- BAE Systems (San Diego, CA)
- …You will primarily support the GXP Program. BAE Systems Geospatial eXploitation ( _GXP_ ) develops industry-leading geospatial intelligence _software_ for data ... management, image exploitation , and reporting. **Position Summary:** This position requires a...systems are compliant with applicable STIGs, RMF controls, and cyber hygiene policies. + Maintain system documentation, configuration change… more
- Sumaria Systems, Inc. (Bedford, MA)
- …Radar Imagery, Integrated Air/Missile Defense, and Mobile/Fixed C2ISR Performance, Exploitation & Dissemination Facilities. As the Network Services Engineer, you ... documents; evaluating/analyzing network designs for compliance with project and cyber security requirements; performing on-site cyber security fielding… more
- Kansas Judicial Branch (Topeka, KS)
- …work designing, building, and overseeing the implementation of enterprise-wide cyber systems, networks, and information security for the judicial branch. ... best practices. + Ensure compliance with changing laws and applicable regulations. + Test and audit systems for vulnerabilities and to ensure security. + Perform… more
- Huntington Ingalls Industries (Hanover, MD)
- …a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works within ... our nation's intelligence and cyber operations communities to defend our interests in cyberspace...over time, but current projects focus on improving the exploitation of airborne sensor data through object tracking, multi-sensor… more
- Huntington Ingalls Industries (Hanover, MD)
- …a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works within ... our nation's intelligence and cyber operations communities to defend our interests in cyberspace...just maintain; you'll innovate! You'll design, implement, integrate, and test new and improved capabilities for an operationally fielded… more
- Meta (New York, NY)
- …including Red Team operations, threat-based evaluations, and vulnerability research and exploitation against both internal and external facing systems 2. Design, ... technical assessments, Purple Team Engagements, and other security initiatives to test attack detection and prevention effectiveness 3. Automate portions of… more
- SAIC (Huntsville, AL)
- …maintain a guidance, navigation, and control (GNC) lab supporting foreign material exploitation (FME) at a customer location on Redstone Arsenal. SAIC operates ... missiles. + Select, set up, verify proper operation of, calibrate, and document equipment- test procedures for GNC Lab equipment. + Collect data that will verify the… more
- Northrop Grumman (Chantilly, VA)
- …and for generations to come. Northrop Grumman Strategic Intelligence & Data Exploitation (SI&DE) is an Operating Unit within the larger Northrop Grumman Corporation ... sectors for Passive and Active SIGINT, Non-kinetic effects and techniques, Cyber , sensor technologies, signal processing, electronic attack techniques, and special… more
- CACI International (St. Louis, MO)
- …Center (NOC), ESC Red/Blue Teams, CTE Teams, and other mission partner's/agency's cyber exercises. The candidate shall develop CSOC internal exercises to evaluate ... effectiveness of training, tools, processes, and procedures to include active exploitation testing to determine effectiveness of tools, processes and people.… more
- SAIC (Chantilly, VA)
- …+ Provide advice/analysis on ground segment requirements, design, development, integration, test , deployment, and operations support + Support the development of ... and requirements + Support relevant ground segment specification development and test planning activities + Support coordination and completion of ground segment… more