Solving Skills, Analytical Skills, Leadership, Mentoring, Training, Documentation, Reporting, Metrics, KPIs (Key Performance Indicators), SLA (Service Level Agreement), Vendor Management, Budgeting, Cost Management, ROI (Return on Investment), Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices
Essential Duties of theCyber Security Support Engineer:
- Develop interface specifications for use within the enclave environments
- Confirm that enclave systems and network designs support the incorporation of DoD directed vulnerability solutions
- Maintain a schedule for upcoming software and hardware upgrades and follow procedures for regularly scheduled maintenance
- Confirm secure backup of systems and data through formally documented backup plan
Qualifications of theCyber Security Support Engineer:
- Bachelors degree in Computer Science or related field
- At least 5 years Linux and 3 years IPS, IDS experience required
- Sec + certification required
- Linux +, CASP and CEH certs highly preferred
- Red/Blue Pen testing experience required
- Active Secret clearance required
Compensation for theCyber Security Support Engineer:
- $150,000 - $170,000 (based on experience)
- Comprehensive benefit package; Cigna Medical, Cigna Dental, Vision, 401k w/ ADP, PTO, paid holidays, sick Leave as required by law
This job opens for applications on 3/6/25. Applications for this job will be accepted for at least 30 days from the posting date
#LI-ONSITE
#LI-BM2
linux, network, sys admin, systems administrator, lan, local area network, wan, wide area network, sec+, security +, sec +, user support, ccna, network engineer, cisco, security, penetration testing, red team, blue team, vulnerability, certified ethical hacker, Cyber Security, Information Security, Network Security, Linux, Unix, Shell Scripting, Bash, Command Line Interface (CLI), Kernel, Systemd, Init, Daemons, Cron Jobs, Package Management, RPM (Red Hat Package Manager), DEB (Debian Package), YUM, APT, DNF, Software Repositories, LVM (Logical Volume Manager), Filesystem, EXT4, XFS, Btrfs, NFS (Network File System), SMB (Server Message Block), CIFS (Common Internet File System), RAID (Redundant Array of Independent Disks), Backup, Restore, Disaster Recovery, High Availability, Load Balancing, Clustering, Virtualization, KVM (Kernel-based Virtual Machine), QEMU, Docker, Containers, Kubernetes, OpenShift, Ansible, Puppet, Chef, SaltStack, Automation, Scripting, Python, Perl, Ruby, Monitoring, Nagios, Zabbix, Prometheus, Grafana, Logging, Syslog, Logrotate, Security, SELinux, AppArmor, Firewalld, Iptables, TCP Wrappers, SSH (Secure Shell), SSL/TLS, Certificates, PKI (Public Key Infrastructure), User Management, Group Management, LDAP (Lightweight Directory Access Protocol), Active Directory, PAM (Pluggable Authentication Modules), Authentication, Authorization, Accounting, Network Configuration, IP Addressing, Subnetting, Routing, DNS (Domain Name System), DHCP (Dynamic Host Configuration Protocol), VPN (Virtual Private Network), Proxy Servers, Web Servers, Apache, Nginx, Tomcat, Database Servers, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, Backup Solutions, Rsync, Tar, Compression, Gzip, Bzip2, Xz, Performance Tuning, System Optimization, Resource Management, CPU, Memory, Disk I/O, Network I/O, Troubleshooting, Diagnostics, System Logs, Kernel Logs, Application Logs, Debugging, Error Handling, Incident Response, Change Management, Configuration Management, Version Control, Git, SVN (Subversion), Documentation, Technical Writing, System Architecture, Infrastructure Design, Cloud Computing, AWS (Amazon Web Services), Azure, Google Cloud Platform (Google Cloud Platform), Hybrid Cloud, Multi-Cloud, DevOps, CI/CD (Continuous Integration/Continuous Deployment), Jenkins, GitLab CI, Travis CI, Security Audits, Vulnerability Scanning, Penetration Testing, Compliance, GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), SOX (Sarbanes-Oxley Act), ITIL (Information Technology Infrastructure Library), Project Management, Agile, Scrum, Kanban, Team Collaboration, Communication Skills, Problem-Solving Skills, Analytical Skills, Leadership, Mentoring, Training, Documentation, Reporting, Metrics, KPIs (Key Performance Indicators), SLA (Service Level Agreement), Vendor Management, Budgeting, Cost Management, ROI (Return on Investment), Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices, Documentation, Reporting, Metrics, KPIs, SLA, Contracts, Vendor Management, Budgeting, Cost Management, ROI, Risk Management, Governance, Strategy, Planning, Architecture, Engineering, Development, Deployment, Implementation, Operations, Administration, Support, Help Desk, Service Desk, User Management, Access Management, Authentication, Authorization, Accounting, Auditing, Compliance, Regulations, Standards, Guidelines, Policies, Procedures, Best Practices
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.