- Huntington Ingalls Industries (Fort Meade, MD)
- …solutions. At HII Misson Technologies, we provide critical support to intelligence agencies and defense organizations, leveraging the latest advancements ... warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests...Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …solutions. At HII Misson Technologies, we provide critical support to intelligence agencies and defense organizations, leveraging the latest advancements ... warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests...Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a… more
- BOOZ, ALLEN & HAMILTON, INC. (Washington, DC)
- Artificial Intelligence Product Owner The Opportunity: Do you emb race a dynamic work environment and want to work where Information Technology ( IT ) underpins the ... project management + 5+ years of experience supporting programs within the Department of Defense ( DoD ) + Experience as a product owner, including with generative… more
- L3Harris (Washington, DC)
- …everything we do. L3Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees ... security researchers and product engineers from across the security research and intelligence communities. You will be engaged on the most challenging problems in… more
- Bank of America (Washington, DC)
- …on malware/tool development and adversary emulation to join our Cyber Threat Hunt, Intelligence and Defense organization. This role is centered around building ... and deploying advanced offensive security capabilities through R&D, custom tooling, and red team operations. The ideal candidate will have a deep understanding of modern endpoint detection and response (EDR) technologies, experience with low-level programming… more
- Amazon (Arlington, VA)
- …and adoption of Amazon Web Services (AWS) by facilitating relationships with US Intelligence and Defense organizations that are reinventing their IT strategy ... with AWS cloud computing? Do you have the writing and story-telling skills, public sector proposal experience, and the technical background necessary to help further establish and differentiate Amazon as the leading cloud provider? As a member of the Worldwide… more
- Synergy ECP (Landover, MD)
- …of cybersecurity, software and systems engineering and IT services to the US intelligence and defense communities. The company leverages its expertise in data ... transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security. In an ultra-competitive environment, Synergy ECP has thrived by… more
- Synergy ECP (Landover, MD)
- …of cybersecurity, software and systems engineering and IT services to the US intelligence and defense communities. The company leverages its expertise in data ... transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security. In an ultra-competitive environment, Synergy ECP has thrived by… more
- Synergy ECP (Landover, MD)
- …of cybersecurity, software and systems engineering and IT services to the US intelligence and defense communities. The company leverages its expertise in data ... transport solutions, software and systems engineering, and other solutions to deliver critical and innovative capabilities to high-level decision makers that enhance our nation's security. In an ultra-competitive environment, Synergy ECP has thrived by… more
- Leidos (Alexandria, VA)
- …with malware analysis concepts and methods. + Familiarity or experience in Intelligence Driven Defense , Cyber Kill Chain methodology, and/or MITRE ATT&CK ... framework. **About our Program:** Through the J6 Penetration Handling, Incident, System Health (PHISH) support services task order on the GSM-O contract, we provide IT products, services and solutions to the Pentagon and other DoD offices and agencies for them… more