Employment
Immediate Openings
[submit resumes to employment@trinity-inc.net]
Trinity is an equal opportunity employer. We provide an excellent employer paid medical, dental, and vision plan as well as a 401k plan allowing investment selection through an unrestricted brokerage account. Equity vesting is possible.
Trinity is an equal opportunity employer. We provide an excellent employer paid medical, dental, and vision plan as well as a 401k plan allowing investment selection through an unrestricted brokerage account. Equity vesting is possible.
- Microsoft SharePoint 2010 Architect with 5+ years experience architecting, designing, developing and implementing collaborative web sites and portal solutions in the large to global business space. SharePoint Designer, Web Part and Content Type experience desired. Visual Studio-based Workflow, Event Handler and custom application solution experience strongly desired.
- Microsoft Exchange 2010 Architect with 5+ years experience architecting and designing highly available and recoverable messaging solutions in the large to global business space. Lotus Notes/Oracle Collaboration Suite interoperability and migration experience desired. Clustering, LDAP scripting, and public foldering experience strongly desired.
- Microsoft Windows 2008 R2 Architect with 5+ years experience architecting and designing highly available and recoverable network and directory solutions in the large to global business space. Clustering, ADSI scripting, SAN, and DFS experience strongly desired.
- Microsoft SQL 2008/2010 Architect with 5+ years experience architecting and designing highly available and recoverable data management solutions in the large to global business space. Oracle/Sybase/DB2 interoperability and migration experience desired. Clustering, BI, data warehousing and analysis experience strongly desired.
- Systems Security Analyst with 5+ years experience with White Hat penetration testing, systems hardening, forensic investigation, and data recovery in the large to global business space. Solid understanding of the threat, methods, and tools used in hacker attacks as well as those used to trace and thwart hackers is required.