- Leidos (Chantilly, VA)
- …and analysis, reversing engineering threats to determine methods of exploitation , malware research, researching innovative tools and techniques, developing malicious ... payloads, and manipulating code execution. + Defensive development responsibilities include protection of data, networks and net-centric capabilities, as well as detection of, identification of and response to attacks. + Securing development environments and… more
- Amentum (Richmond, VA)
- …decontamination operations, presumptive detection equipment, procedures for sensitive site exploitation , and interoperability requirements between US and ROK Forces ... _Knowledge_ + Comprehensive knowledge of strategic planning principles, theory, techniques, and practices sufficient to advise on the formulation of strategic policies, plans, and programs + Ability to analyze interrelated issues in long-range planning to make… more
- TekSynap (Virginia Beach, VA)
- …support Red Team and penetration testing engagements. + Conduct advanced exploitation activities to simulate adversary tactics, techniques, and procedures (TTPs). + ... Reverse engineer software and systems to identify vulnerabilities and create proof-of-concept exploits. + Identify gaps in current offensive toolsets and develop novel approaches to bypass detection and prevention mechanisms. + Collaborate with other Red Team… more
- TekSynap (Virginia Beach, VA)
- …following: + Offensive Security Certified Expert (OSCE) + Offensive Security Exploitation Expert (OSEE) + Offensive Security Wireless Professional (OSWP) + ... Education: + Bachelor of Science in Information Systems, Information Technology, Computer Science, or Computer Engineering. + Clearance: + Must possess a TS/SCI clearance (IT Level I Tier 5 / Special-Sensitive Position) **Overview** Overview We are seeking a… more
- Amentum (Quantico, VA)
- …military system capabilities and limitations to assess opportunities for USMC exploitation and USMC system and doctrine vulnerabilities. + Produce written ... intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level. + Assess information gaps, develop collection strategies, compose collection requirements, and provide feedback to collection officers. + Possess… more
- TekSynap (Norfolk, VA)
- …(OSCP) + Offensive Security Certified Expert (OSCE) + Offensive Security Exploitation Expert (OSEE) + Offensive Security Wireless Professional (OSWP) + Education: ... + Bachelor of Science in Information Systems, Information Technology, Computer Science, or Computer Engineering. + Clearance: + Must possess a TS/SCI clearance (IT Level I Tier 5 / Special-Sensitive Position) **Overview** We are seeking a Red Team Penetration… more
- Leidos (Alexandria, VA)
- …life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). ... + Demonstrated sound understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements. + Motivated self-starter with strong written and verbal communication skills,… more
- Amentum (Springfield, VA)
- …Software defined SIGINT collection platforms; biometrics collection, processing, exploitation and dissemination equipment, CI/HUMINT support systems, TROJAN systems ... or integration and maintenance of satellite communication terminals providing NSANet; TENCAP systems and intelligence non-standard equipment. + Four years of site lead experience. + Must possess IAT Tier I and II as applicable for the roles and functions of… more
- Steampunk (Mclean, VA)
- …stakeholders. + Contribute to the growth of our Data Exploitation Practice by implementing cutting-edge data warehousing solutions. **Qualifications** **Required:** ... + Ability to hold a position of public trust with the US government. + 3-5+ years of experience in data engineering, data warehousing, or data architecture. + Knowledge of Python or other object-oriented languages is a plus. + Experience designing and… more
- Leidos (Arlington, VA)
- …work with the SOC and enterprise networking teams to proactively block exploitation within the customer environment. + Perform enterprise-wide network scans, agent ... scans, including credentialed scans of Linux, Windows, and Network devices. + Configure and maintain scan templates based on asset types, repository, credentials, etc. in support of continuous scanning requirements for various FISMA systems + Perform security… more
Recent Searches
- postdoctoral research assistant (United States)
- payroll compliance (United States)
- sar (United States)
- Oracle EBS Financials 12 (California)
Recent Jobs
-
Instructional Designer / Is Training
- Hartford HealthCare (Farmington, CT)
-
Sr. Cost Analyst / Sr Financial Analyst
- Stony Brook University (East Setauket, NY)
-
Hybrid UI Developer
- Shuvel Digital (Ashburn, VA)
-
Software Engineer Staff - Space Protection Programs
- Lockheed Martin (Littleton, CO)