• Data Scientist

    Guidehouse (Springfield, VA)
    …Federal or DoD security clearance; must UPGRADE and MAINTAIN a TS/SCI with a COUNTERINTELLIGENCE (CI) polygraph + Bachelor's Degree + Minimum of EIGHT (8) years of ... working experience + Demonstrated experience developing visualizations and conducting data analysis + Demonstrated experience utilizing computer programs, software, or some coding language **What Would Be Nice To Have** **:** + Demonstrated experience… more
    Guidehouse (07/19/25)
    - Related Jobs
  • Hybrid Software Reverse Engineer: All Levels…

    Cipher Tech Solutions (Vienna, VA)
    …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
    Cipher Tech Solutions (07/18/25)
    - Related Jobs
  • Software/Web Developer: All Experience Levels…

    Cipher Tech Solutions (Vienna, VA)
    …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
    Cipher Tech Solutions (07/18/25)
    - Related Jobs
  • American Sign Language (ASL) Interpreter…

    Cipher Tech Solutions (Vienna, VA)
    …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
    Cipher Tech Solutions (07/18/25)
    - Related Jobs
  • Continuous Evaluation (CE)/Vetting (CV)…

    Amentum (Springfield, VA)
    …of the Inspector General, Office of Counter Insider Threat, Office of Counterintelligence , Office of General Council, Human Development), and/or others as directed ... by SISPV leadership. + Collect and develop information from a variety of sources. Follow-up as appropriate to ensure timely action on all CEP events. + Prepare quality ROIs which are accurate, detailed, succinct and in an organized manner not to exceed a 5%… more
    Amentum (07/18/25)
    - Related Jobs
  • American Sign Language (ASL) Interpreter - Future…

    Cipher Tech Solutions (Vienna, VA)
    …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
    Cipher Tech Solutions (07/18/25)
    - Related Jobs
  • Information System Security Eng (ISSE) III

    Global Resource Solutions (Arlington, VA)
    …for access to Special Access Programs + Willingness to submit to a Counterintelligence Polygraph Skills: + Advanced technical competency in one or more of the ... following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability… more
    Global Resource Solutions (07/17/25)
    - Related Jobs
  • CSOS Analyst Tier 3

    General Dynamics Information Technology (Springfield, VA)
    …+ Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law ... enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; + Collaborates with appropriate authorities in the production of security incident reports; + Categorizes incidents and events; + Coordinates… more
    General Dynamics Information Technology (07/16/25)
    - Related Jobs
  • Operations Advisor

    Leidos (Reston, VA)
    …solutions to operational challenge + Demonstrated success in applying counterintelligence and risk management principles to safeguard operations. + Demonstrated ... success in managing US government policies, and regulations in support of operations. + Proficient in various writing and briefing styles. + Ability to write products in clear and concise manner under a short deadline. + Demonstrated success in briefing senior… more
    Leidos (07/16/25)
    - Related Jobs
  • Program Integrator

    Acclaim Technical Services (Reston, VA)
    …and timeline expectations. + Prior experience with the administrative, counterintelligence , security, and legal governance of Customer outreach. + Demonstrated ... expertise deconflicting activities across Customer HQs and field stakeholders. + Proactive spirit toward search and discovery of potential stakeholders and records. + Expertise in preemptively identifying sources of conflict among stakeholders and potential… more
    Acclaim Technical Services (07/16/25)
    - Related Jobs