- ASM Research, An Accenture Federal Services Company (Fort Meade, MD)
- …+ Bachelor's Degree in Computer Science, Information Systems or a related field or equivalent relevant experience. + 5-10 years of experience with programming or web ... Responsible for a development project, may provide general oversight and direction to the developers on the project in an experienced developer capacity. Conceives, designs, and tests logical structure to meet program requirements. Writes programs according to… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... About the Cyber System Assessment Group: The Cyber ...+ Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …include cyber tool prototyping, technical analysis of offensive cyber tools, automated vulnerability discovery , reverse engineering, static analysis , ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Leidos (Odenton, MD)
- …hold a Top Secret/SCI clearance._** **Primary Responsibilities** : + Perform computer protocol analysis and session reassembly of known and unidentified ... join our team as a Cryptologic Computer Scientist supporting cyber operations at Ft Meade, Maryland. **_To qualify for...technical field. + Relevant experience must be in signals analysis , including protocol analysis , and… more
- CACI International (Annapolis Junction, MD)
- …analytic methodology by implementing tradecraft associated with identifying vulnerabilities, cyber discovery , and strategies. **You'll Bring These ... technology principles, theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas. * Experience working on… more
- Battelle Memorial Institute (Chantilly, VA)
- …experiences and welcome all qualified individuals to apply. **Job Summary** Battelle's Cyber team is seeking a **Network Security Analyst- SkillBridge Intern** to ... collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems. The position location is… more
- Battelle Memorial Institute (Chantilly, VA)
- …and hardware, so our engineer have everything they need to invent new Cyber solutions. We encourage new ideas with our large Internal Research and Development ... organization on projects ranging from genomics to robotics. **Battelle Cyber Online** GitHub: https://github.com/Battelle Battelle Cyber Challenge:… more
- Hawaiian Electric (Honolulu, HI)
- …Entry Level: + 1-3 years of experience in Systems administration, basic cyber analysis /operations, cyber threats, risk management, network management, ... + Assists with program development and management for privacy, e- discovery , security awareness training, digital forensics, vulnerability remediation, and other… more
- Battelle Memorial Institute (Augusta, GA)
- …challenging and meaningful projects + Pursue ideas in scientific and technological discovery + Collaborate with world-class experts in an inclusive environment + ... the next generation of scientific leaders and business professionals Battelle's Cyber team is seeking **SkillBrigde Network Security Analyst** candidates to collect… more
- Battelle Memorial Institute (Columbus, OH)
- …**Job Summary** Battelle is seeking a **Senior Network Security Analyst** for our Cyber Business Line. This position has the flexibility to operate from either our ... team to collect information, identify vulnerabilities, analyze risk to mission, and address cyber security issues in computer networks and systems as an expert on… more
- Leidos (Scott Air Force Base, IL)
- …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... **Job Description:** The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Unified Capabilities (UC) NOC… more
- SOS International LLC (Pearl Harbor, HI)
- …Familiar with Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. + Experience ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more
- Battelle Memorial Institute (Columbus, OH)
- …**Job Summary** Battelle is seeking a **Senior Network Security Researcher** for our Cyber Business Line. This position has the flexibility to operate from either ... portions of a customer network in a lab environment for troubleshooting and analysis + Research techniques used by Advanced Persistent Threats (APT) to move and… more
- Marriott (Bethesda, MD)
- …working with several of these technologies: Data Loss Prevention (DLP), Data Discovery , Cloud Security Access Broker (CASB), Data Rights Management (DRM), SSL ... protect sensitive data on managed networks. + Conducting cloud security analysis of Cloud platforms/environments. + Performing onboarding of data security services… more
- SMX (Quantico, VA)
- …remediation + Ensure that any latency is identified and mitigated/remediated upon discovery in accordance with required response times + Monitor availability of ... system upgrades + Provide analysis and remediation for DISA Security Technical Implementation Guidelines (STIG) for all responsible technologies in preparation for… more