- Leidos (Gaithersburg, MD)
- …will join our innovative software team, creating next-generation capabilities for GEOINT exploitation and analysis. The ideal candidate will possess a strong blend ... of software engineering expertise, deep understanding of cloud environments, extensive experience in the GEOINT domain, and proven leadership abilities on software projects. This pivotal role involves acting as a day-to-day technical visionary and… more
- Highmark Health (Annapolis, MD)
- …high availability through the use of third party technologies and through the exploitation of various database features. + Take a lead role in providing applications ... support for staff, as well as, outside division to answer questions and resolve problems related to the DBMS technology and computing platform such as Z/OS, UNIX, Linux, and Windows + Take a lead role in conducting root cause analysis to identify and resolve… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and… more
- National Express (Baltimore, MD)
- …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
- R4 Incorporated (Aberdeen, MD)
- …Functions: Measure and report against the technical characterization and exploitation of homemade, custom and commercial-grade electronic circuits for multi-agency ... customers. Abilities required The regular exercise of ingenuity, creativity, analytical problem solving skills and tact will be required to solve complex problems in a fast-paced environment. The candidate is required to have the following abilities:… more
- Huntington Ingalls Industries (Hanover, MD)
- …current initiatives are focused on revolutionizing airborne sensor data exploitation through advanced object tracking, multi-sensor correlation, and intuitive ... operational data displays. Your impactful contributions could include: + Directly collaborating with customers to shape the product backlog for your Scrum team. + Designing and implementing groundbreaking proof-of-concept prototypes that span a diverse range… more
- General Dynamics Information Technology (Andrews AFB, MD)
- …GDIT's fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program ... supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of… more
- Vexterra Group (Bethesda, MD)
- …within the Analysis Solutions Division (ASD) to support the National Media Exploitation Center (NMEC). This role requires an individual with subject matter expertise ... administering Windows servers within a physical and virtual environment. This role is responsible for interacting with other administrators to handle service inquiries and problems. Duties include examining incidents and problems and suggesting and… more
- Noblis (Bethesda, MD)
- …of identified platforms, reversing engineering threats to determine methods of exploitation . + Conduct malware research and research on innovating offensive tools ... and techniques, developing malicious payloads, and manipulating code execution. + Accomplish actions to protect data, networks, net-centric capabilities, and other systems by detecting, identifying, and responding to attacks, or by creating defensive toolsets… more
- Belay Technologies (Hanover, MD)
- …and metadata analysis. There are multiple levels available for the Digital Network Exploitation Analyst: + Target Digital Network Analyst Level 3 + Target Digital ... Network Analyst Level 4 Years' Experience by Degree Type: + Target Digital Network Analyst Level 3 + Bachelor Degree with 8 years of experience. + Target Digital Network Analyst Level 4 + Bachelor Degree with 11 years of experience *Other degrees may be… more