- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques + Knowledge of Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat… more
- ManTech (Springfield, VA)
- …missions with softcopy tools + Experience operating IEC softy copy exploitation workstations + Experience identifying military installations and conducting military ... infrastructure and order of battle analysis + Experience conducting historical imagery research **Desired Qualifications** + 10 years of GEOINT Experience + Regional expertise to AOR, expertise in photogrammetry, remote sensing, or image processing. + Strong… more
- Amentum (Fort Belvoir, VA)
- …automated systems. + Working knowledge of the Operational Production, Exploitation , and Dissemination Experience. + Demonstrated experience managing research and ... coordination for projects. + Experience working with and maintaining databases. Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national… more
- Huntington Ingalls Industries (Roanoke, VA)
- …attacks, etc.) * Have published research regarding cybersecurity, software exploitation , or reverse engineering Physical Requirements Adequate visual acuity and ... manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission… more
- Washington Metropolitan Area Transit Authority (VA)
- …studies). Analyzes collected information to identify vulnerabilities and potential for exploitation . Ensures that the reporting of all cyber events/activity are ... presented in a timely and actionable media; consistent with cyber intelligence and security best practices. + Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and… more
- CACI International (Charlottesville, VA)
- …intelligence automated systems, especially imagery analysis, signals intelligence and exploitation tools and libraries. + Detailed knowledge of Joint, Inter-agency ... and Intelligence Community programs and products. + Experience in targeting methodology and tradecraft Knowledge of network analysis. + Experience with assessments, enterprise data integration, governance, and metrics, including the application of metadata… more
- SimIS Inc. (Norfolk, VA)
- …maintain and enhance military relevance and effectiveness of the Alliance. Data Exploitation and AI are essential elements of NATO's digital transformation, enabling ... faster, data-driven decision-making and operational efficiency. These technologies are crucial for building a more adaptive and responsive NATO, prepared to meet the challenges of Multi-Domain Operations (MDO) and a rapidly evolving security landscape.… more
- V2X (Fort Belvoir, VA)
- …set up, configuration, operations, operator level maintenance, collection, exploitation , analysis, reporting, dissemination, systems tear down, and preparation ... for movement / transportation. + Experience in instructional principles and techniques, lesson plan preparation, instructional objectives, test construction, student counseling, instructional technology, and the use of audiovisual and graphic aids as… more
- Concurrent Technologies Corporation (Virginia Beach, VA)
- …of tools and methodologies, including vulnerability scanners and manual exploitation techniques. + Analyze complex systems, identify cybersecurity patterns, and ... develop innovative solutions. + Communicate technical information clearly and effectively to both technical and non-technical audiences. Basic Qualifications: + Bachelor's degree in Cybersecurity, Computer Science, Information Systems, or related field. + 6-8… more
- System One (Gainesville, VA)
- …analysis, design, development and testing specific to data ingestion and exploitation application. + Provide status on development tasks to meet program/project ... goals. Familiar with Git/GitLab or other source code control tools. + Familiar with Amazon Web Services (S3 Buckets, EC2, Reserved Instances, etc.). + Familiar with team collaboration tools (Jira, Confluence, RocketChat). + Must possess an active Top Secret… more
Recent Searches
- contract dental assistant (United States)
- Web Designer (Missouri)
- sr salesforce business (United States)
- Engineering Project Manager (Kansas)
Recent Jobs
-
Data Scientist, Amazon Stores Finance Science
- Amazon (Bellevue, WA)
-
Construction & Implementation Technician III
- GCI Communication Corp (Anchorage, AK)
-
Applications Development Senior Programmer Analyst
- Citigroup (Rutherford, NJ)