- Huntington Ingalls Industries (Annapolis Junction, MD)
- …, Electronic, Warfare & Space team is looking to hire a Protocol Analysis and Cyber Discovery Technique Developer in collaboration with other members ... Poly Level of Experience: Mid This opportunity resides with Cyber & Electronic Warfare, a business group within HII's...activities + Resolve communications into intelligible forms + Develop discovery tools using C++ and Python + Deliver newly… more
- Amentum (Annapolis Junction, MD)
- …& Intel space? If so, look no further. We are seeking a Protocol Analysis and Cyber Discovery Technique to join our team of passionate individuals. ... on the nation's security and intelligence mission. As a Protocol Analysis and Cyber Discovery Technique Developer you will find and resolve malicious … more
- ASM Research, An Accenture Federal Services Company (Fort Meade, MD)
- …+ Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. + 5-10 years of experience with programming or web ... Responsible for a development project, may provide general oversight and direction to the developers on the project in an experienced developer capacity. Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... About the Cyber System Assessment Group: The Cyber ...+ Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Deloitte (Columbus, OH)
- …technical issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Execute on AD/Entra ID engagements during different ... technology innovation required by the business. Join Deloitte's Advisory Cyber Risk Services team and become a member of...Microsoft Entra ID Platform. This will include: + Conducting analysis and recommendations of clients' Microsoft Entra ID and… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Lockheed Martin (Hanover, MD)
- …Techniques: * Reverse engineering tools * Dynamic analysis tools and emulation * Protocol analysis tools * RF test equipment * Electronics test equipment * ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...darkness of the unknown\. In this realm of digital discovery , you are the master cartographer, mapping the unseen… more
- The MITRE Corporation (Bedford, MA)
- …, Cross-Architecture System Analysis , Operating Systems Security, Network Systems and Protocol Analysis , Embedded Systems (such as Internet of Things (IoT) ... + Operating System Internals/Driver development + Computer Networking & Security + Vulnerability Discovery and Analysis + Developing C and Python software or… more
- Leidos (Odenton, MD)
- …hold a Top Secret/SCI clearance._** **Primary Responsibilities** : + Perform computer protocol analysis and session reassembly of known and unidentified ... join our team as a Cryptologic Computer Scientist supporting cyber operations at Ft Meade, Maryland. **_To qualify for...technical field. + Relevant experience must be in signals analysis , including protocol analysis , and… more
- Battelle Memorial Institute (Chantilly, VA)
- …experiences and welcome all qualified individuals to apply. **Job Summary** Battelle's Cyber team is seeking a **Network Security Analyst- SkillBridge Intern** to ... collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems. The position location is… more
- Battelle Memorial Institute (Chantilly, VA)
- …and hardware, so our engineer have everything they need to invent new Cyber solutions. We encourage new ideas with our large Internal Research and Development ... organization on projects ranging from genomics to robotics. **Battelle Cyber Online** GitHub: https://github.com/Battelle Battelle Cyber Challenge:… more
- Hawaiian Electric (Honolulu, HI)
- …Entry Level: + 1-3 years of experience in Systems administration, basic cyber analysis /operations, cyber threats, risk management, network management, ... + Assists with program development and management for privacy, e- discovery , security awareness training, digital forensics, vulnerability remediation, and other… more
- Henry Ford Health System (Detroit, MI)
- …and Unix\Linux operating systems including logging facilities. + Understanding of network protocol analysis , public key infrastructure, SSL, Active Directory. + ... to computer forensic investigations, live response and triage, and electronic discovery . The Principal Forensic and Incident Response Architect will also perform… more
- Leidos (Mafb Gun Annx, AL)
- …network. As the ACAS administrator, you will perform vulnerability assessment analysis and administration in this role with cybersecurity oriented principles to ... Implementation Guidelines (STIGs) applicable to each Non-classified or Secret Internet Protocol (IP) Router Network (NIPRNet, SIPRNet) environment for all ACAS… more
- Battelle Memorial Institute (Columbus, OH)
- …**Job Summary** Battelle is seeking a **Senior Network Security Analyst** for our Cyber Business Line. This position has the flexibility to operate from either our ... team to collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems as an expert on… more
- ISYS Technologies (Ogden, UT)
- …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you… more
- Leidos (O'Fallon, IL)
- …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... **Job Description:** The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Defense Red Switch Network… more
- SOS International LLC (Pearl Harbor, HI)
- …Familiar with Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. + Experience ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more