- Defense Intelligence Agency (Reston, VA)
- …DESIRED SKILLS 1. Fluent or DLPT score of 2/2/2 in Chinese. 2. Knowledge of Open Source collection and exploitation operations . 3. Familiar with OSINT ... legal and ethical principles in our responsibilities. Excellence: Unrivaled defense intelligence expertise. Service: Putting the welfare of the Nation and commitment… more
- Calhoun International, LLC (Honolulu, HI)
- …training includes but is not limited to: * OS300 - MA Training * OS301: Basic Open Source Intelligence Course (BOSIC) * OS302: OSINT Analytic Tools and ... sex, or national origin. Responsibilities: Calhoun International is seeking a qualified Open Source Analyst to support INDOPACOM J2 / JIOC. The OSINT analyst… more
- Leidos (St. Louis, MO)
- …and Intelligence Oversight ( IO ) Governance. b. Produce and disseminate Open Source reports and alerts in accordance with established SOPs. c. Populate ... tradecraft to employ safe searching principles in order to identify and collect geospatial open source data. Staff must also quantify the veracity of open… more
- Lockheed Martin (Arlington, VA)
- …\- Vulnerability Analysis of source code or binaries \- Machine\-learning/Artificial Intelligence \- Cyber/ IO /CNO R&D If you have demonstrated a passion for ... \(IC\)\. Our mission: to empower our nation's heroes with game\-changing Information Operations \( IO \) and Computer Network Operations \(CNO\) technologies… more
- Lockheed Martin (Cherry Hill, NJ)
- …\- Vulnerability Analysis of source code or binaries \- Machine\-learning/Artificial Intelligence \- Cyber/ IO /CNO R&D If you have demonstrated a passion for ... \(IC\)\. Our mission: to empower our nation's heroes with game\-changing Information Operations \( IO \) and Computer Network Operations \(CNO\) technologies… more
- Alaka'ina Foundation Family of Companies (Honolulu, HI)
- …in, SIEM systems, big data analytics, and supporting devices/applications. + Conduct open - source research to identify commercial exploits or vulnerabilities (ie, ... malware analysis, trending of cyber incident reports, correlation of classified and open - source threat reporting, and linkages/integration with other agencies. +… more