- Leidos (Bethesda, MD)
- …such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/ malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM ... in remediation effortsof cyber security incidents (system and/or network breaches, malware attacks) + Participate in the change management process + Coordinate,… more
- Cipher Tech Solutions (Linthicum Heights, MD)
- …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …Tailored security solutions - Reverse engineering - Control system security - Malware analysis - Researching emerging network industry technologies and solutions - ... Ensuring adequacy of cybersecurity standards and configurations - Fusing vulnerability assessments from all sources into a unified picture of network risk Requirements Conditions of Employment Qualifications FULL PERFORMANCE Entry is with a Bachelor's degree… more
- Leidos (Odenton, MD)
- …evaluations web application vulnerability assessment penetration testing and fuzzing, malware research and vulnerability mitigation. + Support Joint Operational ... Planning Groups and Teams (OPG/OPT), and develop and integrate Cyberspace capabilities into plans. + Develop concepts of support, courses of action, integrate command and external capabilities, coordinate and document comprehensive plans. + Engage in, and… more
- Quantexa (Maryland City, MD)
- …operations including analysis of phishing attempts, business email compromise, malware -based attacks, and related risk scenarios. + Lead incident investigations ... impacting cloud infrastructure, SaaS services, and CI/CD toolchains, working closely with engineering and operations stakeholders. + Conduct post incident reviews and root cause analysis to support organisational learning, capability uplift, and enduring… more
- TEKsystems (Rockville, MD)
- …errors, and operating systems (Windows 10). Mitigates and handles system viruses, malware , spyware, and adware. Hardware component replacement and use of system ... imaging software to create and load images. -Proactively monitors and identifies trends and behaviors in systems support and addresses the findings or escalate to other IT team resources -Supports audio/visual systems (TVs, projectors, etc.), and video… more
- CACI International (Annapolis Junction, MD)
- …information systems, and mobile applications by identifying vulnerabilities and finding malware . We help our customers prepare, defend, and sustain the mission ... and enterprise against cyber threats. **Responsibilities:** + Lead multiple customer task orders by gathering and refining customer requirements, meeting with technical and program management leadership and stakeholders. + Lead various staffing efforts such as… more
- The MITRE Corporation (Fort Meade, MD)
- …Safety + Crypto and Trust + Cyber Adversary Emulation + Cyber Analytics and Malware + Cyber Assessments + Cyber Deception and Adversary Engagement + Cyber Effects ... and Reverse Engineering + Cyber Forensics + Cyber Resiliency + Cyber Safety + Cyber Strategy and Governance + Cyber Supply Chain + Cyber Threat Intelligence + Defensive Cyber Operations + Enterprise Security Architecture + Identity, Credentialing, and Access… more
- Lockheed Martin (Annapolis Junction, MD)
- …Infrastructure Solutions customer\. The services enable the Data Transformation, Malware Analysis, and Cyber Threat Intelligence processing and sharing capabilities ... for the customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats\. The contract has several locations in Maryland and a small contingent in Texas\. **WHO WE ARE** Lockheed Martin is a global leader in… more
- Indigo IT, LLC (Fort Meade, MD)
- …of cyber sensing technologies including intrusion detection, packet capture, malware detection, threat analytics, and SIEM integration. + Experience designing ... solutions for both on premises and cloud environments including virtualization, containerization, and cloud native architectures. + Demonstrated experience with requirements decomposition, DoDAF architecture development, design documentation, and engineering… more