- Xcelerate Solutions (Bethesda, MD)
- …artificial intelligence (Al), machine learning (ML) and cross-domain transfer systems to provide cutting edge requirements management, task coordination, data ... a great position for a current or former intelligence analyst or intelligence instructor that is driven to 1)...1) help others, 2) develop tradecraft, 3) solve problems, 4 ) and is enthusiastic, friendly, and enjoys working with… more
- GliaCell Technologies (Fort Meade, MD)
- …Make It Happen! GliaCell Technologies focuses on Software & System Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and ... and the integration of industry standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud… more
- SAIC (Germantown, MD)
- …markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; ... currently seeking a motivated, career and customer service-oriented Sr. Tier II Help Desk Analyst to begin an exciting and challenging career with SAIC. In this role… more
- GliaCell Technologies (Laurel, MD)
- …Make It Happen! GliaCell Technologies focuses on Software & System Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and ... and the integration of industry standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud… more
- SAIC (Linthicum, MD)
- …markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; ... sufficient. + Write MS Access queries for custom, on-demand reports based on analyst requests. + Troubleshoot MS Access database issues. + Utilize scripting ability… more
- Lincoln Financial (Annapolis, MD)
- …data and context necessary to initiate IR response. In addition, the analyst will be responsible for maintaining multiple security technologies for detecting and ... host-based analysis functions through investigating Windows, Linux, and Mac OS X systems to identify suspicious and malicious activities. + Maintain expertise in… more