• Cyberspace Exercise Planner

    Huntington Ingalls Industries (Annapolis Junction, MD)
    …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and… more
    Huntington Ingalls Industries (09/27/25)
    - Related Jobs
  • Diesel Mechanic / Technician II

    National Express (Odenton, MD)
    …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
    National Express (09/26/25)
    - Related Jobs
  • Software Engineer (Engineer Software 2)

    Huntington Ingalls Industries (Hanover, MD)
    …differ widely over time, but current projects focus on improving the exploitation of airborne sensor data through object tracking, multi-sensor correlation, and ... operational data display. Possible Duties: + Research and concept development for solutions to unaddressed, critical military operational shortfalls. + System design and software implementation of proof-of-concept prototypes incorporating a variety of… more
    Huntington Ingalls Industries (09/26/25)
    - Related Jobs
  • Sr. Cyberspace Analyst

    Huntington Ingalls Industries (Fort Meade, MD)
    …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security. + Coordination and support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports. + Engaging with FCC or DIB on network… more
    Huntington Ingalls Industries (09/25/25)
    - Related Jobs
  • Configuration Manager

    Leidos (Bethesda, MD)
    …opening for you as our next Configuration Manager supporting DIA-National Digital Exploitation & OSINT Center (NDOC) under our 10-year DOMEX Technology Platform ... (DTP) contract. Have impact as part of a mission focused, solutions oriented, and adaptive team that values innovation, collaboration, and professional development. You will play a key role with the testing and development of software for multiple task orders,… more
    Leidos (09/25/25)
    - Related Jobs
  • Bus Assistant - No Exp Needed - Training Provided

    National Express (Odenton, MD)
    …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
    National Express (09/25/25)
    - Related Jobs
  • Director, Vulnerability Management Solutions

    Marriott (Bethesda, MD)
    …of the lifecycle of cyberspace threats, attack vectors, and methods of exploitation , especially as they relate to global environment. It requires participation in ... designing, building, and maintaining integrations between various internal and SaaS applications. Maintaining operational and technical documentation related to the operational lifecycle of supported solutions is required, as is identifying improvements to… more
    Marriott (09/24/25)
    - Related Jobs
  • Cyber Analyst

    RBR-Technologies (Fort Meade, MD)
    …Unpatched software, weak APIS, etc + Ability to identify common exploitation techniques like SQL Injection, buffer overflow, phishing, malware + Comprehensive ... understanding and/or experience with Cloud Infrastructure and/or Cloud Security tools and services (IAM, CI/CD, WAF, CASB, Cloud tools) + Understanding Zero Trust concepts and solutions (Seven Pillars, Capabilities, Activities, ZT Strategy, etc.) + Excellent… more
    RBR-Technologies (09/20/25)
    - Related Jobs
  • TS/SCI Cyber Analyst

    Insight Global (Fort Meade, MD)
    …Unpatched software, weak APIS, etc Ability to identify common exploitation techniques like SQL Injection, buffer overflow, phishing, malware Comprehensive ... understanding or experience with Cloud Infrastructure and/or Cloud Security tools and services (IAM, CI/CD, WAF, CASB, Cloud tools) Understanding and implementation of Zero Trust concepts and solutions (Seven Pillars, Capabilities, Activities, ZT Strategy,… more
    Insight Global (09/19/25)
    - Related Jobs
  • Program Manager - Remote (Mgr Programs 2)

    Huntington Ingalls Industries (Hanover, MD)
    …differ widely over time, but current projects focus on improving the exploitation of airborne sensor data through object tracking, multi-sensor correlation, and ... operational data display. Learn more about Mission Technologies: https://www.youtube.com/watch?v=UbjSrHXi6JA You will be expected to travel monthly to visit team leadership and customer sites. Essential Job Responsibilities Responsible for the profit and loss… more
    Huntington Ingalls Industries (09/18/25)
    - Related Jobs