• Principal Cyber Systems Engineer

    Northrop Grumman (Linthicum Heights, MD)
    …and technology and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. Northrop Grumman is seeking a **Principal ... Cyber Security Engineer** to join the Mission Systems Sector Chief Information Security Office supporting its mission of defending and protecting the company's networks, systems, data, intellectual property, and personal information wherever it resides.… more
    Northrop Grumman (11/15/25)
    - Related Jobs
  • Senior Systems Engineer

    Belay Technologies (MD)
    …understanding of techniques, tools, behaviors and strategies used in computer network exploitation + Familiarly with more common network protocols (TCP, UDP, ICMP, ... HTTP, SMTP, SSH, etc.) + Knowledge of Agency processing system to write plugins and fingerprints Perks and Benefits: + 8 weeks paid leave - 4 weeks of personal leave, 3 Yay! days, take off on your birthday,11 paid holidays and optional leave up to 6 days… more
    Belay Technologies (11/13/25)
    - Related Jobs
  • Supv, Cyber Defense Security Ops Center

    Exelon (Owings Mills, MD)
    …enumeration, gaining access, escalation or privileges, maintaining access, network exploitation , covering tracks). + Knowledge of network security architecture ... concepts including topology, protocols, components, and principles (eg, application of defense-in-depth). + Knowledge of OSI model and underlying network protocols (eg, TCP/IP). **Preferred Qualifications** + Graduate degree in cyber security or related area… more
    Exelon (11/12/25)
    - Related Jobs
  • Offensive Cyberspace Operations Planner

    BOOZ, ALLEN & HAMILTON, INC. (Fort Meade, MD)
    …Management Coordi nato r, including signals intelligence ( SIGINT ) processing, exploitation , and dissemination ( PED ) management in support of mission ... requirements. Provide subject matter expert ( SME ) support to Data Flow and Cyber Infrastructure and maintain operational dataflow on cryptologic systems in service and joint platforms. Provide SME support to Offensive Cyberspace Operations ( OCO ) and SIGINT… more
    BOOZ, ALLEN & HAMILTON, INC. (11/11/25)
    - Related Jobs
  • Reverse Engineer

    CACI International (Annapolis Junction, MD)
    …Join our dynamic team as a Reverse Engineer with a focus on malware exploitation (MEX) and mobile capabilities. This role offers a unique chance to make a ... significant impact by enhancing our endpoint and mobile toolsets. You will be at the forefront of analyzing and advancing our technologies to meet the ever-evolving cybersecurity landscape. If you are passionate about reverse engineering, malware analysis, and… more
    CACI International (11/11/25)
    - Related Jobs
  • Cyberspace Exercise Planner

    HII (Annapolis, MD)
    …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and… more
    HII (11/08/25)
    - Related Jobs
  • Principal Project Management - Risk Management…

    Northrop Grumman (Linthicum Heights, MD)
    …risk and opportunity handling approaches, mitigation plans and approves opportunity exploitation plans. + Coordinates with suppliers, vendors, higher level managers, ... and external Customers on general risk and opportunity metrics to evaluate the effectiveness of the risk and opportunity management process and procedures. + Assure integration of the EVMS process with the risk and opportunity management process. + Inform and… more
    Northrop Grumman (11/08/25)
    - Related Jobs
  • Mobile CNO Developer 2

    ARSIEM (Annapolis Junction, MD)
    …Dispatch + Understanding of network protocols and sockets, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering ... concepts + Experience with project management best practices such as Scrum and Kanban methodologies + Experience with version control systems (eg, Git) along with an understanding of basic configuration management principles The ARSIEM pay range for this job… more
    ARSIEM (11/07/25)
    - Related Jobs
  • Splunk Architect / SOC Analyst

    DarkStar Intelligence LLC (Fort Meade, MD)
    …/ Blue / Purple Team Awareness + Apply an attacker mindset to anticipate exploitation paths and identify blind spots. + Evaluate how techniques such as lateral ... movement, privilege escalation, and persistence appear in logs. + Communicate effectively with offensive and defensive stakeholders to close detection gaps. Operating System & Infrastructure Understanding + Explain how Linux and Windows systems behave during… more
    DarkStar Intelligence LLC (11/06/25)
    - Related Jobs
  • Data Scientist

    Concurrent Technologies Corporation (Fort Meade, MD)
    …platforms. + Knowledge of AI/ML tools for signal and sensor data exploitation . + Experience with time-series databases and geospatial data processing. Benefits: + ... The starting salary range for this position has been established as $114,000 - $160,000 + Medical Insurance and Prescription + Dental Insurance + Vision Insurance + Life and AD&D Insurance + Short-Term/Long-Term Disability Insurance + Employee Assistance… more
    Concurrent Technologies Corporation (11/06/25)
    - Related Jobs