• Clearable Forensic Software/Web Developers…

    Cipher Tech Solutions (Linthicum Heights, MD)
    …Experience in digital forensics + Experience in SQL + Rudimentary knowledge in Network Architecture and networked programs + Experience in secure programming for ... engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:… more
    Cipher Tech Solutions (08/08/25)
    - Related Jobs
  • Sr. Delivery Consultant - DevOps, WWPS ProServe

    Amazon (Jessup, MD)
    …AWS Cloud. We work together with customer teams and the AWS Partner Network (APN) to execute enterprise cloud computing initiatives. Our team provides assistance ... related field, or equivalent experience - 5+ years of experience in cloud architecture and implementation - 5+ years of leading and/or participating in teams that… more
    Amazon (07/28/25)
    - Related Jobs
  • Senior Delivery Consultant- DevOps, WWPS ProServe

    Amazon (Jessup, MD)
    …###@amazon.com ** Basic Qualifications - 7+ years of technical specialist, design and architecture experience - 5+ years of database (eg. SQL, NoSQL, Hadoop, Spark, ... experience - 3+ years of cloud based solution (AWS or equivalent), system, network and operating system experience - 7+ years of external or internal customer… more
    Amazon (07/28/25)
    - Related Jobs
  • Sr. Principal NetApp Storage Administrator

    Northrop Grumman (Linthicum Heights, MD)
    …By joining in our shared mission, we will support yours of expanding your personal network and developing skills, whether you are new to the field or an industry ... implementation, migration, and maintenance. + Experience with system design and architecture . + Experience with communicating with executive leadership. We offer… more
    Northrop Grumman (07/18/25)
    - Related Jobs
  • Sr Staff Security Researcher - EDR

    Trellix (Annapolis, MD)
    …security field. **Key Responsibilities** + Lead efforts to reverse engineer sophisticated malware, identifying malicious code, obfuscation techniques, and ... (eg, process hollowing, reflective DLL injection, UAC bypass, credential dumping, network pivoting). + Strong familiarity with MITRE ATT&CK, threat modeling, and… more
    Trellix (06/17/25)
    - Related Jobs