- Leonardo DRS, Inc. (MD)
- …was missed. Evaluate business forecasts and pinpoint any areas of vulnerability of company requirements. **Job Responsibilities** Lead activities of material ... proposal submittals. Ensure that bills of material are properly costed and submitted timely to support proposals Responsible for the direct management of activities within the Pricing Department and provide leadership to staff Manage day-to-day activities… more
- M. C. Dean (Annapolis Junction, MD)
- …Access Control Systems. + Demonstrated understanding of Windows patching and vulnerability remediation. + Basic knowledge of large-scale networking, VLANS and ... routing. + Requires reliable attendance at customer site during work hours required by customer. + Requires the ability to work flexible shifts that include nights, weekends and holidays as needed. + Requires minimum of Security + Certification, CASP, or CISSP… more
- Electrosoft (Gaithersburg, MD)
- …Systems; Database security, Active Directory, Service Oriented Architectures, vulnerability testing, networking protocols and topologies, and security architectures. ... + Develops technical solutions including information operations and analysis related to security intrusion analysis, systems and vulnerabilities, network security, advanced analytic tools, data visualization techniques. + Experience with the NIST Cybersecurity… more
- Belay Technologies (Hanover, MD)
- …engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, ... systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (ie, 24-week JCAC course will count as… more
- Vexterra Group (Bethesda, MD)
- …digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify ... hardware to either enable forensic analysis of the media or to change the functionality of the hardware for desired purposes + Perform inspection, imaging, decapsulation, deprocessing, and other activities related to hardware reverse engineering and… more
- Electrosoft (Gaithersburg, MD)
- …Systems; Database security, Active Directory, Service Oriented Architectures, vulnerability testing, networking protocols and topologies, and security architectures. ... + Develops technical solutions including information operations and analysis related to security intrusion analysis, systems and vulnerabilities, network security, advanced analytic tools, data visualization techniques. + Be well versed in IoT cybersecurity,… more
- Belay Technologies (Hanover, MD)
- …information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information ... assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course),… more
- M. C. Dean (Annapolis Junction, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, etc. + Capture all interface designs in a ... common interface control format, and stores interface data in a commonly accessible repository + Prepares time-line analysis diagrams illustrating the flow of time-dependent functions + Support establishment of a process to formally and proactively control and… more
- Belay Technologies (Hanover, MD)
- …information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information ... assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course),… more
- Vexterra Group (Bethesda, MD)
- …demonstrate [when applicable] and document the operational impact of a particular ' vulnerability EDUCATION + Bachelor of Science degree in Computer Science or ... Engineering with at least six (6) years experience; OR + Master of Science in Computer Science or Engineering with at least (4) four years experience; OR + PhD degree in Computer Science or Engineering with at least (2) years experience. SECURITY CLEARANCE +… more