- CACI International (Fort Bragg, NC)
- SIGINT Analyst (Digital Network Exploitation Analyst - DNEA) Job Category: Intelligence Time Type: Full time Minimum Clearance Required to Start: TS/SCI with ... Get to Do:** As a CACI SIGINT Analyst (Digital Network Exploitation Analyst - DNEA), you will...contract of similar size and scope. + Knowledge of computer networking concepts and protocols, and network … more
- BAE Systems (Fort Meade, MD)
- **Job Description** BAE Systems is looking for Senior Exploitation Analysts to support our government customer. These Analysts will: + Exploit media and ... degree and 8 years experience in forensic analysis, programming, computer engineering, design of computer systems, or...be available based on position level and/or job specifics. ** Senior Exploitation Analyst** **102860BR** EEO Career Site… more
- Parsons Corporation (Fort George G Meade, MD)
- …**Job Description:** **Job Description:** Parsons is seeking a seasoned **Cybersecurity Exploitation Subject Matter Expert (SME** ) with strong background in ... a TS/SCI with Polygraph and a deep technical expertise in vulnerability exploitation , advanced persistent threats (APT), and hands-on experience with offensive cyber… more
- ASM Research, An Accenture Federal Services Company (St. Louis, MO)
- The Senior Exploitation Specialist will manage existing data holdings; implement data policies, standards, and requirements to ensure integrity and quality; ... statistics, earth science, quantitative social sciences, geographic information science, computer science, physics, or a related field. + Demonstrated experience… more
- General Dynamics Information Technology (Langley AFB, VA)
- …passion for solving real world issues on a cross-functional, fast paced team. As a Senior Network Engineer, your role is to ensure the stability, integrity and ... supporting, and optimizing all networked software associated operating systems. The Senior Network Engineer will apply communication, analytical, and… more
- Vexterra Group (Bethesda, MD)
- …analysis + Network forensics and analysis + Generate professional technical exploitation reports of interest to the customer and the Intel Community. + Perform ... other requirements + Coordinate, enhance, and promulgate forensic and technical exploitation standards for forward deployed customer assets + Provide Subject Matter… more
- Belay Technologies (Hanover, MD)
- … analysis, and metadata analysis. There are multiple levels available for the Digital Network Exploitation Analyst: + Target Digital Network Analyst Level 3 ... concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and… more
- Adapt Forward (North Charleston, SC)
- Senior Red Team Security Engineer (Engineer, Computer IV) Charleston, SC Minimum Top Secret/SCI The Red Team Security Engineer will conduct multiple penetration ... problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and configuration of… more
- Belay Technologies (Columbia, MD)
- …provide technical and engineering support in the exploitation of commercial network infrastructure and computer systems. The Subcontractor shall have an ... a finalist in 2021! Belay Technologies is seeking a Senior Cyber Operator/Developer/Analyst to join our intel team. CODAs...analytical support in the exploitation of commercial network infrastructure and computer systems. This analyst… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …system security authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Experience ... + Experience in Vulnerability Alert processes + Working knowledge of Computer Network vulnerability/compliance analysis software **COMPANY INFORMATION:** Applied… more
- Zurich NA (Columbus, OH)
- …software, or specialized utility programs. + Experience with red teaming and covert computer exploitation + Experience with malware development. + Experience in ... Red Team Operator - Senior Level 117672 SpearTip a company of Zurich's...+ Conduct and/or support authorized adversarial emulations on enterprise network assets. + Create reports and recommendations from findings,… more
- JFL Consulting, LLC (Chantilly, VA)
- …include system security authorization agreements. + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments. + Some ... Senior Cyber Defense Operator Primary Place of Performance:...Information Assurance Vulnerability Alert processes. + Working knowledge of Computer Network modeling software. + Working knowledge… more
- Cromulence LLC (Melbourne, FL)
- …company located in historic downtown Melbourne, Florida. We specialize in Computer Network Operations Tools, Cybersecurity Competitions, advanced Program ... Cromulence is looking for a Senior Vulnerability Researcher to support advanced research and...with disassemblers (IDA Pro, Binary Ninja, or Ghidra), common exploitation countermeasures (DEP, ASLR, etc.), & countermeasure defeats (ROP… more
- Vexterra Group (Bethesda, MD)
- SOFTWARE REVERSE ENGINEER Vexterra Group is searching for a Senior Software Reverse Engineer support a Government Customer in Bethesda, Maryland: DUTIES + Isolate, ... and analysis processes, approaches and concepts to enhance/improve technical exploitation efforts + Adequately explain, present, demonstrate [when applicable] and… more
- JFL Consulting, LLC (Springfield, VA)
- …system security authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Programming ... Senior Cyber Defense Operator Primary Place of Performance:...Information Assurance Vulnerability Alert processes + Working knowledge of Computer Network modeling software + Working knowledge… more
- Lentech, Inc (Fort Meade, MD)
- …Vulnerability assessment, pen testing, incident response, analysis networks and / or host forensics Computer Network Exploitation , Computer Network ... targets communicate, move, operate, and live. Applies geospatial analysis techniques against network packet information, computer OS system data, executable file… more
- Parsons Corporation (Annapolis Junction, MD)
- …assessment, pen testing, incident response, analysis networks and / or host forensics + Computer Network Exploitation , Computer Network Attack ... communicate, move, operate, and live. + Applies geospatial analysis techniques against network packet information, computer OS system data, executable file data,… more
- Truist (Atlanta, GA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks). + Knowledge of adversarial ... Knowledge of general information technology (IT) and cybersecurity + Knowledge of computer networking concepts and protocols, and network security methodologies.… more
- ENSCO, Inc. (Williamsburg, VA)
- …each technical integrator. * Artificial intelligence and machine learning * Cellular network operations and exploitation * Database administration and data ... 3775BRInternal Position Title: Senior Technical ManagerRecruiter:Tasha LottJob Description:ENSCO Inc, is seeking a Technical Integrator, duties will include: *… more
- Truist (Atlanta, GA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks). + Knowledge of adversarial ... Knowledge of general information technology (IT) and cybersecurity + Knowledge of computer networking concepts and protocols, and network security methodologies.… more