• Protocol Analysis & Cyber

    Huntington Ingalls Industries (Annapolis Junction, MD)
    …, Electronic, Warfare & Space team is looking to hire a Protocol Analysis and Cyber Discovery Technique Developer in collaboration with other members ... Poly Level of Experience: Mid This opportunity resides with Cyber & Electronic Warfare, a business group within HII's...activities + Resolve communications into intelligible forms + Develop discovery tools using C++ and Python + Deliver newly… more
    Huntington Ingalls Industries (12/09/24)
    - Save Job - Related Jobs - Block Source
  • Protocol Analysis and Cyber

    Amentum (Annapolis Junction, MD)
    …& Intel space? If so, look no further. We are seeking a Protocol Analysis and Cyber Discovery Technique to join our team of passionate individuals. ... on the nation's security and intelligence mission. As a Protocol Analysis and Cyber Discovery Technique Developer you will find and resolve malicious … more
    Amentum (11/07/24)
    - Save Job - Related Jobs - Block Source
  • Protocol Analysis and Cyber

    ASM Research, An Accenture Federal Services Company (Fort Meade, MD)
    …+ Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. + 5-10 years of experience with programming or web ... Responsible for a development project, may provide general oversight and direction to the developers on the project in an experienced developer capacity. Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to… more
    ASM Research, An Accenture Federal Services Company (01/09/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Group 59--Summer Research Program ( Cyber

    MIT Lincoln Laboratory (Lexington, MA)
    … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... About the Cyber System Assessment Group: The Cyber ...+ Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
    MIT Lincoln Laboratory (11/12/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Identity - Active Directory-Entra ID…

    Deloitte (Columbus, OH)
    …technical issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Execute on AD/Entra ID engagements during different ... technology innovation required by the business. Join Deloitte's Advisory Cyber Risk Services team and become a member of...Microsoft Entra ID Platform. This will include: + Conducting analysis and recommendations of clients' Microsoft Entra ID and… more
    Deloitte (01/15/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher…

    MIT Lincoln Laboratory (Fort Meade, MD)
    … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher…

    MIT Lincoln Laboratory (Fort Meade, MD)
    …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Offensive Cyber Vulnerabilities Researcher…

    Lockheed Martin (Hanover, MD)
    …Techniques: * Reverse engineering tools * Dynamic analysis tools and emulation * Protocol analysis tools * RF test equipment * Electronics test equipment * ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...darkness of the unknown\. In this realm of digital discovery , you are the master cartographer, mapping the unseen… more
    Lockheed Martin (01/15/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Reverse Engineer

    The MITRE Corporation (Bedford, MA)
    …, Cross-Architecture System Analysis , Operating Systems Security, Network Systems and Protocol Analysis , Embedded Systems (such as Internet of Things (IoT) ... + Operating System Internals/Driver development + Computer Networking & Security + Vulnerability Discovery and Analysis + Developing C and Python software or… more
    The MITRE Corporation (01/16/25)
    - Save Job - Related Jobs - Block Source
  • Protocol Analyst 3

    Leidos (Odenton, MD)
    …hold a Top Secret/SCI clearance._** **Primary Responsibilities** : + Perform computer protocol analysis and session reassembly of known and unidentified ... join our team as a Cryptologic Computer Scientist supporting cyber operations at Ft Meade, Maryland. **_To qualify for...technical field. + Relevant experience must be in signals analysis , including protocol analysis , and… more
    Leidos (11/08/24)
    - Save Job - Related Jobs - Block Source
  • Network Systems Analyst- DoD SkillBridge…

    Battelle Memorial Institute (Chantilly, VA)
    …experiences and welcome all qualified individuals to apply. **Job Summary** Battelle's Cyber team is seeking a **Network Security Analyst- SkillBridge Intern** to ... collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems. The position location is… more
    Battelle Memorial Institute (12/22/24)
    - Save Job - Related Jobs - Block Source
  • Mid-Level Network Security Analyst

    Battelle Memorial Institute (Chantilly, VA)
    …and hardware, so our engineer have everything they need to invent new Cyber solutions. We encourage new ideas with our large Internal Research and Development ... organization on projects ranging from genomics to robotics. **Battelle Cyber Online** GitHub: https://github.com/Battelle Battelle Cyber Challenge:… more
    Battelle Memorial Institute (12/22/24)
    - Save Job - Related Jobs - Block Source
  • Information Assurance Analyst - Oahu

    Hawaiian Electric (Honolulu, HI)
    …Entry Level: + 1-3 years of experience in Systems administration, basic cyber analysis /operations, cyber threats, risk management, network management, ... + Assists with program development and management for privacy, e- discovery , security awareness training, digital forensics, vulnerability remediation, and other… more
    Hawaiian Electric (01/09/25)
    - Save Job - Related Jobs - Block Source
  • Principal Forensic & Incident Response Architect…

    Henry Ford Health System (Detroit, MI)
    …and Unix\Linux operating systems including logging facilities. + Understanding of network protocol analysis , public key infrastructure, SSL, Active Directory. + ... to computer forensic investigations, live response and triage, and electronic discovery . The Principal Forensic and Incident Response Architect will also perform… more
    Henry Ford Health System (01/18/25)
    - Save Job - Related Jobs - Block Source
  • ACAS Operator

    Leidos (Mafb Gun Annx, AL)
    …network. As the ACAS administrator, you will perform vulnerability assessment analysis and administration in this role with cybersecurity oriented principles to ... Implementation Guidelines (STIGs) applicable to each Non-classified or Secret Internet Protocol (IP) Router Network (NIPRNet, SIPRNet) environment for all ACAS… more
    Leidos (11/29/24)
    - Save Job - Related Jobs - Block Source
  • Senior Network Security Analyst

    Battelle Memorial Institute (Columbus, OH)
    …**Job Summary** Battelle is seeking a **Senior Network Security Analyst** for our Cyber Business Line. This position has the flexibility to operate from either our ... team to collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems as an expert on… more
    Battelle Memorial Institute (12/31/24)
    - Save Job - Related Jobs - Block Source
  • Unified Capabilities (UC) NOC Technician 4

    ISYS Technologies (Ogden, UT)
    …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you… more
    ISYS Technologies (01/02/25)
    - Save Job - Related Jobs - Block Source
  • Defense Red Switch Network (DRSN) Support…

    Leidos (O'Fallon, IL)
    …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... **Job Description:** The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Defense Red Switch Network… more
    Leidos (12/19/24)
    - Save Job - Related Jobs - Block Source
  • Junior Network Engineer

    SOS International LLC (Pearl Harbor, HI)
    …Familiar with Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. + Experience ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more
    SOS International LLC (01/14/25)
    - Save Job - Related Jobs - Block Source