- Texas A&M University System (Bryan, TX)
- …gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks).- Skilled in researching vulnerabilities and exploits ... utilized in traffic.- Skilled in using protocol analyzers.- Skilled in performing packet-level analysis.- Skilled in technical writing.- Skilled in preserving evidence integrity according to standard operating procedures or national standards.- Ability to… more
- National Express (Ray County, MO)
- …that is incompatible with its policies and values, including sexual exploitation and abuse, harassment, abuse of authority, and discrimination. National Express ... is committed to promoting the protection and safeguarding of all children and passengers._ _At National Express our goal is to be a diverse workforce that is representative of the communities we serve. All employment decisions are based on business needs, job… more
- SciTec (Boulder, CO)
- …in building innovative new tools to deliver unique world-class data exploitation capabilities. Important Notice: SciTec exclusively works on US government contracts ... that require US citizenship for all employees. SciTec cannot sponsor or assume sponsorship of employee work visas of any type. Further, US citizenship is a requirement to obtain and keep a security clearance. Applicants that do not meet these requirements will… more
- The Salvation Army (West Nyack, NY)
- …million Americans overcome poverty, homelessness, addiction, economic hardships, loneliness, and exploitation through a wide range of programs and services. Our ... Eastern Territorial Headquarters has an opening for a Gift Processing Operations Analyst. This position will assist The Salvation Army Community Relations and Development Department (CRD) in processing lock box donations in a timely manner, maintaining… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …fastest long-standing growing programs! The US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting-edge program supporting ... DoW intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war… more
- Northrop Grumman (Colorado Springs, CO)
- …knowledge in the development lifecycle and experience with ground-based sensor exploitation or radar systems. Additionally the candidate should have experience ... technical proposals, basis of estimate development, and subcontractor management. **Job Duties Include:** + Collaboratively define and document Radar IPT hardware architecture. + Support the development of component specifications and procurement requirements.… more
- Robert Half (Cincinnati, OH)
- …associated with anti-money laundering (AML), potential fraud and financial exploitation typologies. + Performing research using client systems, open-source public ... records and third-party investigative tools to establish and/or validate a subject's profile. + Documenting observations in a detailed, yet concise, manner in accordance with client policies and procedures, and recommending next steps. + You enjoy… more
- AeroVironment (Jessup, MD)
- …of the Target Digital Network Analyst (TDNA) is to conduct target focused exploitation and has experience in both Dialed Number Recognition (DNR) and Digital Network ... Intelligence (DNI) tradecraft. This role is critical to advancing mission objectives through sustained and discovery Area of Responsibility (AOR) operations. The TDNA will leverage advanced tradecraft, technical expertise, and analytical skills to identify,… more
- Leidos (Hampton, VA)
- …applications, alongside familiarity with AF Distributed Common Ground System Analysis and Exploitation Team (AET) operations. + Exposure to initiatives such as Open ... Architecture, Disposition of Forces (DOF), Joint Enterprise Modeling and Analytics (JEMA), Multi-Source Correlation System (MSCS), Thresher, and SNAPGLASS-essential for creating sensor-agnostic solutions for CFACC requirements. + Superior oral and written… more
- Veterans Affairs, Veterans Health Administration (Lexington, KY)
- …to: assessing and documenting identified behaviors or symptoms of abuse, neglect, exploitation and/or intimate partner violence; use of clinical social work skills; ... maintaining patient privacy and confidentiality per policies, handbooks or directives; acting as an advocate with appropriate community service providers and agencies when it serves the best interest of the patient and family members/caregiver; independently… more