- AIG (Reston, VA)
- …techniques + Recent and relevant experience in vulnerability analysis and exploitation techniques. + Troubleshoot issues within the product when necessary, assisting ... different teams, crash dumps, performance monitor and release blockers. + In depth knowledge of Critical Security Controls like NIST, CIS Benchmarks, DISA STIG standards etc. + Familiarity with International Security standards and Industry framework like ISO… more
- Leidos (Alexandria, VA)
- …life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). ... + Demonstrated sound understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. + Motivated self-starter with strong written and verbal communication skills,… more
- Travelers Insurance Company (Richmond, VA)
- …groups and other Technology teams on application development, new feature exploitation , proof of concepts, security enhancements, etc. + Attends and sometimes ... runs monthly meetings with IBM and ISV to discuss product roadmaps, incidents, etc. + Connects IMS to other technologies such as IMS Connect, CICS, MQ, DB2, and z/OS Connect. + Develops and tests solutions for high availability and disaster recovery. +… more
- Cambridge International Systems Inc (Norfolk, VA)
- …1-3 years' experience in penetration testing, red team operations, or exploitation development. + Offensive Security Certified Professional (OSCP) or equivalent ... certification. (or obtain within 6 months of hire) + Proficiency in multiple offensive security tools, including: + Metasploit + Core Impact + Cobalt Strike + Burp Suite + Nessus + SharpHound/BloodHound + Ability to assess exploit code and identify malicious… more
- Leidos (Ashburn, VA)
- …(CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + CISSP ... - Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA… more
- Leidos (Reston, VA)
- …+ Intelligence analysis and tradecraft modernization + Data integration, exploitation , and analytic platforms + Intelligence collection and mission enablement ... + Cloud modernization, secure enterprise operations, and cross-domain solutions + Counter-WMD, threat reduction, and counterterrorism intelligence support **Required Background** + Bachelor's Degree with 15+ years' relevant experience or a Master's degree with… more
- Steampunk (Mclean, VA)
- …lifecycle + You will contribute to the growth of our AI & Data Exploitation Practice! **Qualifications** + Ability to hold a position of public trust with the ... US government. + Bachelor's degree in computer science, data science/statistics, information systems, engineering, business, or a scientific or technical discipline + 2-4 years industry experience developing ML/AI solutions and a passion for solving complex… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …or Offensive Security Certified Expert (OSCE) or Offensive Security Exploitation Expert (OSEE) or Offensive Security Wireless Professional (OSWP) certification ... required + Ability to travel up to 10 percent **Security Requirements:** + ACTIVE Top Secret/SCI DoD Clearance **Required** ( _no interim_ ) **Imagine One Technology & Management, Ltd., offers a full package of benefits and competitive salary, excellent group… more
- Node.Digital (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks - Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations - Knowledge of different operational threat environments (eg,… more
- BAE Systems (Arlington, VA)
- …support our government customer. These Analysts will: + Perform collection, exploitation , and analysis of signals intelligence. + Support SIGINT collection ... requirements. + Transform technical collection into meaningful narratives. + Design scripts and analytic models to parse, format, and visualize complex data sets. + Guide intelligence collectors to critical information. + Work in teams to analyze technical… more
Recent Jobs
-
Sr. Embedded SDE, Ring, Alarm & Accessories
- Amazon (North Reading, MA)
-
Program Manager (Value Stream Leader) - Propulsion (Onsite)
- RTX Corporation (Fairfield, CA)
-
Sr Application Developer
- PennyMac (Westlake Village, CA)
-
Mechanical Engineer - Rotating Equipment
- Chemours (Corpus Christi, TX)