- Huntington Ingalls Industries (Fort Meade, MD)
- …finished intelligence maintaining traceability to the original sources. + Performs exploitation analysis coordination with National labs. + Demonstrate expertise in ... critical thinking and analytic skills in determining trends, POL, changes in TTPs and examining improvised threats from an adversary's perspective. + Demonstrated knowledge of CEXC, WTI, C-IED, TEDAC and WTI Lexicons, use appropriately in required products.… more
- Global Dimensions (Fort Meade, MD)
- …Foreign Partner government personnel on advanced TTPs for collection and exploitation of current and emerging technologies and protocols for SIGINT. Senior ... Full Mission Profile Instructor will: + Develop, update, review, and deliver (instruct/present) required POI techniques, tactics, and procedures for Full Mission Profile, Cellular, and Push-To-Talk (PTT) Courses (See FMP Course SOW and FMP Validation Course… more
- Leidos (Bethesda, MD)
- …Identity and Access Management (IdAM) Engineer to support the National Media Exploitation Center (NMEC). The System Administrator will be responsible for maintaining ... existing enterprise identity management solutions, troubleshoot incidents, and assist with transitioning new capabilities to production. Duties will include validating the health and status, operations, and maintenance of identity management systems such as… more
- Intermountain Health (Annapolis, MD)
- …agencies including DCSF, APS, and law enforcement when abuse, neglect or exploitation is suspected or confirmed. May provide therapeutic modalities appropriate to ... the level of care. Acts within the scope of the Mental Health Practice Act. **Minimum Qualifications** + Master's Degree in Social Work. Education must be obtained from an accredited institution. Degree will be verified. + Current State Licensure as a CSW or… more
- Global Dimensions (Fort Meade, MD)
- …Foreign Partner government personnel on advanced TTPs for collection and exploitation of current and emerging technologies and protocols for SIGINT. Senior ... Wireless (Wi-Fi) Instructor / Network Engineer will: + Develop, update, review, and deliver (instruct/present) required POI techniques, tactics, and procedures for Advanced Wi-Fi Operations courses (See Wi-Fi Course SOW). This shall include tasks such as: +… more
- Travelers Insurance Company (Hunt Valley, MD)
- …groups and other Technology teams on application development, new feature exploitation , proof of concepts, security enhancements, etc. + Attending and sometimes ... running monthly meetings with IBM and ISV to discuss product roadmaps, incidents, etc. + Connecting CICS & IMS to other technologies such as MQ and DB2, configuring z/OS Connect to enable application API deployments and to invoke CICS transactions, and… more
- Leidos (Fort Meade, MD)
- …with Cryptologic and/or Space Operations (ie tasking, collection, processing, exploitation and dissemination (TCPED) + ELINT, COMINT, Analysis and Reporting ... (Fusion) experience + Must have demonstrated National Intelligence experience + Experience with training and force development/management + Extensive familiarity with applicable Space, Military, and NSA Policy and Guidance, Operations, and Staff Functions +… more
- V2X (Suitland, MD)
- …years of experience performing open source/PAI research OR social media research and exploitation * Minimum 3 years of experience performing quality control of Farsi ... language translations* Minimum 5 years of experience producing all source intelligence products in accordance with IC directives and classification guidelines* Minimum 2 years of experience supporting network targeting through research and analysis*… more
- Intrepid Solutions and Services (Bethesda, MD)
- …a future program supporting an Intelligence customer and their National Media Exploitation Center (NMEC) enterprise. This Cybersecurity Lead is essential in ensuring ... the security and integrity of NMEC's Information Technology systems and DOMEX network enclaves. The Cybersecurity Lead will spearhead cybersecurity risk management, continuous monitoring, and Computer Network Defense (CND) operations, while leading integration… more
- CACI International (Aberdeen Proving Ground, MD)
- …the Tactical to Strategic level as it relates to UAS and UMS exploitation across multiple Intelligence Disciplines (ELINT, SIGINT, IMINT, HUMINT, and FISINT) and ... show knowledge on how to publish findings to the greater DoD. + Demonstrates ability to provide over the shoulder support to DoD personnel on UAS and ISR Capabilities for a wide range of Threat Actors to include CT and Near-Peer adversaries in order to inject… more