- Pentagon Force Protection Agency (VA)
- …Pentagon Facilities. The incumbent serves on the Emergency Response Team (ERT) and Counter Assault Team (CAT) performing a full range of police officer functions in ... Response Team (ERT), responding and mitigating high threat critical incidents and/or Counter Assault Team (CAT), responsible for providing tactical support to the… more
- Leidos (Springfield, VA)
- …Experience with User Activity Monitoring products and platforms + Certified Counter -Insider Threat Professional - Fundamentals (CCITP-F) + Certified Counter ... -Insider Threat Professional - Analysis (CCITP-A) + Completion of Center for Development of Security Excellence (CDSE) Insider Threat Detection Analysis Course (ITDAC) + Completion of Workplace Assessment of Violence Risk (WAVR-21) Workshop + Completion of… more
- Cipher Tech Solutions (Vienna, VA)
- …used to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... the use of illegal substances, the misuse of prescriptions, the misuse of over-the- counter substances, and the use of medical or recreational marijuana that may be… more
- Amentum (Reston, VA)
- …Office to drive DoD policy, planning, and operational decisions to counter regional and transnational terrorism threats. We conduct mission-critical counterterrorism ... network development analysis. Provides analytic support to counterterrorism and counter insurgency operations. Supports the tracking, identifying, entering, and… more
- Cipher Tech Solutions (Vienna, VA)
- …used to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... the use of illegal substances, the misuse of prescriptions, the misuse of over-the- counter substances, and the use of medical or recreational marijuana that may be… more
- CACI International (Virginia Beach, VA)
- …and the USSOCOM Enterprise in their efforts to identify, characterize and counter WMD and Irregular Warfare threat networks capable of threatening US National ... capabilities through the use of Cyber techniques to identify, characterize and counter WMD and Irregular Warfare threats and the networks that employ those… more
- Cipher Tech Solutions (Vienna, VA)
- …used to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... the use of illegal substances, the misuse of prescriptions, the misuse of over-the- counter substances, and the use of medical or recreational marijuana that may be… more
- Cipher Tech Solutions (Vienna, VA)
- …used to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... the use of illegal substances, the misuse of prescriptions, the misuse of over-the- counter substances, and the use of medical or recreational marijuana that may be… more
- SOS International LLC (Reston, VA)
- …all-source analysis with a focus on network analysis to enable CWMD, counter proliferation, counter -improvised threats, CWMD mission support, CWMD capabilities ... support, CWMD partner support, and nuclear enterprise defense. + Provide innovative research and analysis to better understand threat value chain and associated personalities, nodes, relationships, and activities comprising and characterizing improvised… more
- Cipher Tech Solutions (Vienna, VA)
- …to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... the use of illegal substances, the misuse of prescriptions, the misuse of over-the- counter substances, and the use of medical or recreational marijuana that may be… more