- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …identify weaknesses, test and evaluate protection strategies, and demonstrate exploitation of identified vulnerabilities. Components of these assessments include but ... authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Experience with firewalls and network TAP… more
- Acclaim Technical Services (Mclean, VA)
- …with personal initiative and technical expertise. RESPONSIBILITIES + Conduct media exploitation and forensic targeting + Identify leads from technical information ... topic-based subject matter expertise + Experience with forensic analysis and media exploitation (*forensic experience not required but desired) + Strong inter- and… more
- ManTech (Springfield, VA)
- …**Minimum Qualifications:** + 5+years relevant experience with Debriefings, Open-Source Exploitation , Digital Media Exploitation , Collection Requirements. + 5+ ... years experience with Intelligence Analysis and Production: Creating Analytical products, Intelligence Information Reports, Source-Directed Requirements, Threat Briefings, Request for Information Responses. + 5+ years' experience in analyzing economic,… more
- BAE Systems (Reston, VA)
- …and US and Foreign Governments open-source materials and conduct collection and exploitation of Publicly Available Information (PAI) via use of OSINT tools. Other ... in a field related to OSINT research, collection management, or analysis or the exploitation of PAI or social media + Knowledgeable of and demonstrates ability to… more
- BAE Systems (Reston, VA)
- …unique insights to address defense intelligence requirements. + Conduct collection and exploitation of Publicly Available Information (PAI) via use of OSINT tools + ... a field related to OSINT research, collection management, or analysis or the exploitation of PAI or social media + Prior military or government analytical experience… more
- SHI (Richmond, VA)
- …with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation , post- exploitation , lateral movement, and data exfiltration, ... along with strong operational security practices. - Intermediate + Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific… more
- BAE Systems (Northern Virginia, VA)
- …Systems Intelligence & Security Program. BAE Systems is the industry leader in FMV exploitation , and we are searching for individuals ready to begin an exciting and ... be new to motion GEOINT specialized instruction in FMV tradecraft, exploitation tools, and specific cultural familiarization + Produce imagery-derived graphic… more
- Global Dimensions (Springfield, VA)
- …TECHINT, OSINT, and All Source Intelligence for tasking, collection, processing, exploitation , production and dissemination at all echelons from tactical to national ... (DCGS-A); software defined SIGINT collection platforms; biometrics collection, processing, exploitation , and dissemination equipment; CI/HUMINT support systems; TROJAN systems… more
- CoStar Realty Information, Inc. (Arlington, VA)
- …with developing test plans to validate identified vulnerabilities and demonstrate the exploitation of the vulnerabilities. The ability to explain the exploit to ... Frameworks like Cobalt Strike, Sliver, and Mythic + Windows Active Directory exploitation tools and techniques + Knowledge of payload and exploit development… more
- Global Dimensions (Quantico, VA)
- …Analysts will: + Provide imagery science support specifically related to the exploitation of imagery from sensor disciplines such as Synthetic Aperture Radar (SAR), ... HUMINT, SIGINT, OSINT, MASINT). + Provide expertise in a variety of geospatial exploitation software suites and use data and products from multiple sensors and… more