• Data Exploiter (TS/SCI with Poly Required)

    General Dynamics Information Technology (Chantilly, VA)
    …to follow the entire targeting life cycle by engaging in data exploitation of requirements collection, data analysis, summary and documentation, and actionable ... information dissemination. KEY RESPONSIBILITIES + Track and monitor cyber actors, their activities, and infrastructure to identify potential threats and vulnerabilities. + Utilize industry-standard commercial and open-source tools for threat intelligence… more
    General Dynamics Information Technology (05/02/25)
    - Related Jobs
  • (Cyber) Incident Management Analyst - Hybrid

    Nightwing (Arlington, VA)
    …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks - Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations - Knowledge of different operational threat environments (eg,… more
    Nightwing (05/02/25)
    - Related Jobs
  • Cyber Network Forensic Analyst II

    Nightwing (Sterling, VA)
    …- Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information; - Collects network ... device integrity data and analyze for signs of tampering or compromise; - Assists with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite… more
    Nightwing (05/02/25)
    - Related Jobs
  • Full Motion Video (FMV) / Research Analyst

    BAE Systems (Sterling, VA)
    …BAE Systems is the premier provider of Full Motion Video (FMV) exploitation . We are currently seeking high performing analysts to support an operational ... cell with video forensics and in-depth research analysis. **This position isNOT on a 24x7 rotation schedule.BAE Systems employees typically work a standard M-F work week; however, there are occasions where employees have the ability to work added and/or… more
    BAE Systems (05/02/25)
    - Related Jobs
  • Information Technology Specialist (Infosec)

    Customs and Border Protection (Ashburn, VA)
    …portable and electronic media. Providing training on digital media exploitation . Writing laboratory reports documenting digital forensic examination, analysis, ... and/or results. NOTE: Your resume must explicitly indicate how you meet this requirement, otherwise you will be found ineligible. Please see the "Required Documents" section below for additional resume requirements. Experience refers to paid and unpaid… more
    Customs and Border Protection (05/02/25)
    - Related Jobs
  • Red Team Intelligence Analyst - Sino-Russian

    ManTech (Arlington, VA)
    …a field related to OSINT research, collection management, or analysis or the exploitation of PAI or social media. + Experience with conducting open-source research, ... all-source intelligence analysis, or targeting. + Experience with accessing, researching, and exploiting global and regional social media and digital platforms. + Knowledge of advanced Internet-based research, including Boolean logic, advanced research… more
    ManTech (05/01/25)
    - Related Jobs
  • Counterintelligence Officer 5

    Amentum (Falls Church, VA)
    …Support to Field Operations + Experience identifying targeting leads through the exploitation of all-source databases to craft targeting packages + Experience using ... customer databases to monitor field traffic and communicate with field offices + Formal CI training and/or certifications + Overseas experience supporting collection operations and information sharing + Foreign languages skills Amentum is proud to be an Equal… more
    Amentum (04/30/25)
    - Related Jobs
  • Cyber Incident Manager/ Incident Manager

    Node.Digital (Arlington, VA)
    …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks - Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations - Knowledge of different operational threat environments (eg,… more
    Node.Digital (04/29/25)
    - Related Jobs
  • Senior C/C++ Software Scientist with remote…

    General Dynamics Information Technology (Chantilly, VA)
    …algorithms and software, and access unique approaches to image data processing and exploitation for use in the latest ground processing architectures. You will also ... work with **existing C/C++ algorithms** and advanced software automation, Machine Learning, target recognition, change detection, multi-source data fusion, and tracking. + Design, develop, document and test advanced, automated feature extraction in C/C++ and… more
    General Dynamics Information Technology (04/28/25)
    - Related Jobs
  • Antisubmarine Warfare Trainer/Evaluator

    SAIC (Norfolk, VA)
    …+ Provide instruction on sonar principles, environmental analysis and exploitation to include tactical oceanography. + Provide technical/operator support for ... AN/SQQ-89(V)15 and AN/SQQ-89 A(V)15. + Provide tactical feedback on reconstructed data of real-world ASW events. + Provide support for ATGL missions to include overseas missions in support of ASW basic phase events and Flag Officer Sea Training (FOST). +… more
    SAIC (04/26/25)
    - Related Jobs