• Protocol Analysis and Cyber

    ASM Research, An Accenture Federal Services Company (Fort Meade, MD)
    …+ Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. + 5-10 years of experience with programming or web ... Responsible for a development project, may provide general oversight and direction to the developers on the project in an experienced developer capacity. Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to… more
    ASM Research, An Accenture Federal Services Company (01/09/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher…

    MIT Lincoln Laboratory (Fort Meade, MD)
    … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher…

    MIT Lincoln Laboratory (Fort Meade, MD)
    …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Offensive Cyber Vulnerabilities Researcher…

    Lockheed Martin (Hanover, MD)
    …Techniques: * Reverse engineering tools * Dynamic analysis tools and emulation * Protocol analysis tools * RF test equipment * Electronics test equipment * ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...darkness of the unknown\. In this realm of digital discovery , you are the master cartographer, mapping the unseen… more
    Lockheed Martin (01/15/25)
    - Save Job - Related Jobs - Block Source
  • Protocol Analyst 3

    Leidos (Odenton, MD)
    …hold a Top Secret/SCI clearance._** **Primary Responsibilities** : + Perform computer protocol analysis and session reassembly of known and unidentified ... join our team as a Cryptologic Computer Scientist supporting cyber operations at Ft Meade, Maryland. **_To qualify for...technical field. + Relevant experience must be in signals analysis , including protocol analysis , and… more
    Leidos (02/07/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst (DNEA) Talent…

    CACI International (Annapolis Junction, MD)
    …analytic methodology by implementing tradecraft associated with identifying vulnerabilities, cyber discovery , and strategies. **You'll Bring These ... technology principles, theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas. * Experience working on… more
    CACI International (02/20/25)
    - Save Job - Related Jobs - Block Source
  • Senior Security Engineer, Cloud Data Security

    Marriott (Bethesda, MD)
    …working with several of these technologies: Data Loss Prevention (DLP), Data Discovery , Cloud Security Access Broker (CASB), Data Rights Management (DRM), SSL ... protect sensitive data on managed networks. + Conducting cloud security analysis of Cloud platforms/environments. + Performing onboarding of data security services… more
    Marriott (03/04/25)
    - Save Job - Related Jobs - Block Source