- New York State Civil Service (Brooklyn, NY)
- …and two years of experience* in intelligence analysis, homeland security, counter terrorism , emergency preparedness analysis and assessment, or ... that could arise.* Instruct transportation hub employees in the area of terrorism awareness.* Evaluate and comment on homeland security, emergency services, and… more
- General Dynamics Information Technology (Quantico, VA)
- …component with primary responsibility for criminal investigation, law enforcement (LE), counter - terrorism (CT), counterintelligence (CI), and cyber matters. NCIS ... in non-combat matters involving actual, potential, or suspected criminal, terrorism , sabotage, espionage, and subversive activities. **MEANINGFUL WORK AND PERSONAL… more
- General Dynamics Information Technology (Quantico, VA)
- …component with primary responsibility for criminal investigation, law enforcement (LE), counter - terrorism (CT), counterintelligence (CI), and cyber matters. NCIS ... in non-combat matters involving actual, potential, or suspected criminal, terrorism , sabotage, espionage, and subversive activities. **MEANINGFUL WORK + PERSONAL… more
- General Dynamics Information Technology (Quantico, VA)
- …component with primary responsibility for criminal investigation, law enforcement (LE), counter - terrorism (CT), counterintelligence (CI), and cyber matters. NCIS ... in non-combat matters involving actual, potential, or suspected criminal, terrorism , sabotage, espionage, and subversive activities. NCIS provides the DON… more
- SOS International LLC (Reston, VA)
- …cyber threats, emerging technologies, counter narcotics, military, science and technology, counter terrorism , or media of a particular country or region. + ... Experience with open source research and support, product creation and dissemination, collection management and workflow support. + Experience in open source social media collection, analysis, and exploitation. + Proficiency with Microsoft Teams, Excel, and… more
- SMX (Fayetteville, NC)
- …SOF elements in support of Counter Violent Extremist Organization and Counter Terrorism operations + Expert understanding of intelligence tools and Motion ... Imagery PED Software such as SOCETGXP, In Motion, Microsoft Office, Google Earth, AIDE, DCGS-A, MIRC, PIDGIN, GETS, AIMES, NGDS, GSR, CEDALION and UVDS + The ability to gather, interpret, and compare data to produce reports and establish conclusions + The… more
- SMX (Fayetteville, NC)
- …SOF elements in support of Counter Violent Extremist Organization and Counter Terrorism operations is required + Possess an understanding of intelligence ... tools and Motion Imagery PED Software such as SOCETGXP, In Motion, Microsoft Office, Google Earth, AIDE, DCGS-A, MIRC, PIDGIN, GETS, AIMES, NGDS, GSR, CEDALION and UVDS + The ability to draft presentations and supporting documentation, on a as needed basis is… more
- Amentum (Reston, VA)
- … Office to drive DoD policy, planning, and operational decisions to counter regional and transnational terrorism threats. We conduct mission-critical ... network development analysis. Provides analytic support to counterterrorism and counter insurgency operations. Supports the tracking, identifying, entering, and… more
- Customs and Border Protection (Atlanta, GA)
- …and instruments of terror and performing layered enforcement activities relative to counter - terrorism . Preventing the entry of terrorists and instruments of ... terror, harmful pests and diseases, illegal drugs and contraband, and all illegal aliens and importations/exportations contrary to law and trade agreements from entering/exiting the United States. Evaluating employees' performance and conduct; resolving… more
- New York State Civil Service (Albany, NY)
- …this position will report to the Cyber Incident Response Team within the Office of Counter Terrorism . Duties include but are not limited to the following: *Serve ... as a subject matter expert in cybersecurity incident response. *Provide cyber incident response support, including digital forensics and root cause analysis, for confirmed actionable incidents such as detected cyber-attacks, malware infections, or ransomware… more