• Apprentice Geospatial Analyst

    Leidos (Reston, VA)
    …level knowledge of GIS vector data, schema structures, and imagery exploitation + ESRI products including ArcGIS Pro. **Preferred Qualifications:** + Bachelor's ... degree in Geography If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail.… more
    Leidos (12/19/25)
    - Related Jobs
  • CPIE Officer

    Plan International USA (Gambell, AK)
    …information from applicants' previous employers about any findings of sexual exploitation , sexual abuse, and/or sexual harassment during employment, or incidents ... under investigation when the applicant left employment. By applying, the job applicant confirms their understanding of these recruitment procedures. Please note that Plan International will never send unsolicited emails requesting payment from candidates. more
    Plan International USA (12/19/25)
    - Related Jobs
  • Kinship Navigator

    New Horizons Ranch & Center, Inc. (Abilene, TX)
    …anyone who is not committed to keeping kids safe from abuse, neglect and exploitation . At New Horizons, we Keep Kids First while providing a safe, therapeutic and ... loving environment for kids and adolescents. Through our Kinship Navigator Program, we offer services to help support kinship caregivers and their families. Qualifications: + Applicants must be 21 years of age or older; + A Bachelor's degree from an accredited… more
    New Horizons Ranch & Center, Inc. (12/19/25)
    - Related Jobs
  • SOC Analyst II

    Foxhole Technology, Inc (Smyrna, GA)
    …mitigate unauthorized use of materials. + Identify vulnerabilities, prevent content exploitation , and reduce potential legal and financial risks. + Continuously ... monitor malware detection software tools. + Monitor network-based security sensors for anomalies and unauthorized activities. + Monitoring security controls and initiating event/incident handling processes. + Provide summary reports on collaborative efforts… more
    Foxhole Technology, Inc (12/19/25)
    - Related Jobs
  • Model Based Systems Engineer SME

    KBR (Colorado Springs, CO)
    …space intelligence to the warfighter through the Tasking, Collection, Processing, Exploitation , and Dissemination (TCPED) cycle. By leveraging a Model-Based Systems ... Engineering (MBSE) approach, this program will consolidate and integrate DIA's technical collection capabilities to optimize data flow, eliminate service overlaps, evolve with leading-edge capabilities, and realize cost efficiencies to provide strategic… more
    KBR (12/18/25)
    - Related Jobs
  • Senior Vulnerability Analyst

    Tetrad Digital Integrity LLC (Arlington, VA)
    …work with the SOC and enterprise networking teams to proactively block exploitation within the customer environment. + Perform enterprise-wide network scans, agent ... scans, including credentialed scans of Linux, Windows, and Network devices. + Execute vulnerability/compliance scans through Nessus SC interface, determine whether a completed scan has provided valid results, and generate a variety of reports to meet customer… more
    Tetrad Digital Integrity LLC (12/18/25)
    - Related Jobs
  • Case Manager, Supportive Outreach Services

    South Middlesex Opportunity Council (Framingham, MA)
    …with local service providers who specialize in assisting people experiencing sexual exploitation . + Engage all clients by understanding and addressing their needs ... whether within or outside the scope of work. + Attend & participate in engagement team meetings, staff meetings, meetings with outside agencies and teams, client advocates, city officials as requested and communicate effectively with clients and staff in other… more
    South Middlesex Opportunity Council (12/18/25)
    - Related Jobs
  • Information Assurance - Cybersecurity

    Noblis (Bethesda, MD)
    …of identified platforms, reversing engineering threats to determine methods of exploitation . + Conduct malware research and research on innovating offensive tools ... and techniques, developing malicious payloads, and manipulating code execution. + Accomplish actions to protect data, networks, net-centric capabilities, and other systems by detecting, identifying, and responding to attacks, or by creating defensive toolsets… more
    Noblis (12/18/25)
    - Related Jobs
  • Targeting Officer

    Acclaim Technical Services (Mclean, VA)
    …a variety of stakeholders to address requirements and develop new leads for exploitation + Conduct detailed searches on items of interest and relay pertinent data ... to relevant customer components in a variety of written and briefing formats This posting is for multiple opportunities ranging in years of experience. All positions require possession of a current/active TS/SCI with Polygraph. Candidates who do not possess… more
    Acclaim Technical Services (12/18/25)
    - Related Jobs
  • Dispatcher

    National Express (Grayslake, IL)
    …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
    National Express (12/18/25)
    - Related Jobs