- Noetic Strategies Inc. (Alexandria, VA)
- …to include f amiliarity with operational/developmental testing and threat exploitation agencies + Validation, verification, and accreditation process experience + ... Understanding of Defense Acquisition and the linkage between DOT&E activities and the acquisition process + Pentagon and/or Office of the Secretary of Defense-level experience PRIMARY DUTIES, RESPONSIBILITIES & ESSENTIAL JOB FUNCTIONS: + Conduct intelligence… more
- General Dynamics Information Technology (Vienna, VA)
- …or suspected terrorists and terrorist associations. Combats the criminal exploitation of the student visa system.Responsibilities:The Intelligence Analyst Associate ... is responsible for building reports (leads) to determine the legal status of visitors and students who entered the country on a specific visa. The function of our mission-critical support contract provides investigative analytical support, data entry, law… more
- Google (Reston, VA)
- …tools and manual techniques, simulating real-world threat actor methodologies, including post- exploitation and lateral movement within GCP and hybrid environments. + ... Identify cloud-native security misconfigurations, such as Identity and Access Management (IAM) misconfigurations, service account privilege escalation, and insecure Virtual Private Clouds (VPCs). + Develop and maintain custom scripts related to security… more
- Noblis (Chantilly, VA)
- …objectives. + Experience leading technical cyber teams involving computer network exploitation or digital forensics technology. + Self-motivated with the ability to ... work independently and in a team environment. + Flexibility to adapt to changing situations. \#Hotjob \#nowhiring Overview Noblis (http://www.noblis.org/) and our wholly owned subsidiaries, Noblis ESI , and Noblis MSD tackle the nation's toughest problems and… more
- Leidos (Ashburn, VA)
- …(CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + CISSP ... - Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA… more
- Leidos (Chantilly, VA)
- …will join our innovative software team, creating next-generation capabilities for GEOINT exploitation and analysis. The ideal candidate will possess a strong blend ... of software engineering expertise, deep understanding of cloud environments, extensive experience in the GEOINT domain, and proven leadership abilities on software projects. This pivotal role involves acting as a day-to-day technical visionary and… more
- Service Source (Arlington, VA)
- …protocols and plans. Report any allegations of abuse, neglect, and exploitation according to ServiceSource policies and procedures. Additional Responsibilities + ... Provide support in areas of program design, development and implementation. + Assure that programs are operated according to CARF, Licensing, Medicaid Waiver and other regulatory standards. + Ensure that the needs of the individual served are being met and… more
- BAE Systems (Arlington, VA)
- …Manager to support programs in our Converged Solution (CS) and RF Exploitation Architectures (REXAS) Tech Areas. These Tech Areas develop novel technologies ranging ... from the next generation of new RF/cyber algorithms to demonstration of advanced EW capabilities in integrated systems at government ranges Due to the varying sizes of R&D programs, a Program Engineering Manager (PEM) may be required to oversee multiple R&D… more
- Leidos (Alexandria, VA)
- …life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures ... (TTPs). + Experience with malware analysis concepts and methods. + Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. **About our Program:** Through the J6 Penetration Handling, Incident,… more
- RTX Corporation (Arlington, VA)
- …EW, and cyber domains. We specialize in information exchange, protection, and exploitation . This is a position for candidates with research and development (R&D) ... program management experience. In this role, you will provide key program management and pursuit support enabling NCT technical staff to win and deliver innovative solutions to customers in the Electronic Warfare domain. As the program manager for active… more