• Cyberspace Defensive Analyst

    Huntington Ingalls Industries (Fort Meade, MD)
    …Cyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst in support of an exciting new effort supporting one of our clients ... lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including… more
    Huntington Ingalls Industries (04/03/25)
    - Related Jobs
  • Cyberspace Defensive Analyst 2

    Huntington Ingalls Industries (Fort Meade, MD)
    …difference. Cyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst 2 in support of an exciting new effort supporting one of our ... lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including… more
    Huntington Ingalls Industries (03/04/25)
    - Related Jobs
  • Cyberspace Defensive Analyst 2

    Huntington Ingalls Industries (Fort Meade, MD)
    …difference. Cyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst 2 in support of an exciting new effort supporting one of our ... lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including… more
    Huntington Ingalls Industries (02/22/25)
    - Related Jobs
  • Sr. Signals Analyst

    Huntington Ingalls Industries (Fort Meade, MD)
    …Job Description HII-Mission Technologies Division is seeking a Sr. Signals Analyst professional to join our Cyber and Intelligence team! This work ... finished intelligence maintaining traceability to the original sources. + Performs exploitation analysis coordination with National labs. + Demonstrate expertise in… more
    Huntington Ingalls Industries (02/07/25)
    - Related Jobs
  • Principal Classified Cybersecurity Analyst

    Northrop Grumman (Baltimore, MD)
    …processes and technology and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are an expert with ... classified computers within the Department of Defense (DoD) and Intelligence Community computing environments, Northrop Grumman Corporation has fantastic opportunities for your career growth. We are seeking experienced **Information Systems Security… more
    Northrop Grumman (04/08/25)
    - Related Jobs
  • User Support Specialist (Intelligence Data…

    Xcelerate Solutions (Bethesda, MD)
    …developing, deploying, and operating a DoD-wide Tasking, Collection, Processing, Exploitation , and Dissemination (TCPED) workflow management platform for Open-Source ... to provide cutting edge requirements management, task coordination, data exploitation , enrichment, triage, and analytics capabilities to Defense and Intelligence… more
    Xcelerate Solutions (03/13/25)
    - Related Jobs
  • Network Architect

    Imagine One Technology & Management (Lexington Park, MD)
    …Network Security Vulnerability Technician + NEC C26A AN/SSQ-137 Ship's Signal Exploitation Equipment (SSEE) Maintenance Technician + NEC C27A Submarine Carry-on ... Equipment Technician + NEC C28A Ship's Signal Exploitation Equipment Increment Foxtrot (SSEE INC F) Maintenance Technician...INC F) Maintenance Technician + NEC H08A Advanced Network Analyst + NEC N71Z CVN Propulsion Plant Local Area… more
    Imagine One Technology & Management (03/04/25)
    - Related Jobs
  • PAI Farsi Linguist

    V2X (Suitland, MD)
    …an immediate opportunity for a Farsi Linguist / Publicly Available Information (PAI) Analyst . This position will be based at our customer site at Suitland, Maryland. ... Activities: As a Farsi Linguist / Publicly Available Information (PAI) Analyst , you will provide Farsi language translations and analysis regarding… more
    V2X (05/06/25)
    - Related Jobs
  • Vulnerability Researcher

    ARSIEM (Fort Meade, MD)
    …Researcher Qualifications + Meets all qualifications of a CNO Vulnerability Researcher/ Analyst I, but has the following increased experience and skill levels ... Researcher Qualifications + Meets all qualifications of a CNO Vulnerability Researcher/ Analyst II, but has the following increased experience and skill levels… more
    ARSIEM (04/16/25)
    - Related Jobs
  • CNO Developer 4

    ARSIEM (Annapolis Junction, MD)
    …Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern software engineering ... of basic configuration management principles. + + Labor Category Requirements: CNO Analyst /Programmer IV + Minimum sixteen (16) years of experience in computer… more
    ARSIEM (04/28/25)
    - Related Jobs