- National Express (Baltimore, MD)
- …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
- Leidos (Odenton, MD)
- …software defined SIGINT collection platforms; biometrics collection, processing, exploitation , and dissemination equipment; CI/HUMINT support systems; TROJAN systems ... or integration and maintenance of satellite communication terminals providing NSANet; TENCAP systems; and intelligence non-standard equipment. + Minimum DoD 8570 IAT level II certification. Ability to obtain IAT level III certification within 6 months of hire.… more
- Northrop Grumman (Linthicum Heights, MD)
- …operations and enterprise-scale systems architectures. + General knowledge of data exploitation , AI/ML techniques, and Automatic Target Recognition (ATR) + General ... knowledge of sensor-to-shooter mission areas to include current and emerging needs and technology capability gaps. + Existing relationships of INS customer(s) and their stakeholder needs + Experience integrating multiple engineering specialties and… more
- National Express (Odenton, MD)
- …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
- Leidos (Gaithersburg, MD)
- …+ Lead the architecture and design of scalable, high-performance exploitation capabilities within the IC utilizing the latest in containerization, ... container orchestration, microservices, hybrid cloud technologies, machine learning, and generative AI + Collaborate with stakeholders to define system requirements and translate them into architectural solutions + Develop and implement architectural… more
- S&P Global (MD)
- …of network security and authentication. + Advanced understanding of vulnerability exploitation and remediation. + Expertise in security architecture, SOA, web ... services, and JavaScript. + Skills in security audits, vulnerability assessments, and packet analysis. + Knowledge of TCP/IP, encryption, TLS, and PKI/Certificates. + Experience with Identity & Access Management. **Additional Preferred Qualifications:** +… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …(In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching + Crypto Experience: target development, network ... analysis, drafting intel reports, speaker/language identification + 6 of 10 years in crypto language processing plus QC'ing and mentoring + 6 of 10 years has to be in the required language (if candidate has worked with multiple languages) + 4 of 6 years… more
- Amentum (Fort Meade, MD)
- …software defined SIGINT collection platforms, biometrics collection, processing, exploitation and dissemination equipment + Utilizes CI/HUMINT support systems, ... TROJAN systems or satellite communication terminals providing TDN2, TENCAP systems, and intelligence non-standard equipment **Minimum Requirements:** + Must possess a US government Top Secret security clearance with SCI eligibility (TS/SCI). Some positions may… more
- Northrop Grumman (Baltimore, MD)
- …processes and technology and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are an expert with ... classified computers within the Department of Defense (DoD) and Intelligence Community computing environments, Northrop Grumman Corporation has fantastic opportunities for your career growth. We are seeking experienced **Information Systems Security… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, and email security. + Coordination and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports. + Engaging with FCC or DIB… more