- Amentum (Fort Meade, MD)
- …you will support the mission to identify, monitor, and assess foreign intelligence efforts attempting collection of sensitive national security information on US ... US operations and interests. The CI Specialist applies understanding of foreign intelligence capabilities / activities and US and foreign partner CI capabilities and… more
- Acclaim Technical Services (Annapolis Junction, MD)
- …Prepare synthesized product for customers by researching, analyzing and reporting intelligence via appropriate reporting vehicles, in response to Intelligence ... (IC) requirements and in accordance with USG missions of Signals Intelligence , Information Assurance and Computer Network Operations. Prioritize, assess, evaluate… more
- Leidos (Odenton, MD)
- …to use your experience helping the INSCOM G4 mission. The Military Intelligence (MI) Systems Maintainer Integrator is primarily responsible for maintaining ... intelligence computers and networks used by Military ...collection platforms; biometrics collection, processing, exploitation, and dissemination equipment; CI/ HUMINT support systems; TROJAN systems or integration and maintenance… more
- BAE Systems (Suitland, MD)
- …+ Instruct the gathering, synthesis, and analysis of open source intelligence information in support of objectives related to force protection, counterterrorism, ... The successful candidate will have: + 8 yr demonstrated intelligence experience w/ MA/MS or 10 yr w/ BA/BS...military or government analytical training (eg, all source, SIGINT, HUMINT or GEOINT) + Experience training individuals + Candidates… more
- Leidos (Fort Meade, MD)
- …analysis to the team. + Develop automated approaches leveraging artificial intelligence /machine learning (AI/ML) and natural language processing (NLP) to streamline ... integrate impactful data from various commercial and customer sources, including HUMINT , SIGINT, OSINT, and GEOINT. + Apply advanced analytical techniques, including… more
- Leidos (Fort Meade, MD)
- …campaign. + Analyze enemy decision processes (eg, OODA loop) and intelligence collection systems to identify exploitable vulnerabilities. + Craft believable, ... coordination across OPSEC and Intel (J2). + Monitor adversary behavior via intelligence capabilities, evaluate success using MOP/MOE, and refine plans accordingly. +… more