- Noblis (Springfield, VA)
- …on joint initiatives. Additionally, professionals may be involved in conducting threat assessments, risk analyses, and vulnerability assessments to support security ... planning and mitigation efforts. Their expertise in areas such as threat analysis, risk assessment, and intelligence tradecraft enables organizations to anticipate… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …measures Government authorities can take to mitigate, frustrate, or thwart threat network operations, directly or indirectly, based on available information and ... analysis. + Provides Target System Analysis (TSA) of threat platforms and organizations that support operational planning and targeting efforts. + Provides targeting… more
- Google (Washington, DC)
- …deliverables. **Preferred qualifications:** + Experience working on novel AI risks and threat actors engaging in cyber misuse, societal harms, weaponization, etc. + ... Experience working with the technical and policy challenges of AI systems. + Experience with using statistical analysis and hypothesis testing. + Experience with Python or other scripting languages for data analysis and prototyping. + Excellent communication,… more
- Google (Washington, DC)
- …considerations of technology and the future of AI. + Ability to lead in threat or human rights' assessment (ie, verifying that technology does not produce adverse ... effects on users). + Excellent communication and presentation skills (written and verbal) and the ability to influence cross-functionally at various levels. Trust & Safety team members are tasked with identifying and taking on the biggest problems that… more
- CareFirst (Washington, DC)
- …Collaborates with the security community to obtain technical cyber threat intelligence. Researches emerging information security threats, vulnerabilities, and their ... countermeasures. + Leads the implementation of strategies for the detection and reporting of day-to-day security incidents. + Participates in the development of quality assurance policies. **SUPERVISORY RESPONSIBILITY:** Position does not have direct reports… more
- Amentum (Washington, DC)
- …case review process including: + Intra-agency and interagency coordination + Threat , vulnerability, consequence, and risk analysis + Risk mitigation strategy ... development and implementation + Compliance monitoring and enforcement Candidates must be well-organized, detail-oriented, and team-focused, with demonstrably strong interpersonal, research, and critical thinking skills. The ability to write succinctly for an… more
- Guidehouse (Washington, DC)
- …the organization's defined risk tolerances and risk threshold. + Gather threat and vulnerability information from internal and external information sharing forums ... and sources. + Communicate cybersecurity risk assessment results through written narrative reports and executive-level presentations + Identify, coordinate, track remediation, and monitor risk exposures; identify and communicate trends in data + Evaluate… more
- Nightwing (Sterling, VA)
- …proactively hunting for malicious cyber activity. We are seeking Cyber Threat Hunters to support this critical customer mission. Responsibilities: - Acquire/collect ... computer artifacts (eg, malware, user activity, link files) in support of onsite engagements - Triage electronic devices and assess evidentiary value - Correlate forensic findings to network events in support of developing an intrusion narrative - Collect and… more
- Nightwing (Sterling, VA)
- …with proactively hunting for malicious cyber activity. We are seeking Cyber Threat Hunters to support this critical customer mission. Responsibilities: - Correlate ... forensic findings to network events in support of developing an intrusion narrative - Collect and document system state information (eg running processes, network connections) prior to imaging, as required - Perform forensic triage of an incident to include… more
- Leidos (Fort Meade, MD)
- …(2) cyber vulnerabilities and exploitation techniques and (3) cyber threat /adversary methodologies (TTPs). **Preferred Qualifications** + Experience with DISA and ... DoD Networks. + Experience with technical and/or military writing + Experience with configuring and operating cybersecurity and networking devices (ie routers, firewalls, IDPS) + Experience with mitigation development against malicious cyber activity +… more