- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …deployment of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out ... and other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and threat hunting.… more
- Masego (St. Louis, MO)
- …Collection Management, Full Motion Video; Human Geography; Information Technology and Cyber ; Technical Writing; and ABI, Agile, and other professional training. ... Masego is a Service-Disabled Veteran-Owned Small Business headquartered in Fredericksburg, Virginia. With high-level expertise and decades of experience, coupled with proven project management systems and top-notch client support, Masego enhances the… more
- Leidos (Ashburn, VA)
- …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... **Description** Leidos is seeking an experienced Cyber Threat Hunt Analyst to join our team....Certified Incident Handler + ECSS - EC-Council Certified Security Specialist + ECES - EC-Council Certified Encryption Specialist… more
- Nightwing (Arlington, VA)
- …and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support ... services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research,… more
- Air National Guard Units (Mcconnell AFB, KS)
- …methodology and determines best techniques to secure computer systems and to protect cyber key terrain from exploitation of information within these systems ... determining the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace… more
- MIT Lincoln Laboratory (Lexington, MA)
- …agencies. Key technology development thrusts include unconventional methods of system exploitation , testbed development and introspection, and gaining cyber ... solving unconventional problems. As a Reverse Engineer and Vulnerability Research Specialist , you will develop novel capabilities against cyber -physical systems.… more
- Air National Guard Units (Fort Meade, MD)
- …establishing required TTPs used to secure computer systems and to protect them from cyber exploitation . Experienced in collaborating with the Cyber Tactics ... SERVICE POSITION. This National Guard position is for a SUPERVISORY IT SPECIALIST (INFOSEC/NETWORK), Position Description Number NGD2330000 and is part of the MD… more
- Air National Guard Units (New Castle, DE)
- …TITLE 32 EXCEPTED SERVICE POSITION. This National Guard position is for a IT SPECIALIST , Position Description Number D2332000 and is part of the DE 166 Operation ... assessed missions and systems. Defends missions and systems against adversary exploitation . Operates in-garrison and deployed cyberspace weapon systems. At a… more
- Huntington Ingalls Industries (Fairfax, VA)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
- Huntington Ingalls Industries (Fairfax, VA)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
- IDS International (Arlington, VA)
- …our team at IDS Technology as an Information Warfare Exercise Design Specialist and immerse yourself in cutting-edge military exercises focused on Special Operations ... meaningful impact. Apply your knowledge of relevant technologies and expertise in SOF, Cyber , PSYOP, Intel, SPACE and Civil Affairs to this unique challenge. Embrace… more
- Koniag Government Services (Falls Church, VA)
- …any of the following disciplines: Human Intelligence, Counterintelligence, Signals Intelligence, Cyber Network Exploitation . + Previous experience in the ... Koniag Government Services company **,** is seeking a Senior Program Protection Specialist with a Current/Active DoD Top Secret-level security clearance with the… more
- Global Dimensions (Springfield, VA)
- …company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). ... Global Dimensions is currently seeking a Journeyman Visual Information Specialist for a position in Springfield, Virginia. Requirements + Active/Current TS/SCI… more
- L3Harris (Palm Bay, FL)
- …replacement and vulnerability response projects. + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. + ... and RMF assessment methodology & process. + Experience in Cyber Defense technologies. + Experience with CI/CD, agile system...tools and processes. + Understanding of system vulnerabilities and exploitation . + Top Secret / SCI with an active… more
- L3Harris (Clifton, NJ)
- …and generation of summary reports. + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. + Experience ... evaluation methods and RMF assessment methodology & process. + Experience in Cyber Defense technologies. + Experience with CI/CD, agile system development, and… more
- L3Harris (Palm Bay, FL)
- …of start. Preferred Additional Skills: + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. + Program ... engineering principles (NIST SP 800-160 Vol1). + Experience in Cyber Defense technologies. + Experience with CI/CD, agile system...tools and processes. + Understanding of system vulnerabilities and exploitation . + Active Top Secret / SCI is highly… more
- Masego (Springfield, VA)
- …database entry, graphics design principles, ArcGIS, QT Modeler, the Integrated Exploitation Capability (IEC) system, RemoteView, or SocetGXP + Knowledge of digital ... Collection Management, Full Motion Video; Human Geography; Information Technology and Cyber ; Technical Writing; and ABI, Agile, and other professional training.… more
- Leidos (Ashburn, VA)
- …(Certified Professional) . OSCE (Certified Expert) . OSWP (Wireless Professional) . OSEE ( Exploitation Expert) . CCFP - Certified Cyber Forensics Professional . ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- JPMorgan Chase (Plano, TX)
- …propelling continuous improvement. As an Assessments & Exercises Vice President in the Cyber and Tech Controls line of business, you will contribute significantly to ... tests, adversary emulation assessments, collaborative technical controls assessments, and cyber exercises, and contribute to the development and refinement of… more
- Patriot Group International, Inc (Colorado Springs, CO)
- …possess a valid US Driver's License + Experience conducting meta-data analysis exploitation is typically found in analysts who have experience supporting operational ... agencies. + Additional certification, such as CAMS (Certified Anti-Money Laundering Specialist ) or CFE (Certified Fraud Examiner), is preferred. + Be competent… more