- Leidos (Suffolk, VA)
- …Cyber Operations such as Penetration Testing, Red Teaming, Network Exploitation , and Critical Infrastructure Disruption. + **Drive Innovation:** Guide integration ... and synchronization of Offensive CO with military actions across air, land, maritime, and space domains in support of the DOD and CJCS Global Integration Process. + **Shape Strategy:** Provide insight into joint targeting, coordination, and deconfliction,… more
- Service Source (Arlington, VA)
- …protocols and plans. Report any allegations of abuse, neglect, and exploitation according to ServiceSource policies and procedures. Complete incident reports and ... adhere to health and safety regulations. + Ensure and maintain accurate records and documentation per the PCP, regulatory and company standards. Inform the Program Manager or designee of missing or inaccurate information immediately. + Communicate with family… more
- KBR (Reston, VA)
- …space intelligence to the warfighter through the Tasking, Collection, Processing, Exploitation , and Dissemination (TCPED) cycle. By leveraging a Model-Based Systems ... Engineering (MBSE) approach, this program will consolidate and integrate DIA's technical collection capabilities to optimize data flow, eliminate service overlaps, evolve with leading-edge capabilities, and realize cost efficiencies to provide strategic… more
- Global Dimensions (Springfield, VA)
- …+ Familiarity with the US Intelligence Community-specifically, imagery collection and exploitation . Desired + At least ten years of relevant graphic design ... experience along with an undergraduate or graduate degree in Fine Arts, Graphic Arts, Computer Graphics, or any Liberal Arts or technical degree where graphic arts or digital image processing is core to the degree OR at least 15 years of relevant graphic… more
- RTX Corporation (Langley AFB, VA)
- …to include U-2, Global Hawk, MQ-1 and MQ-9 sensors and processing, exploitation , and dissemination (PED) architectures + Administration of COTS or GOTS software ... solutions used by DCGS operators and analysts (CICS, RIM, CETS, etc) + Experience administering VMware (containers, storage and resources), cloud infrastructure (AWS, Azure, OpenStack, etc.), UNIX (Solaris or Linux), and Microsoft Windows system administration… more
- Global Dimensions (Springfield, VA)
- …+ Familiarity with the US Intelligence Community-specifically, imagery collection and exploitation . + Support the office and other branches in accomplishing the ... agency's overall mission, including expediting crisis work, special assignments, and ad hoc tasking on variously scheduled arrangements. + Support analytic customers (authors) by tagging GEOINT products with relevant keywords and information. Desired + At… more
- Global Dimensions (Springfield, VA)
- …+ Familiarity with the US Intelligence Community-specifically, imagery collection and exploitation . Desired + At least three years of relevant graphic design ... experience along with an undergraduate or graduate degree in Fine Arts, Graphic Arts, Computer Graphics, or any Liberal Arts or technical degree where graphic arts or digital image processing is core to the degree OR at least seven years of graphic design… more
- Global Dimensions (Springfield, VA)
- …+ Familiarity with the US Intelligence Community--specifically, imagery collection and exploitation . + Experience in problem identification and analysis. + Possess ... critical thinking and problem-solving skills + Ability to research and gather information. + Excellent customer service skills. + Experience in developing working relationships and networking. + Ability to ensure consistency in content, clarity, and… more
- CACI International (Charlottesville, VA)
- …systems and future technology. We need experts to support the technical exploitation of foreign systems and subcomponents. We assess scientific and technical ... capabilities, forecast and predict future capabilities and battlefield effectiveness, and create of high-fidelity models and simulations of systems. Join our Team as we drive all-source collection, apply research, and deliver highly technical intelligence on… more
- Leidos (Chantilly, VA)
- …and analysis, reversing engineering threats to determine methods of exploitation , malware research, researching innovative tools and techniques, developing malicious ... payloads, and manipulating code execution. + Defensive development responsibilities include protection of data, networks and net-centric capabilities, as well as detection of, identification of and response to attacks. + Secure development environments and… more