- ASM Research, An Accenture Federal Services Company (Fort Meade, MD)
- …+ Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. + 5-10 years of experience with programming or web ... Responsible for a development project, may provide general oversight and direction to the developers on the project in an experienced developer capacity. Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Lockheed Martin (Hanover, MD)
- …Techniques: * Reverse engineering tools * Dynamic analysis tools and emulation * Protocol analysis tools * RF test equipment * Electronics test equipment * ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...darkness of the unknown\. In this realm of digital discovery , you are the master cartographer, mapping the unseen… more
- Leidos (Odenton, MD)
- …hold a Top Secret/SCI clearance._** **Primary Responsibilities** : + Perform computer protocol analysis and session reassembly of known and unidentified ... join our team as a Cryptologic Computer Scientist supporting cyber operations at Ft Meade, Maryland. **_To qualify for...technical field. + Relevant experience must be in signals analysis , including protocol analysis , and… more
- CACI International (Annapolis Junction, MD)
- …analytic methodology by implementing tradecraft associated with identifying vulnerabilities, cyber discovery , and strategies. **You'll Bring These ... technology principles, theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas. * Experience working on… more
- Marriott (Bethesda, MD)
- …working with several of these technologies: Data Loss Prevention (DLP), Data Discovery , Cloud Security Access Broker (CASB), Data Rights Management (DRM), SSL ... protect sensitive data on managed networks. + Conducting cloud security analysis of Cloud platforms/environments. + Performing onboarding of data security services… more