- Nightwing (Sterling, VA)
- …Defense in Multiple Places, layered defenses, security robustness, etc.) - Performing Computer Network Defense incident triage to include determining scope, ... and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Demonstrated experience… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …but not limited to: + Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, ... cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- BAE Systems (Arlington, VA)
- …of one, or more, consumer, government, or industry communication technologies. + Network mapping or computer network enumeration experience required. ... support our government customer. These Analysts will: + Perform collection, exploitation , and analysis of signals intelligence. + Support SIGINT collection… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …data protection requirements. + Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, ... cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- Sutter Health (Sacramento, CA)
- …In-depth understanding of the anatomy of an attack and the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment. ... SHSO-Sutter Health System Office-Valley **Position Overview:** As a Cybersecurity Automation Analyst at Level 3, you are responsible for developing, implementing,… more
- SMBC (New York, NY)
- …of cyber security best practices and clearly communicate knowledge of vulnerability exploitation lifecycles and network security concepts. You will be required ... base to local markets and the organization's extensive global network . The Group's operating companies in the Americas include...to its employees. **Role Description** As a Cyber Security Analyst - Threat Researcher, you will be a key… more
- UKG (Ultimate Kronos Group) (Atlanta, GA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks). * Working knowledge of ... the Team** As a Senior Security and Threat Monitoring Analyst , you will be part of UKG's Global Security...years of experience with common attack vectors on the network layer, different classes of attacks (eg, passive, active,… more
- The Salvation Army (West Nyack, NY)
- …million Americans overcome poverty, homelessness, addiction, economic hardships, loneliness, and exploitation through a wide range of programs and services. The ... Contracts Analyst position reviews legal documents for potential contractual concerns...narratives, legal comprehension, interpreting policies and making deadlines; -Strong computer skills required (Microsoft Office Word & Excel, Lotus… more
- General Dynamics Information Technology (Scott AFB, IL)
- …vectors and methods of exploitation . + Have a specialized knowledge in computer network theory and understand IT standards and cyber security tools' ... in engineering design, development, direction, and implementation of enterprise network cyber defense capabilities to prevent sophisticated cyber threats and… more
- Belay Technologies (Hanover, MD)
- …network analysis, and metadata analysis. There are multiple levels available for the Digital Network Exploitation Analyst : + Target Digital Network ... Analyst Level 3 + Target Digital Network Analyst Level 4 Years' Experience by...of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies… more