- Chimera Enterprises International (Atlanta, GA)
- Chimera Enterprises is currently seeking a Mobile Exploitation Analyst (CELLEX/DOMEX) based in Fort Gillem, GA. The salary range for this position will be ... the forensic examination and analysis of digital, electronic and mobile device data to include but not limited to:...+ Examine evidence to determine the best strategy for exploitation , in consultation with other subject matter experts as… more
- CACI International (Chantilly, VA)
- Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: ... a wide of range knowledge and skills, such as computer forensics/ mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies,… more
- SAIC (Bethesda, MD)
- …engineering, mobile applications development and engineering, and technical exploitation . The Digital Attributes/Fusion Analyst will provide Digital ... **Description** SAIC is seeking a **Digital Attributes/ Fusion Analyst ** to join our Technical Exploitation ... exploitation triage and automation, advanced technical Media Exploitation (MEDEX), and advanced Mobile Device … more
- Leidos (Ashburn, VA)
- …networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC ... violations. Leidos is seeking an experienced Cyber Threat Hunt Analyst to join our team. As a member of...+ OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional… more
- CACI International (Chantilly, VA)
- Cyber Threat Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of ... have a wide range knowledge and skills, such as computer forensics/ mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies,… more
- Leidos (Ashburn, VA)
- …(LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, various cloud environments, security devices, servers and workstations. ... analysis on host based, network based, cloud focused, and mobile systems to identify advanced threats that evade traditional...Security Professional (CISSP). + SANS - GCIA - Intrusion Analyst + SANS - GREM - Reverse Engineering Malware… more
- General Dynamics Information Technology (Mclean, VA)
- …today is safe and tomorrow is smarter. Our work depends on an Incident Response Analyst joining our team to support ODNI Customer activities at McLean, VA. At GDIT, ... people are our differentiator. As an Incident Response Analyst supporting the ODNI Customer, you will be trusted to work on innovative solutions that will transform… more
- ADP (Roseland, NJ)
- **Senior Application Security Analyst ** **ADP is hiring a Application Security Analyst .** In this position, you'll be responsible for assessing the security of ... assessments across a variety of platforms, including Gen AI, web, mobile , and server-based applications, ensuring robust security protocols. **Location:** Roseland,… more
- Hawaiian Electric (Honolulu, HI)
- Information Assurance Analyst - Oahu Date:Jan 5, 2025 Location: Honolulu, Hawaii (HI), US, 96840 Company: hawaiianel We recognize our competitive advantage -- our ... and application security threats and vulnerabilities (eg, buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL]… more
- Federal Reserve Bank (Cleveland, OH)
- …ATT&CK, etc. + Assessing cybersecurity threats, vulnerabilities, and related exploitation activity; recommending related mitigations to manage risk to computing ... Performs other duties as assigned or requested. **Education and Experience** ** Analyst III:** Bachelor's degree in computer science, Management Information Systems… more
- Nightwing (Sterling, VA)
- …restoration of services. Nightwing is seeking a Cyber Incident Management Analyst to support this critical customer mission. Responsibilities:- Managing reported ... enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.)- Demonstrated experience with recognizing and… more
- Percival Engineering (Columbia, MD)
- …threat actors thrill you? We are seeking a Target Digital Network Analyst (TDNA) familiar with network-based adversary tactics, techniques, and procedures, network ... response + Networks and /or host forensics experience + Computer Network Exploitation /Computer Network Attack analytic or planning support + Minimum of at least… more
- Lentech, Inc (Fort Meade, MD)
- Lentech has a unique opportunity for a Target Digital Network Analyst (TDNA) familiar with network-based adversary tactics, techniques, and procedures, network ... analysis networks and / or host forensics Computer Network Exploitation , Computer Network Attack - Minimum of at least...hashing Forensic analysis of Windows systems, Linux systems or mobile devices Commercial / GOTS tools for Intrusion detection… more
- Micron Technology, Inc. (Boise, ID)
- …to learn, communicate and advance faster than ever. The Cyber Security Offensive Security analyst will be responsible for building out the capability for our team to ... to enhance Microns internal and external penetration testing. The analyst will also work with other teams to transfer...with other teams to transfer knowledge pertaining to current exploitation tools, techniques, and procedures as well as active… more
- Leidos (Ashburn, VA)
- …networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC ... have at minimum ONE of the following certifications: + CompTIA Cyber Security Analyst (CySA+) + CompTIA Linux Network Professional (CLNP) + CompTIA Pentest+ CompTIA… more
- Walmart (Bentonville, AR)
- …members can expect from the experience of shopping, from the physical stores/clubs, to mobile , social, and even online; we're not just ready for the future of ... and techniques. + Determines testing scope for assigned projects. + Conducts exploitation testing utilizing security testing tools. + Assesses application and system… more
- Leidos (Arlington, VA)
- …including ATT&CK, Cyber Kill Chain, Diamond Model, etc. * Strong understanding of Mobile Operating Systems and Mobile Networks. * Previous experience as Threat ... Researcher and/or Intelligence Analyst . * Experience with dynamic malware analysis, and reverse...and YARA signatures. * Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network… more
- ARSIEM (Annapolis Junction, MD)
- …team of engineers designing, developing, testing, and maintaining Windows, Unix, and/or Mobile CNO capabilities in support of the Annapolis Junction, MD's mission ... Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering… more
- ARSIEM (Annapolis Junction, MD)
- …team of engineers designing, developing, testing, and maintaining Windows, Unix, and/or Mobile CNO capabilities in support of the Annapolis Junction, MD's mission ... Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering… more
- ARSIEM (Annapolis Junction, MD)
- …team of engineers designing, developing, testing, and maintaining Windows, Unix, and/or Mobile CNO capabilities in support of the Annapolis Junction, MD's mission ... Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering… more