- General Dynamics Information Technology (Falls Church, VA)
- …needs + Work with various leading tool vendors supporting zero trust to research and solution capabilities that fit Defense customer requirements and align with new ... integrated solutions. + Harness your Understanding of Comply to Connect and Vulnerability Management technologies and how those capabilities are applied in Zero… more
- CACI International (VA)
- …Telecommunications VNFs; Cloud Computing Service Models for Compute and Storage; Vulnerability Research tools, techniques and processes; Network Security ... Architecture; Cloud Security for Telecommunications; Modeling and Simulation Technology; OT/ICS + Must have strong verbal and written communication skills including demonstrated ability to communicate effectively with business and technical stakeholders,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. We are actively seeking a dynamic and… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Job Overview** The Business /… more
- Meta (Richmond, VA)
- …10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software ... in C/C++ code 13. Contributions to the security community (public research , blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with… more
- General Dynamics Information Technology (Falls Church, VA)
- …+ Work with various leading tool vendors in the ZT marketplace to research and identify solution capabilities that fit Defense customer requirements and align with ... integrated solutions. + Harness your Understanding of Comply to Connect and Vulnerability Management technologies and how those capabilities are applied in Zero… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Logistics Generalist Location:… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Systems Integrator Location:… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Platform/Infrastructure… more
- Global Resource Solutions (Arlington, VA)
- …Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis of exceptionally complex problems, and processes relating ... servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment, Group Policy management and configuration, Scripting, BMC… more