- Leidos (Bethesda, MD)
- …the IT Operations & Maintenance (O&M) responsibilities of the National Media Exploitation Center (NMEC). In this pivotal role, the Systems Engineer will spearhead ... the team's endeavors to deliver comprehensive, adaptable, and center-centric IT O&M services. This entails managing a dynamic environment encompassing a hybrid data center model and multiple network enclaves that support a diverse range of applications. The… more
- Leidos (Odenton, MD)
- …Intelligence Agency **SIGINT school.** + Solid background in **Tactical Processing, Exploitation , and Dissemination (PED)** . + Expertise in ISR platforms and ... direct collaboration with national and strategic intelligence missions. + Strong familiarity with the **Joint Command and DoD structure.** **What Sets You Apart (Preferred Qualifications):** + In-depth understanding of **TechSIGINT policy** and advanced-level… more
- Leidos (Fort Meade, MD)
- …in lieu of a degree). + In-depth understanding of Tactical Processing, Exploitation , and Dissemination (PED) challenges. + Experience as an airborne RC-135 SIGINT ... intelligence operator/crewmember. + Proven expertise in exploiting and reporting data from ISR sensors and platforms. + Significant experience directly supporting and collaborating with operational, national, and strategic Intelligence Community missions and… more
- CACI International (Annapolis Junction, MD)
- …looking for a skilled Reverse Engineer 2 with expertise in malware exploitation (MEX) or mobile-focused capabilities. The candidate will leverage experience in ... Computer Network Operations (CNO) reverse engineering and development-primarily using Python-to enhance access capabilities and drive innovative solutions. This work will be integral to analyzing and advancing our endpoint and mobile toolsets to meet evolving… more
- RELX INC (Annapolis, MD)
- …improvement and remediation programs. + Possess vulnerability assessment, exploitation techniques, malware reverse engineering, threat analysis, and security ... threat and incident reporting. + Able to participate in the investigation and navigation in Cloud and Web-based environments. + Possess any of the following Licensing/certification : CCFE, GCFE, CISSP, CISM, SANS, GIAC, ISACA, CSRIC (or related), ethical… more
- Leidos (Bethesda, MD)
- …is seeking a Citrix Systems Administrator to support the National Media Exploitation Center (NMEC). The Administrator will provide operations support to customers ... across multiple geographic locations. They will provide operations and maintenance support to existing Citrix VDI environments across multiple enclaves and assist with the implementation of new solutions. The administrator will help drive adoption of trusted… more
- Shuvel Digital (MD)
- …for a senior-level CNO Developer/ Engineer Capable of developing cyber capabilities and exploitation tools at the speed of need. The candidate will be responsible ... for researching, developing, architecting, and testing cyber capabilities/ tools, and techniques within existing or new environments. Successful candidates for this role must have critical thinking skills, and problem-solving skills, be creative, curious,… more
- CACI International (Aberdeen Proving Ground, MD)
- …US * * * CACI is looking for a Reverse/Cyber Engineer to join our exploitation team at Aberdeen Proving Ground, Maryland. This role will focus on the de-compilation ... and analysis of software and firmware of interest. The candidate will function independently to develop a plan of attack for performing the required analysis and execute that plan based on their expertise. **Required Qualifications** + Bachelors in Computer… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and… more