We Are Recruiting!

We Are Recruiting!

Date: December 25, 2018
Tags: ,

We Are Recruiting!

T-Rex is a trusted leader in the IT Industry with a diverse client base. We’re committed to attracting and retaining the sharpest minds by providing an environment where our employees can put their expertise to use for the greater good and the protection of our citizens and government.

OUR CULTURE

We have a dynamic culture where people can thrive and do their best, which leads to a brighter future for ALL T-REX. We are committed to growing as one team of talented, dedicated professionals.

OUR BENEFITS

Our employees are our most valuable asset. That’s why we are committed to offering a comprehensive employee benefits program that helps our employees stay healthy, feel secure, learn continuously, and maintain a balanced life.

OUR COMMUNITY

T-Rex’s community outreach serves to help improve and change underserved and low-socioeconomic areas in surrounding communities. Our mission started when T-Rex held the HUBZone designation and our passion has led to our ongoing commitment.


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]