- Steampunk (Mclean, VA)
- …lifecycle + You will contribute to the growth of our Data Exploitation Practice! **Qualifications** **Qualifications:** + Ability to hold a position of public ... trust with the US government. + 5-7 years industry experience coding commercial software and a passion for solving complex problems. + 5-7 years direct experience in Data Engineering with experience in tools such as: + Big data tools: Hadoop, Spark, Kafka,… more
- SAIC (VA)
- …Intelligence Collection Managers + Intelligence Discipline Leads + Intelligence Exploitation Analysts + Intelligence Graphic Artists + Intelligence Operations ... Specialists + Intelligence Report Officers + Intelligence Support Specialists + Intelligence Targeting Analysts + Intelligence Technical Writers + Open-Source Intelligence/Publicly Available Information Analysts + Intelligence Linguists + Intelligence Security… more
- Veterans Affairs, Veterans Health Administration (Fredericksburg, VA)
- …area. Assessing and documenting identified behaviors or symptoms of abuse, neglect, exploitation and/or intimate partner violence. Use of clinical social work skills ... and knowledge to maintain Veteran privacy and confidentiality per policies, handbooks or directives. Acting as an advocate with appropriate VA and community service providers and agencies when it serves the best interest of the Veteran and family… more
- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat environments (eg,… more
- Huntington Ingalls Industries (Reston, VA)
- …years of experience supporting IC projects to include reverse engineering, exploitation , and/or rapid prototyping + Active ISSA/Top Secret/SCI security clearance ... with full scope polygraph + Experience in evaluating technologies and innovative capabilities for the IC + Understanding of IC procurement lifecycle and supply chain risk management Physical Requirements Normally subject to minimal hazards associated with the… more
- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat environments (eg,… more
- Leidos (Springfield, VA)
- …in data science, including the areas of data collection processing exploitation , transformation services, modeling, and analytics. + 3-5 years of demonstrated ... experience performing geospatial data management, including data type conversions coordinate systems in (latitude and longitude, UTM) and their conversions and knowledge of projections and their properties/conversions. + Knowledge and experience using version… more
- ARSIEM (Arlington, VA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Knowledge of VM scanning, Web ... Application scanning, and red team processes + Experience in recognizing and categorizing types of vulnerabilities and associated attacks + Knowledge of Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat… more
- Huntington Ingalls Industries (Reston, VA)
- …years of experience supporting IC projects to include reverse engineering, exploitation , and/or rapid prototyping + Active ISSA/Top Secret/SCI security clearance ... with full scope polygraph Physical Requirements Normally subject to minimal hazards associated with the office environment. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and… more
- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques + Knowledge of Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat… more