- Parsons Corporation (Fort George G Meade, MD)
- …you're looking for. **Job Description:** Parsons is seeking for an experienced ** Exploitation Subject Matter Expert (SME) with a strong background in development and ... and mentorship to junior team members. Share knowledge and expertise on exploitation techniques, development practices, and offensive cyber strategies + Work closely… more
- Belay Technologies (Columbia, MD)
- …and a finalist in 2021! Belay Technologies is seeking a Senior Cyber Operator/ Developer /Analyst to join our intel team. CODAs shall provide technical and engineering ... support in the exploitation of commercial network infrastructure and computer systems. The...and procedures. Under the direction of the government, the operator/ developer will ensure that risks are understood and that… more
- ARSIEM (Annapolis Junction, MD)
- …on every client you work with. ARSIEM is currently looking for a CNO Developer . The position will support one of our Government clients in Annapolis Junction, ... Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering… more
- ARSIEM (Annapolis Junction, MD)
- …on every client you work with. ARSIEM is currently looking for a CNO Developer . The position will support one of our Government clients in Annapolis Junction, ... Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering… more
- ARSIEM (Annapolis Junction, MD)
- …on every client you work with. ARSIEM is currently looking for a CNO Developer . The position will support one of our Government clients in Annapolis Junction, ... Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering… more
- Steampunk (Mclean, VA)
- …been a more important aspect in achieving mission and business goals. Our data exploitation experts work with our clients to support their mission and business goals ... working with the best and data practitioners around. Our data exploitation approach is tightly integrated with Human-Centered Design and DevSecOps **Contributions**… more
- Acclaim Technical Services (Mclean, VA)
- …integrity of IT systems by identifying and mitigating potential avenues of exploitation including system level attacks and user level attacks. Description: + Applies ... reports based on review of security plans and interviews with developer /customer assess systems against information assurance policies, regulations and instructions.… more