- Amentum (Fort Shafter, HI)
- …and analytical techniques to perform signals identification, geolocation, and exploitation . You will also be generating time-sensitive intelligence reports, alerts, ... and briefings to support tactical and strategic decision-making by Combatant Command and Army leadership as well as operational units. Your duties will further include collaborating closely with other intelligence disciplines, including SIGINT, HUMINT, and… more
- CACI International (Annapolis Junction, MD)
- …Join our dynamic team as a Reverse Engineer with a focus on malware exploitation (MEX) and mobile capabilities. This role offers a unique chance to make a ... significant impact by enhancing our endpoint and mobile toolsets. You will be at the forefront of analyzing and advancing our technologies to meet the ever-evolving cybersecurity landscape. If you are passionate about reverse engineering, malware analysis, and… more
- BAE Systems (Broomfield, CO)
- …sub-systems (aperture, front-end, software define radios, processing, basic exploitation , etc.) and phenomenologies (radiometry, imaging, sounding, altimetry, ... scatterometry, radio occultation, SAR, etc.); knowledge should include Remote Sensing solution s concept and requirements that impact Payload's cost/schedule, development, operation, and performance. + Knowledge and demonstrated experience in defining payload… more
- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat environments (eg,… more
- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat environments (eg,… more
- ARSIEM (Arlington, VA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Knowledge of VM scanning, Web ... Application scanning, and red team processes + Experience in recognizing and categorizing types of vulnerabilities and associated attacks + Knowledge of Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat… more
- Leidos (Springfield, VA)
- …in data science, including the areas of data collection processing exploitation , transformation services, modeling, and analytics. + 3-5 years of demonstrated ... experience performing geospatial data management, including data type conversions coordinate systems in (latitude and longitude, UTM) and their conversions and knowledge of projections and their properties/conversions. + Knowledge and experience using version… more
- City of New York (New York, NY)
- …protect themselves from physical or mental injury, neglect, maltreatment, or financial exploitation . Furthermore, they are in need of protection from actual or ... threatened harm, neglect or hazardous situations, and they have no one available who is willing and able to assist them responsibly. APS establishes appropriate safeguards to protect a given individual's resources, safety or health, and stabilizes the… more
- ARSIEM (Arlington, VA)
- …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing and categorizing ... types of vulnerabilities and associated attacks + Knowledge of basic system administration and operating system hardening techniques + Knowledge of Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat… more
- ARSIEM (Arlington, VA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) + Skill in recognizing threat actor ... campaigns, tactics, techniques, and procedures + Familiar with basic system and network administration, traffic analysis techniques, Computer Network Defense policies, procedures, and regulations + Knowledge of different operational threat environments (eg,… more