- Lockheed Martin (Hanover, MD)
- …intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool ... developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and… more
- Lockheed Martin (Hanover, MD)
- …intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool ... developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and… more
- CACI International (Aberdeen Proving Ground, MD)
- …on short notice in order to disseminate relevant threat information. + Assist with vulnerability site assessments to inform analyst team about possible use of ... UAS. + Coordinate with national and international intelligence agencies to develop data sharing capability, trend analysis and procedures. + Plan, coordinate and act as safety officer for flight operations during training and test events. + Provide… more
- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …air vehicle, performs pre-flight, in flight, and post flight checks. + Assist with vulnerability site assessments to inform analyst teams about possible use of ... UAS. + Coordinate with national and international intelligence agencies to develop data sharing capability, trend analyses, and procedures. + Plan, coordinate and act as safety officer for flight operations during training and test events. + Provide… more
- CACI International (Aberdeen Proving Ground, MD)
- …on short notice in order to disseminate relevant threat information. + Assist with vulnerability site assessments to inform analyst team about possible use of ... UAS. + Coordinate with national and international intelligence agencies to develop data sharing capability, trend analysis and procedures. + Provide comprehensive technical red-team analysis. + Perform all functional duties independently + Work and live in a… more
- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …air vehicle, performs pre-flight, in flight, and post flight checks. + Assist with vulnerability site assessments to inform analyst team about possible use of ... UAS. + Coordinate with national and international intelligence agencies to develop data sharing capability, trend analysis and procedures. + Plan, coordinate, and act as safety officer for flight operations during training and test events. + Provide… more
- System One (Rockville, MD)
- …Alert Triage, Incident Response, Digital Forensics, Malware Analysis, Vulnerability Management, Data Protection, Secure Configuration Management, Security ... summaries, and leadership briefings on significant events. * Lead enterprise Vulnerability Management and Data Protection initiatives, ensuring that vulnerability… more
- Amentum (Fort Meade, MD)
- …your findings with teammates, stakeholders, and intelligence consumers. **Computer Network Defense Analyst (CNDA 1)** Minimum Requirements: + Must be a US citizen. + ... in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or… more
- TEKsystems (Columbia, MD)
- …and reference architectures throughout the project duration. (DLP, IAM, Vulnerability Management, Network Security, Windows Infrastructure and Systems) 3.) ... Security controls and countermeasures. * Performs security functions including IAM, vulnerability scanning, light pen testing, daily review of security reports and… more
- SAIC (Beltsville, MD)
- …monitoring and mitigations. + Perform technical evaluations of recommended vulnerability mitigation actions and make recommendations based on impact and/or ... Information and Event Management (SIEM) tools (Splunk, McAfee) and National Vulnerability Database (NVD) + Familiarity with Forensic and Incident Handling. +… more