- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …deployment of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out ... and other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and threat hunting.… more
- Masego (St. Louis, MO)
- …Collection Management, Full Motion Video; Human Geography; Information Technology and Cyber ; Technical Writing; and ABI, Agile, and other professional training. ... Masego is a Service-Disabled Veteran-Owned Small Business headquartered in Fredericksburg, Virginia. With high-level expertise and decades of experience, coupled with proven project management systems and top-notch client support, Masego enhances the… more
- Trace Systems Inc (Shaw AFB, SC)
- Overview: Job Title: Cyber Defense Specialist Location:Shaw AFB, SC Job Responsibilities: Trace Systems is seeking a dynamic Cyber Defense Specialist to ... + Analyze identified anomalous or malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information; + Assist in the… more
- Leidos (Ashburn, VA)
- …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... **Description** Leidos is seeking an experienced Cyber Threat Hunt Analyst to join our team....Certified Incident Handler + ECSS - EC-Council Certified Security Specialist + ECES - EC-Council Certified Encryption Specialist… more
- Nightwing (Arlington, VA)
- …and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support ... services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …agencies. Key technology development thrusts include unconventional methods of system exploitation , testbed development and introspection, and gaining cyber ... solving unconventional problems. As a Reverse Engineer and Vulnerability Research Specialist , you will develop novel capabilities against cyber -physical systems.… more
- Transportation Security Administration (Springfield, VA)
- …of movement for people and commerce. Responsibilities This Intelligence Operations Specialist (Direct Hire) position is located Operations Support, Intelligence and ... and editing, reports, products, and briefings on complex and specialized cyber threat information relating to transportation equities for TSA operational components,… more
- Huntington Ingalls Industries (San Antonio, TX)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
- IDS International (Arlington, VA)
- …our team at IDS Technology as an Information Warfare Exercise Design Specialist and immerse yourself in cutting-edge military exercises focused on Special Operations ... meaningful impact. Apply your knowledge of relevant technologies and expertise in SOF, Cyber , PSYOP, Intel, SPACE and Civil Affairs to this unique challenge. Embrace… more
- Koniag Government Services (Falls Church, VA)
- …any of the following disciplines: Human Intelligence, Counterintelligence, Signals Intelligence, Cyber Network Exploitation . + Previous experience in the ... Koniag Government Services company **,** is seeking a Senior Program Protection Specialist with a Current/Active DoD Top Secret-level security clearance with the… more
- US Coast Guard (Elizabeth City, NC)
- …in Elizabeth City, NC. Responsibilities As an Information Technology Cybersecurity Specialist (INFOSEC) in the Information Systems Division, the role of this ... are evaluated, validated, and implemented as required. Analyzing organization's cyber defense policies and configurations and evaluate compliance with regulations… more
- Global Dimensions (Springfield, VA)
- …company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.). ... Global Dimensions is currently seeking a Journeyman Visual Information Specialist for a position in Springfield, Virginia. Requirements + Active/Current TS/SCI… more
- L3Harris (Palm Bay, FL)
- …replacement and vulnerability response projects. + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. + ... and RMF assessment methodology & process. + Experience in Cyber Defense technologies. + Experience with CI/CD, agile system...tools and processes. + Understanding of system vulnerabilities and exploitation . + Top Secret / SCI with an active… more
- L3Harris (Clifton, NJ)
- …and generation of summary reports. + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. + Experience ... evaluation methods and RMF assessment methodology & process. + Experience in Cyber Defense technologies. + Experience with CI/CD, agile system development, and… more
- L3Harris (Palm Bay, FL)
- …of start. Preferred Additional Skills: + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. + Program ... engineering principles (NIST SP 800-160 Vol1). + Experience in Cyber Defense technologies. + Experience with CI/CD, agile system...tools and processes. + Understanding of system vulnerabilities and exploitation . + Active Top Secret / SCI is highly… more
- Insight Global (Alexandria, VA)
- …advantage over foreign adversaries, and protects its new technologies from exploitation and theft by our adversaries. Hourly rate: 68-75/hr Salary: $140,000 ... technical fields: Microelectronics, Directed Energy, Space, Hypersonics, Autonomy, Quantum Cyber , Artificial Intelligence, Biotechnology, Command, Control, & Communications (C3)… more
- Masego (Springfield, VA)
- …database entry, graphics design principles, ArcGIS, QT Modeler, the Integrated Exploitation Capability (IEC) system, RemoteView, or SocetGXP + Knowledge of digital ... Collection Management, Full Motion Video; Human Geography; Information Technology and Cyber ; Technical Writing; and ABI, Agile, and other professional training.… more
- Leidos (Ashburn, VA)
- …(Certified Professional) . OSCE (Certified Expert) . OSWP (Wireless Professional) . OSEE ( Exploitation Expert) . CCFP - Certified Cyber Forensics Professional . ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- JPMorgan Chase (Plano, TX)
- …propelling continuous improvement. As an Assessments & Exercises Vice President in the Cyber and Tech Controls line of business, you will contribute significantly to ... tests, adversary emulation assessments, collaborative technical controls assessments, and cyber exercises, and contribute to the development and refinement of… more
- Patriot Group International, Inc (Colorado Springs, CO)
- …possess a valid US Driver's License + Experience conducting meta-data analysis exploitation is typically found in analysts who have experience supporting operational ... agencies. + Additional certification, such as CAMS (Certified Anti-Money Laundering Specialist ) or CFE (Certified Fraud Examiner), is preferred. + Be competent… more