- Huntington Ingalls Industries (Fort Meade, MD)
- …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, and email security. + Coordination and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports. + Engaging with FCC or DIB… more
- Leidos (Odenton, MD)
- …software defined SIGINT collection platforms; biometrics collection, processing, exploitation , and dissemination equipment; CI/HUMINT support systems; TROJAN systems ... or integration and maintenance of satellite communication terminals providing NSANet; TENCAP systems; and intelligence non-standard equipment. + Minimum DoD 8570 IAT level II certification. Ability to obtain IAT level III certification within 6 months of hire.… more
- NANA Regional Corporation (Elkridge, MD)
- …knowledge management innovation through best practices in industry and transfer or exploitation of established knowledge within the organization and the broader IC. ... + Pertaining to the knowledge management mission, assists in leveraging existing technology and automation tools in a comprehensive approach that influences people, processes, culture and structure. + Provides knowledge management support that includes data… more
- CACI International (Annapolis Junction, MD)
- …looking for a skilled Reverse Engineer 2 with expertise in malware exploitation (MEX) or mobile-focused capabilities. The candidate will leverage experience in ... Computer Network Operations (CNO) reverse engineering and development-primarily using Python-to enhance access capabilities and drive innovative solutions. This work will be integral to analyzing and advancing our endpoint and mobile toolsets to meet evolving… more
- Trellix (Annapolis, MD)
- …vulnerability research, including fuzzing, binary diffing, mitigation bypass, and exploitation . + Demonstrated experience designing and delivering detection logic ... across multiple OSs (Windows/macOS/Linux) in a production EDR context. + Experience with applying machine learning techniques to cybersecurity problems. + Experience leading complex cross-functional security initiatives or projects. + Proven ability to mentor… more
- Global Dimensions (Fort Meade, MD)
- …(In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching. + Crypto Experience: target development, network ... analysis, drafting intel reports, speaker/language identification. + 6 of 10 yrs in crypto language processing - above (OLA 2) plus QC'ing, and mentoring. + 6 of 10 yrs has to be in the required language(s). + 4 of 6 yrs performing crypto language processing.… more
- Leidos (Bethesda, MD)
- …deploy a state-of-the-art technology stack supporting the DIA-NMEC( National Media Exploitation Center) DOMEX Technology Platform (DTP). Under this 10-year contract ... containing multiple Task Orders, we support the DOMEX Data Discovery Platform (D3P) Modernization program. You will have impact as part of a mission focused, solutions oriented, and adaptive team that values inclusion, innovation, collaboration, and… more
- BAE Systems (Rockville, MD)
- …for a broad range of Intelligence, Surveillance and Reconnaissance (ISR), sensor exploitation , tracking, and Command and Control (C2) challenges + Use and develop ... cutting-edge modelling and simulation tools and algorithms to help address some of the most challenging issues regarding automation across the intelligence cycle for the Intelligence Community (IC) and Department of Defense (DOD) + Take ownership of code bases… more
- BAE Systems (Rockville, MD)
- …for a broad range of Intelligence, Surveillance and Reconnaissance (ISR), sensor exploitation , tracking, and Command and Control (C2) challenges + Use and develop ... cutting-edge modelling and simulation tools and algorithms to help address some of the most challenging issues regarding automation across the intelligence cycle for the Intelligence Community (IC) and Department of Defense (DOD) + Design, develop, and perform… more
- Shuvel Digital (MD)
- …for a senior-level CNO Developer/ Engineer Capable of developing cyber capabilities and exploitation tools at the speed of need. The candidate will be responsible ... for researching, developing, architecting, and testing cyber capabilities/ tools, and techniques within existing or new environments. Successful candidates for this role must have critical thinking skills, and problem-solving skills, be creative, curious,… more