- ARSIEM (Annapolis Junction, MD)
- …impact on every client you work with. ARSIEM is looking for a Protocol Analysis and Cyber Discovery Technique Developer. This position will support one ... Annapolis Junction, MD. Responsibilities + Find and resolve malicious cyber activities + Resolve communications into intelligible forms +...have an understanding of signals and protocol analysis techniques and can apply this to discovery… more
- Huntington Ingalls Industries (Annapolis Junction, MD)
- …, Electronic, Warfare & Space team is looking to hire a Protocol Analysis and Cyber Discovery Technique Developer in collaboration with other members ... Poly Level of Experience: Mid This opportunity resides with Cyber & Electronic Warfare, a business group within HII's...have an understanding of signals and protocol analysis techniques, and can apply this to discovery… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... About the Cyber System Assessment Group: The Cyber ...+ Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Huntington Ingalls Industries (Dayton, OH)
- …systems and designs to include system architecture evaluation, protocol analysis , hardware and/or software vulnerability discovery , and documentation of ... . Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of… more
- Guardian Life (Holmdel, NJ)
- **2025 Guardian Summer Intern, Digital & Technology- Cyber Security** Our 2025 Internship Program is a paid 10-week learning experience where you will be immersed in ... Identity and Access Management + Event log aggregation, searching, and analysis + Familiarity with security architectures and operating and troubleshooting… more
- Leidos (Annapolis Junction, MD)
- …signals processing. + You have an understanding of signals and protocol analysis techniques and can apply this to discovery activities. + Knowledge of ... with us today!** **Your Main Objective:** + Find and resolve malicious cyber activities + Resolve communications into intelligible forms + Develop discovery… more
- Deloitte (Columbus, OH)
- …technical issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Execute on AD/Entra ID engagements during different ... technology innovation required by the business. Join Deloitte's Advisory Cyber Risk Services team and become a member of...Microsoft Entra ID Platform. This will include: + Conducting analysis and recommendations of clients' Microsoft Entra ID and… more
- Battelle Memorial Institute (Chantilly, VA)
- …experiences and welcome all qualified individuals to apply. **Job Summary** Battelle's Cyber team is seeking a **Network Security Analyst- SkillBridge Intern** to ... collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems. The position location is… more
- Battelle Memorial Institute (Chantilly, VA)
- …and hardware, so our engineer have everything they need to invent new Cyber solutions. We encourage new ideas with our large Internal Research and Development ... organization on projects ranging from genomics to robotics. **Battelle Cyber Online** GitHub: https://github.com/Battelle Battelle Cyber Challenge:… more
- Hawaiian Electric (Honolulu, HI)
- …Entry Level: + 1-3 years of experience in Systems administration, basic cyber analysis /operations, cyber threats, risk management, network management, ... + Assists with program development and management for privacy, e- discovery , security awareness training, digital forensics, vulnerability remediation, and other… more
- Hawaiian Electric (Honolulu, HI)
- …+ Assists with program development and management for privacy, e- discovery , security awareness training, digital forensics, patch management, vulnerability ... ethics as they relate to cybersecurity and privacy. + Cyber threats and vulnerabilities. + Cryptography and cryptographic key...+ Traffic flows across the network (eg, Transmission Control Protocol [TCP] and Internet Protocol [IP], Open… more
- SOS International LLC (Pearl Harbor, HI)
- …Familiar with Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. + Experience ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more
- Lockheed Martin (King Of Prussia, PA)
- …System Security Manager \(ISSM\) regarding the design, development, integration, and analysis of classified information systems is required\. Working knowledge of ... Standard tools for purposes of audit reduction, vulnerability scanning, and malware analysis is preferred\. Relevant tools include but are not limited to: Splunk,… more
- Amentum (Annapolis Junction, MD)
- Are you interested in using your skills to help shape the Cyber , Security, & Intel space? If so, look no further. We are seeking a Senior Endpoint Device Examiner to ... software, systems, and network engineering services to support Integrated Discovery Operations (IDO). **Responsibilities:** + Utilize commercial and open-source… more
- SMX (Quantico, VA)
- …remediation + Ensure that any latency is identified and mitigated/remediated upon discovery in accordance with required response times + Monitor availability of ... system upgrades + Provide analysis and remediation for DISA Security Technical Implementation Guidelines (STIG) for all responsible technologies in preparation for… more