- SOS International LLC (Fort Belvoir, VA)
- …supporting finished intelligence analysis. + Active DoD TS/SCI clearance with Counterintelligence Poly. + Proficient in conducting all-source analysis of foreign ... defense industrial programs, infrastructure, and capabilities supporting a foreign country's ability to develop, equip, sustain, and employ its military forces across basic, strategic, and military industrial sectors. + Experience assessing the research,… more
- Amentum (Fort Belvoir, VA)
- …experience **Clearance Requirement:** + TS/SCI (must be willing to undergo a Counterintelligence Polygraph if directed by client) Amentum is proud to be an ... Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
- Navy Federal Credit Union (Vienna, VA)
- …+ Credentialed federal agent (former/retired)- cyber support to counterintelligence investigative and operational authorities and experience + Bachelor's ... degree in Cybersecurity, Computer Science, Digital Forensics, Criminal Justice, or related field, or equivalent combination of education and experience. + Extensive experience in cyber investigations, digital forensics, and insider threat detection within… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
- Cipher Tech Solutions (Vienna, VA)
- …work are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the ... practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
Recent Jobs
-
Medical Student Engagement Coordinator
- Touro University (Valhalla, NY)