- BCMC (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks - Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations - Knowledge of different operational threat environments (eg,… more
- General Dynamics Information Technology (Mclean, VA)
- …Field Operations desired. + Experience identifying targeting leads through the exploitation of all-source databases and specialized tools desired. + Experience using ... customer databases to monitor field traffic and communicate with field offices desired. + Formal training or certification as a Technical Targeter desired. + Overseas experience supporting collection operations and information sharing **Location** : On… more
- General Dynamics Information Technology (Norfolk, VA)
- …fastest long-standing growing programs! US Battlefield Information Collection and Exploitation Systems eXtended (US BICES-X) is a cutting-edge program supporting ... DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war… more
- Parsons Corporation (Fort Belvoir, VA)
- …are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse ... Engineering Malware (GREM) **Minimum Clearance Required to Start:** Top Secret SCI This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around… more
- Leidos (Hampton, VA)
- …alongside familiarity with AF Distributed Common Ground System Analysis and Exploitation Team (AET) operations. + **Innovative Thinker:** Exposure to initiatives ... such as Open Architecture, Disposition of Forces (DOF), Joint Enterprise Modeling and Analytics (JEMA), Multi-Source Correlation System (MSCS), Thresher, and SNAPGLASS-essential for creating sensor-agnostic solutions for CFACC requirements. + **Exceptional… more
- General Dynamics Information Technology (Langley AFB, VA)
- …supports the Air Forces' Distributed Common Ground System (DCGS) Processing, Exploitation , Dissemination (PED) Operations Center (DOC). Specifically, you will be ... providing Tie-1 Network monitoring, Operational Support, and Help Desk services across a global enterprise. **Task: Network Monitoring/Help Desk Support Subtasks.** + Conduct fault management to detect, isolate, and correct abnormal network and information… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Identify applications and operating systems of a network device based on network traffic - Identify network mapping and operating system (OS) fingerprinting/other baselining activities - Assist in the construction… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a… more
- Nightwing (Arlington, VA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Skill in recognizing threat actor ... campaigns, tactics, techniques, and procedures - Familiar with basic system and network administration, traffic analysis techniques, Computer Network Defense policies, procedures and regulations - Knowledge of different operational threat environments (eg,… more
- Global Dimensions (Quantico, VA)
- …system capabilities and limitations to evaluate potential opportunities for USMC exploitation and vulnerabilities in USMC systems and doctrine. + Prepare written ... intelligence assessments and briefings to support consumers at the tactical, operational, and strategic levels. + Identify information gaps, develop collection strategies, write collection requirements, and provide feedback to collection officers. + Possess… more
Recent Jobs
-
Principal, Data Scientist/Economist - Workforce Intelligence & Insights
- Walmart (Bentonville, AR)
-
PLM Teamcenter Architect (can be remote
- Capgemini (Cincinnati, OH)
-
Radiologic Technologist | 30 hours per week | Diagnostic Imaging
- Great River Health (West Burlington, IA)
-
Java/AWS Developer
- Cognizant (Plano, TX)