- Nightwing (Arlington, VA)
- …and procedures of various criminal, insider, hacktivist, and nation state threat actors to identify and validate threats - Applying cybersecurity concepts to the ... detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data - Conducting cursory analysis of log data - Identifying the cause of an incident and recognizing the key elements to ask external entities… more
- Cengage Group (Virginia Beach, VA)
- …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
- Cengage Group (Virginia Beach, VA)
- …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
- ENS Solutions (Arlington, VA)
- …change management + Knowledge of key cyber threats, including nation state actors , malware or ransomware, command and control infrastructures, and mitigations + ... Ability to collaborate with the professional confidence and credibility to effectively engage and interact with technologists and leaders across the enterprise + Ability to quickly comprehend complex problems, draw logical conclusions, make sound decisions,… more
- Google (Reston, VA)
- …scale the code to keep it working and to harden it against all the bad actors of the internet. We drive reliability and performance on a massive scale. You will work ... on software development projects to keep important business generating-critical systems up and running, from code-level troubleshooting of traffic anomalies to maintenance of our services, from monitoring and alerts to building automation infrastructure.… more
- ICF (Arlington, VA)
- …cyber-attacks work, how vulnerabilities are exploited, and the way hostile cyber actors operate. Utilize your skills to help experiment and prototype future cyber ... capabilities for implementation at large-scale. As the Data Mining and Analytics Engineer, your exceptional skillset will create useful and actionable insight for the customer through the development of analytic solutions (hardware, analytics, tools,… more
- ICF (Arlington, VA)
- …how cyber-attacks work, how vulnerabilities are exploited, and the way hostile cyber actors operate. We are looking for individuals that want to analyze and ... understand data to identify anomalies. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at large-scale. As the Software Developer, you will work with our customers, program subject matter experts, and… more
- Amentum (Quantico, VA)
- …Follow technology transfer and its military impact and ability of recipient actors to assimilate transferred technology. + Apply knowledge of foreign military system ... capabilities and limitations to assess opportunities for USMC exploitation and USMC system and doctrine vulnerabilities. + Produce written intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level. + Assess… more
- Cengage Group (Virginia Beach, VA)
- …there has been an increase of targeted recruitment_** **_scams perpetrated by bad actors falsely providing job offers on behalf Cengage Group to candidates as a ... means of obtaining personal information. Note that Cengage will always interview candidates via live in-person meetings, phone calls and video calls before an offer would be extended. Also, be sure to check that communication is coming from an @cengage.com… more
- Wiser (Quantico, VA)
- …Follow technology transfer and its military impact and ability of recipient actors to assimilate transferred technology. + Apply knowledge of foreign military system ... capabilities and limitations to assess opportunities for USMC exploitation and USMC system and doctrine vulnerabilities. + Produce written intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level. + Assess… more