- MIT Lincoln Laboratory (Fort Meade, MD)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... We provide support across the full lifecycle of offensive cyber operations, from the reverse engineering and exploitation...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
- Huntington Ingalls Industries (Hanover, MD)
- …and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and ... HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within… more
- Huntington Ingalls Industries (Hanover, MD)
- …and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and ... HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within… more
- SAIC (College Park, MD)
- …Analyst** with an active TS/SCI clearance to join the Joint Acquisition Protection and Exploitation Cell (JAPEC) team. The mission of the JAPEC is to protect the ... maintained by the DoD and US Defense Industrial Base, and to recommend exploitation opportunities to deter, deny, and disrupt any attempts by our adversaries to… more
- Huntington Ingalls Industries (Hanover, MD)
- …and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and ... HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within… more
- Huntington Ingalls Industries (Hanover, MD)
- …and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and ... HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within… more
- Northrop Grumman (Baltimore, MD)
- …can help us keep building on our wide portfolio of secure, affordable, integrated , and multi-domain systems and technologies that fuel those missions. By joining in ... the best work of your career. **Information Systems Security Leaders, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. Almost… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and ... HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within… more
- Bank of America (Washington, DC)
- …and timely view of the Bank's attack surface and potential for vulnerability exploitation , with the goal of enabling answers to the following three questions: * ... to the Attack Surface & Vulnerability Management executive in the Cyber Security Assurance organization within Bank of America's Global Information Security… more