- Coinbase (Richmond, VA)
- …and/or fintech experience; * Detailed knowledge of global anti-money laundering, counter- terrorist financing, and sanctions risks and regulations (eg, BSA, 4MLD, ... FinCEN CDD Rule, OFAC Sanctions, USA PATRIOT Act, etc.) * Strong leadership, relationship management skills, and project management experience; * Exceptional analytical skills; * Strong communication skills and presence: ability to interface with internal and… more
- BOOZ, ALLEN & HAMILTON, INC. (Springfield, VA)
- …) , ARCSIGHT, RSA Security Analytics, Consular Consolidated Database ( CCD ) , or Terrorist Identities Datamart Environment ( TIDE ) , to c ond uct CI analysis of ... anomalous activities. Liaise with the Department of Defense ( DoD ) , Intelligence Community, and appropriate law enforcement entities to remain abreast of current CI trends and issues. C ond uct liaison with agency components to facilitate information sharing… more
- Washington Metropolitan Area Transit Authority (VA)
- …real-time threats, protect against insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities. Ensures that ... the organization can respond to attacks quickly and eliminate threats. + Provides senior level support of the research, deployment, configuration and maintenance processes for network monitoring, defensive and administrative cybersecurity tools. Develops… more
- Amentum (Vienna, VA)
- …is in support of FinCEN's work to combat financial crimes, including terrorist financing, proliferation financing, and complex money laundering schemes. The analyst ... would be expected to research and analyze complex intelligence and all-source information to identify individuals and entities involved in illicit activity, their sources and methods of financial, material, and logistical support. Specific details of this… more
- BOOZ, ALLEN & HAMILTON, INC. (Springfield, VA)
- …Qualifications: + Knowledge of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to the US government + Bachelor's ... degree in a Science, Technology, Engineering, or Mathematics (STEM) field preferred; Master's degree in a Science, Technology, Engineering, or Mathematics (STEM) field a plus + Graduate of a federal or DoD CI training academy Clearance: Applicants selected… more
- Tetrad Digital Integrity LLC (Springfield, VA)
- …Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and cyber threats posed to NGA, DoD and IC ... partners. + Possess a DoD Cyber Crimes Investigator certification. + Experience with the latest forensic technologies such as Access Data Forensic Toolkit (FTK). + Possess a digital forensic examiner certification. Qualifying certification sources include… more
- Cipher Tech Solutions (Vienna, VA)
- …to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author… more
- Cipher Tech Solutions (Vienna, VA)
- …to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author (actor)… more
- Cipher Tech Solutions (Vienna, VA)
- …to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author… more
- Cipher Tech Solutions (Vienna, VA)
- …to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing ... malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author… more