- Amentum (Arlington, VA)
- …Intelligence Operations, Data Science, Cyber Operations, Intelligence Collection, or Intelligence Exploitation . + Possess an active SSBI with eligibility for access ... to TS SCI at time of proposal submission. + Possess a minimum of ten years' experience in areas that include developing training materials, SOPs, and user guides, and classroom instruction. **Desired Qualifications** + Possess a minimum of five years'… more
- Northrop Grumman (Chantilly, VA)
- …and for generations to come. Northrop Grumman Strategic Intelligence & Data Exploitation (SI&DE) is an Operating Unit within the larger Northrop Grumman Corporation ... that is located at multiple sites. You'll get the opportunity to wrestle with the next big problems in an atmosphere of collaboration and cooperation, sharing your expertise while also learning from other highly gifted and experienced engineers. We are looking… more
- Nightwing (Arlington, VA)
- …- Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information - Collects network device ... integrity data and analyze for signs of tampering or compromise - Assists with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite… more
- KBR (Chantilly, VA)
- …as part of creating/developing robust data processing systems + Generate data exploitation algorithms that can learn, assess, analyze, and organize data for testing ... while optimizing the Machine Learning (ML) to develop high performance ML models Desired Qualifications/Skills: + Master's degree in engineering or related quantitative science field + Experience leading teams resulting in successful verification and test… more
- Huntington Ingalls Industries (Roanoke, VA)
- …side channel attacks, etc.) * Have published research regarding cybersecurity, software exploitation , or reverse engineering The listed salary range for this role is ... intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's… more
- SAIC (Chantilly, VA)
- …or Commercial satellite program + Satellite tasking, collection, processing, exploitation , or dissemination (TCPED) experience + Familiarity with cloud technologies ... + Effective communication, coordination, and customer engagement skills + Ability to work in a fast paced, dynamic, and team environment with no supervision. **Desired Qualifications:** + Scaled Agile Framework (SAFe) certification or similar + INCOSE… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a… more
- Steampunk (Mclean, VA)
- …+ You will contribute to the growth of our AI & Data Exploitation Practice! **Qualifications** **Required** + Ability to obtain a US government Security Clearance ... + Master's Degree and 3 years of relevant experience; OR + Bachelor's Degree and 5 years of relevant experience; OR + No degree and 9 years of relevant experience + Possesses at least one professional certification relevant to the technical service provided.… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Identify applications and operating systems of a network device based on network traffic - Identify network mapping and operating system (OS) fingerprinting/other baselining activities - Assist in the construction… more