- CACI International (Fort Bragg, NC)
- …environment. You will use their technical expertise and experience of Processing, Exploitation , and Dissemination (PED) of ground feature data and remotely sensed ... data such as Multi-Spectral Imagery (MSI), Light Detection and Ranging (LiDAR), and Electro-Optical Imagery to support the operational customer. You will be required to work in dynamic fast paced environments that requires both team interaction and individual… more
- IDS International (Fort Bragg, NC)
- …communications, cyberspace operations, collection management, or analysis or the exploitation of publicly available information or social media. Preferred ... Qualifications: + Degree from an accredited college; preferred degree in Computer Science or Information Technology + CompTIA Network + + CompTIA Sec + Computer Skills: + Advanced knowledge of Microsoft Office tools (Word, Excel, and PowerPoint). + Working… more
- IDS International (Arlington, VA)
- …communications, cyberspace operations, collection management, or analysis or the exploitation of publicly available information or social media. + Demonstrated ... working knowledge of computer networking, including Local Area Networks (LAN) and Cloud Networks + Special Operations Forces experience in both intelligence and operations Computer Skills: + Advanced knowledge of Microsoft Office tools (Word, Excel, and… more
- Bronx County District Attorney's Office (Bronx, NY)
- …NYPD's Human Trafficking and Special Victims Squads, the FBI/NYPD Child Exploitation and Human Trafficking Task Force, Homeland Security Investigations, the Office's ... Digital Forensics Lab, crime victims' advocates and therapists in the Office's Crime Victims Assistance Bureau, and various governmental and nongovernmental social service providers. Candidates should be passionate about these types of cases and working with… more
- Draper (Boston, MA)
- …+ Experience with JTAG/SWD/BDM, and eMMC/NAND/SPI flash data extraction + Exploitation techniques for embedded devices across platforms and architectures + ... Familiarity of network stack and internals + Familiarity of operating system internals throughout user mode, kernel mode, and during boot processes for at least one of the following: GNU/Linux, RTOS + Familiarity with architectures and assembly: x86, ARM,… more
- Steampunk (Mclean, VA)
- …process. + You will contribute to the growth of our AI & Data Exploitation Practice! **Qualifications** + Ability to hold a position of public trust with the ... US government. + Bachelor's, Master's, or Ph.D. in Computer Science, Artificial Intelligence, Machine Learning, or a related field. + 5+ years of experience in software engineering, focused on AI/ML development. + Proven track record of leading and mentoring… more
- Lockheed Martin (Denver, CO)
- …Side‑channel analysis mitigation \(power/EM analysis\)\. * Embedded security testing \(red‑team exploitation of Linux kernel and user‑space bugs\)\. * IoT protocol ... stacks \(MQTT, CoAP, LwIP\) with security considerations\. * Edge‑device machine‑learning inference \(TensorFlow Lite, ONNX Runtime, model optimization\)\. \#LMSpaceCyberEng \#LMSpaceSoftwareEng **Security Clearance Statement:** This position requires a… more
- Michigan State University (East Lansing, MI)
- …identity harassment, sexual harassment, sexual misconduct (sexual assault, sexual exploitation , dating violence, domestic violence, stalking, etc.), and retaliation. ... All applicants will be asked to sign an authorization and release, which authorizes the University to contact the candidate's current and former employers, for a period of 7 years prior to the date of application, related to any pending investigations,… more
- CACI International (Macdill AFB, FL)
- …. Lead the technical and functional examination of target devices through exploitation and research to identify critical components of unmanned systems. . Assist ... in the management of nonstandard acquisition projects to procure threat-representative systems, track funding and order lists, and identify suitable substitutes for essential items. . Conceive and implement non-standard and novel solutions to complex problem… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …(In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching + Crypto Experience: target development, network ... analysis, drafting intel reports, speaker/language identification + 6 of 10 years in crypto language processing plus QC'ing and mentoring + 6 of 10 years has to be in the required language (if candidate has worked with multiple languages) + 4 of 6 years… more