- Northrop Grumman (Linthicum Heights, MD)
- …and technology and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. Northrop Grumman is seeking a **Principal ... Cyber Security Engineer** to join the Mission Systems Sector Chief Information Security Office supporting its mission of defending and protecting the company's networks, systems, data, intellectual property, and personal information wherever it resides.… more
- Belay Technologies (MD)
- …understanding of techniques, tools, behaviors and strategies used in computer network exploitation + Familiarly with more common network protocols (TCP, UDP, ICMP, ... HTTP, SMTP, SSH, etc.) + Knowledge of Agency processing system to write plugins and fingerprints Perks and Benefits: + 8 weeks paid leave - 4 weeks of personal leave, 3 Yay! days, take off on your birthday,11 paid holidays and optional leave up to 6 days… more
- Exelon (Owings Mills, MD)
- …enumeration, gaining access, escalation or privileges, maintaining access, network exploitation , covering tracks). + Knowledge of network security architecture ... concepts including topology, protocols, components, and principles (eg, application of defense-in-depth). + Knowledge of OSI model and underlying network protocols (eg, TCP/IP). **Preferred Qualifications** + Graduate degree in cyber security or related area… more
- BOOZ, ALLEN & HAMILTON, INC. (Fort Meade, MD)
- …Management Coordi nato r, including signals intelligence ( SIGINT ) processing, exploitation , and dissemination ( PED ) management in support of mission ... requirements. Provide subject matter expert ( SME ) support to Data Flow and Cyber Infrastructure and maintain operational dataflow on cryptologic systems in service and joint platforms. Provide SME support to Offensive Cyberspace Operations ( OCO ) and SIGINT… more
- CACI International (Annapolis Junction, MD)
- …Join our dynamic team as a Reverse Engineer with a focus on malware exploitation (MEX) and mobile capabilities. This role offers a unique chance to make a ... significant impact by enhancing our endpoint and mobile toolsets. You will be at the forefront of analyzing and advancing our technologies to meet the ever-evolving cybersecurity landscape. If you are passionate about reverse engineering, malware analysis, and… more
- HII (Annapolis, MD)
- …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and… more
- Northrop Grumman (Linthicum Heights, MD)
- …risk and opportunity handling approaches, mitigation plans and approves opportunity exploitation plans. + Coordinates with suppliers, vendors, higher level managers, ... and external Customers on general risk and opportunity metrics to evaluate the effectiveness of the risk and opportunity management process and procedures. + Assure integration of the EVMS process with the risk and opportunity management process. + Inform and… more
- ARSIEM (Annapolis Junction, MD)
- …Dispatch + Understanding of network protocols and sockets, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering ... concepts + Experience with project management best practices such as Scrum and Kanban methodologies + Experience with version control systems (eg, Git) along with an understanding of basic configuration management principles The ARSIEM pay range for this job… more
- DarkStar Intelligence LLC (Fort Meade, MD)
- …/ Blue / Purple Team Awareness + Apply an attacker mindset to anticipate exploitation paths and identify blind spots. + Evaluate how techniques such as lateral ... movement, privilege escalation, and persistence appear in logs. + Communicate effectively with offensive and defensive stakeholders to close detection gaps. Operating System & Infrastructure Understanding + Explain how Linux and Windows systems behave during… more
- Concurrent Technologies Corporation (Fort Meade, MD)
- …platforms. + Knowledge of AI/ML tools for signal and sensor data exploitation . + Experience with time-series databases and geospatial data processing. Benefits: + ... The starting salary range for this position has been established as $114,000 - $160,000 + Medical Insurance and Prescription + Dental Insurance + Vision Insurance + Life and AD&D Insurance + Short-Term/Long-Term Disability Insurance + Employee Assistance… more