- Arena Technical Resources, LLC (Springfield, VA)
- …on IR spectral signatures. - Develop and implement Python-based spectral exploitation methodologies and algorithms. - Analyze the information content of spectral ... data across various resolutions (eg, total intensity, multi-spectral, hyperspectral). - Conduct literature reviews and trade studies on the effects of material coatings and substrates on emissions of materials. - Design, test, and validate spectral algorithms… more
- Leidos (Ashburn, VA)
- …(CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + CISSP ... - Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA… more
- Steampunk (Mclean, VA)
- …development lifecycle + You will contribute to the growth of our Data Exploitation Practice! **Qualifications** + Ability to hold a position of public trust with ... the US government. + Bachelor's degree in computer science, data science/statistics, information systems, engineering, business, or a scientific or technical discipline + 2-4 years industry experience developing ML/AI solutions and a passion for solving… more
- Leidos (Ashburn, VA)
- …(CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + CISSP ... - Certified Information SystemsSecurity + CEH - Certified EthicalHacker + CHFI - Computer Hacking Forensic Investigator + LPT - Licensed PenetrationTester + CSA - EC Council Certified SOC Analyst (Previously ECSA - EC-Council Certified Security Analyst) + ENSA… more
- CACI International (Charlottesville, VA)
- …of foreign indirect-fire munitions. We need experts to support the technical exploitation of foreign systems and subcomponents for current and future technology. We ... assess scientific and technical capabilities, forecast and predict future capabilities and battlefield effectiveness, and create of high-fidelity models and simulations of systems. Join our Team as we drive all-source collection, apply research, and deliver… more
- SAIC (VA)
- …Intelligence Collection Managers + Intelligence Discipline Leads + Intelligence Exploitation Analysts + Intelligence Graphic Artists + Intelligence Operations ... Specialists + Intelligence Report Officers + Intelligence Support Specialists + Intelligence Targeting Analysts + Intelligence Technical Writers + Open-Source Intelligence/Publicly Available Information Analysts + Intelligence Linguists + Intelligence Security… more
- Huntington Ingalls Industries (Reston, VA)
- …years of experience supporting IC projects to include reverse engineering, exploitation , and/or rapid prototyping + Active ISSA/Top Secret/SCI security clearance ... with full scope polygraph Physical Requirements Normally subject to minimal hazards associated with the office environment. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and… more
- Huntington Ingalls Industries (Reston, VA)
- …years of experience supporting IC projects to include reverse engineering, exploitation , and/or rapid prototyping + Active ISSA/Top Secret/SCI security clearance ... with full scope polygraph + Experience in evaluating technologies and innovative capabilities for the IC + Understanding of IC procurement lifecycle and supply chain risk management Physical Requirements Normally subject to minimal hazards associated with the… more
- The Metamorphosis Group (Chantilly, VA)
- …to maintain current and deliver new capabilities to enhance data discovery, exploitation , and analytics, including the integration and use of established and novel ... artificial intelligence (AI) and machine learning (ML) techniques. Hours of Support and Coverage The Contractor shall partner with the operations and maintenance team to provide continuous hourly/daily service to the Sponsor every day of the year using a blend… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a… more
Recent Jobs
-
Field Sales Engineer
- Shimadzu Scientific Instruments (Charlotte, NC)
-
CNA/ Certified Nursing Assistant/ Certified Caregiver
- BAYADA Home Health Care (Tucson, AZ)
-
Netsuite BA Consultant
- vaco (Charlotte, NC)
-
Managing Veterinarian
- NVA (North Branch, MN)