• UAS Pilot / Red Air Pilot/ RPV Pilot

    Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
    …air vehicle, performs pre-flight, in flight, and post flight checks. + Assist with vulnerability site assessments to inform analyst team about possible use of UAS. + ... Coordinate with national and international intelligence agencies to develop data sharing capability, trend analysis and procedures. + Plan, coordinate, and act as safety officer for flight operations during training and test events. + Provide comprehensive… more
    Intrepid Solutions and Services (08/16/25)
    - Related Jobs
  • Information System Security Officer

    ManTech (Columbia, MD)
    …System Security Plans (SSPs) for both new and existing systems + Analyze vulnerability scan results and collaborate with system owners to implement remediation + ... Leverage sponsor tools such as Gatekeeper, Xacta, SEAR, and LatteArt in daily operations **Minimum Qualifications:** + Bachelor's degree with 12+ years of relevant experience OR associate's degree with 15 years of relevant experience OR high school diploma/GED… more
    ManTech (08/16/25)
    - Related Jobs
  • Research Faculty (PREP0003324) - #Faculty

    Johns Hopkins University (Gaithersburg, MD)
    …) for reducing building vulnerability to damage from Wildland-Urban ... Interface (WUI) fires; and (3) developing repair cost estimation models the to improve building component damage consequences within NIST's Nonstructural Element Database (NED). Key responsibilities will include but are not limited to: | Extend benefit-cost… more
    Johns Hopkins University (08/16/25)
    - Related Jobs
  • System Administrator Level IV

    General Dynamics Information Technology (Annapolis Junction, MD)
    …sustainment of compliance with applicable system security controls. + Perform periodic vulnerability scans of systems + Provide support to IT systems including ... day-to-day operations, monitoring and problem resolution for all the client/server/storage/network devices, mobile devices, etc. + Implement IAVA security patches and ensure patch status is recorded in appropriate systems of record. + Provide support for the… more
    General Dynamics Information Technology (08/15/25)
    - Related Jobs
  • Irregular Warfare Analyst

    Leidos (Fort Meade, MD)
    …operations. + Utilize experience conducting intelligence nodal analysis and critical vulnerability assessments of enemy networks to identify and nominate key nodes ... for kinetic and non-kinetic options, thereby disrupting or eliminating enemy centers of gravity. + Provide IW, and Unconventional Warfare UW, OIE and intelligence doctrine, operations, policy, and authorities subject matter expertise and integration of lessons… more
    Leidos (08/15/25)
    - Related Jobs
  • Systems Engineer

    KBR (Bethesda, MD)
    …security, counter-intelligence, and protection requirements + Conduct Performer Vulnerability Assessments to include level of foreign ownership/influence, business ... activities, and financial concerns + Present assessments to Government lead / decision body + Maintain database of all technologies investigated Qualifications: Required: + A CURRENT and ACTIVE TOP SECRET / SCI federal security clearance with Polygraph + Seven… more
    KBR (08/15/25)
    - Related Jobs
  • System Administrator 4

    M. C. Dean (Annapolis Junction, MD)
    …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, etc. + Establishes and follows a formal ... procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces + Captures all interface designs in a common interface control format, and stores interface data in a commonly accessible repository +… more
    M. C. Dean (08/15/25)
    - Related Jobs
  • Software / CNO Developer

    Parsons Corporation (Baltimore, MD)
    …Desired Skills You'll Bring:** + Software Development, Reverse Engineering, Vulnerability Analysis + Cyber Security, AI/ML, cloud computing, full-stack development ... + Languages: C/C++, Java, Python, scripting languages, Assembly + Platforms: Linux, Windows, Mobile + Assembly: x86, ARM, MIPS + CySA+, or GICSP, or GSEC, or SSCP (DoD 8570/8140 IAT level II certification) **Security Clearance Requirement:** An active Top… more
    Parsons Corporation (08/15/25)
    - Related Jobs
  • Research and Technology Protection Analyst

    KBR (Bethesda, MD)
    …security, counter-intelligence, and protection requirements + Conduct Performer Vulnerability Assessments to include level of foreign ownership/influence, business ... activities, and financial concerns annually + Develop and update the Security Classification Guide for each research effort every six months + Develop and update Export Control Assessment. Reports include considerations of International Traffic in Arms… more
    KBR (08/15/25)
    - Related Jobs
  • Senior Business Applications Manager

    ISC2 (Annapolis, MD)
    …teams to ensure compliance with security policies, threat modeling, and vulnerability management. + Partner with business stakeholders to translate complex ... functional requirements into secure, scalable, and integrated solutions. + Provide technical leadership in configuration, development, and deployment using tools such as Salesforce DX, Git, Bitbucket, and automation pipelines. + Mentor and supervise developers… more
    ISC2 (08/15/25)
    - Related Jobs