We interpreted District Of Columbia County, DC as District Of Columbia County, DC.
- ASM Research, An Accenture Federal Services Company (Fort Meade, MD)
- …+ Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. + 5-10 years of experience with programming or web ... Responsible for a development project, may provide general oversight and direction to the developers on the project in an experienced developer capacity. Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to… more
- Deloitte (Rosslyn, VA)
- …technical issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Execute on AD/Entra ID engagements during different ... technology innovation required by the business. Join Deloitte's Advisory Cyber Risk Services team and become a member of...Microsoft Entra ID Platform. This will include: + Conducting analysis and recommendations of clients' Microsoft Entra ID and… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Lockheed Martin (Hanover, MD)
- …Techniques: * Reverse engineering tools * Dynamic analysis tools and emulation * Protocol analysis tools * RF test equipment * Electronics test equipment * ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...darkness of the unknown\. In this realm of digital discovery , you are the master cartographer, mapping the unseen… more
- Leidos (Odenton, MD)
- …hold a Top Secret/SCI clearance._** **Primary Responsibilities** : + Perform computer protocol analysis and session reassembly of known and unidentified ... join our team as a Cryptologic Computer Scientist supporting cyber operations at Ft Meade, Maryland. **_To qualify for...technical field. + Relevant experience must be in signals analysis , including protocol analysis , and… more
- Battelle Memorial Institute (Chantilly, VA)
- …experiences and welcome all qualified individuals to apply. **Job Summary** Battelle's Cyber team is seeking a **Network Security Analyst- SkillBridge Intern** to ... collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems. The position location is… more
- Battelle Memorial Institute (Chantilly, VA)
- …and hardware, so our engineer have everything they need to invent new Cyber solutions. We encourage new ideas with our large Internal Research and Development ... organization on projects ranging from genomics to robotics. **Battelle Cyber Online** GitHub: https://github.com/Battelle Battelle Cyber Challenge:… more
- Battelle Memorial Institute (Chantilly, VA)
- …**Job Summary** Battelle is seeking a **Senior Network Security Analyst** for our Cyber Business Line. This position has the flexibility to operate from either our ... team to collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems as an expert on… more
- Battelle Memorial Institute (Chantilly, VA)
- …**Job Summary** Battelle is seeking a **Senior Network Security Researcher** for our Cyber Business Line. This position has the flexibility to operate from either ... portions of a customer network in a lab environment for troubleshooting and analysis + Research techniques used by Advanced Persistent Threats (APT) to move and… more