- Palo Alto Networks (Santa Clara, CA)
- …a backdrop to support intelligence production response for unfolding cyber events, exploitation trends, and threat actor campaigns. Collaborate with other Unit 42 ... CTI SMEs in fusion cells to expand research and existing collateral on threat groups + Industry Voice & Expertise: Must be willing to represent Unit 42 by delivering expert-level presentations at key conferences, public speaking engagements, podcasts or… more
- Steampunk (Mclean, VA)
- …developmentlifecycle + You will contribute to the growth of ourAI &Data Exploitation Practice! **Qualifications** **Qualifications** + Ability to hold a position of ... public trust with the US government. + 5-7years industry experiencedevelopingML/AI solutionsand a passion for solving complex problems. + 5-7years direct experience in Data Modeling and Data Solution Development + 1+ year performing queue modeling and… more
- National Express (Oxnard, CA)
- …conduct that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. Summit School ... Services is committed to promoting the protection and safeguarding of all children and passengers._ _We offer medical, dental, vision, basic life insurance coverage, holiday pay, and PTO accrual. Additionally, employees are able to enroll in a retirement… more
- Scientific Research Corporation (Charleston, SC)
- …systems may include, but are not limited to: + Ship's Signal Exploitation Equipment (SSEE) Increment E/F + Integrated Submarine Communications Receiving System ... (ISCRS) + Cryptologic Carry-On Program (CCOP) systems + Must be able to perform work within equipment spaces onboard US Navy platforms + Strong writing and speaking skills; experience leading and working in a diverse group of coworkers and community of… more
- The MITRE Corporation (Mclean, VA)
- …analysis and the research and development of new Document and Media Exploitation (DOMEX) capabilities to US policymakers and the Intelligence Community. An emerging ... or established leader who would thrive working as part of a MITRE team in a multi-agency environment on the nation's toughest Counterterrorism challenges. The ideal candidate would serve as an objective, informed partner for government leaders who rely on… more
- Pine Acres Rehabilitation & Care Center (Nebraska City, NE)
- …Reports any allegations of abuse, neglect, misappropriation of property, exploitation , or mistreatment of residents to supervisor and/or administrator. Protects ... residents from abuse, and cooperates with all investigations. Reports any occupational exposures to blood, body fluids, infectious materials, and/or hazardous chemicals in accordance with facility policy. Participates in all life safety and emergency drills… more
- Service Source (Alexandria, VA)
- …protocols and plans. Report any allegations of abuse, neglect, and exploitation according to ServiceSource policy/procedures. Complete incident report as required. + ... Responsible for ensuring and maintaining accurate records and documentation per the PCP, regulatory and company standards. Inform the Program Manager (or designee) of missing or inaccurate information immediately. + Communicate with family members, guardians,… more
- National Express (Easthampton, MA)
- …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
- BCMC (Arlington, VA)
- …activity * Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information * Determine tactics, ... techniques, and procedures (TTPs) for intrusion sets * Examine network topologies to understand data flows through the network * Identify and analyze anomalies in network traffic using metadata * Conduct research, analysis, and correlation across a wide… more
- Bank of America (Denver, CO)
- …to identify high-value vulnerabilities/chained attacks. + Developing Proof-of-concepts for exploitation . + Perform assessments of the security, effectiveness, and ... practicality of multiple technology systems. + Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security. + Prepare and present detailed technical information for various media… more