• Expert Geospatial Intelligence Analyst

    CACI International (Fort Bragg, NC)
    …environment. You will use their technical expertise and experience of Processing, Exploitation , and Dissemination (PED) of ground feature data and remotely sensed ... data such as Multi-Spectral Imagery (MSI), Light Detection and Ranging (LiDAR), and Electro-Optical Imagery to support the operational customer. You will be required to work in dynamic fast paced environments that requires both team interaction and individual… more
    CACI International (10/14/25)
    - Related Jobs
  • Field Coordinator, Synthetic Internet for Training…

    IDS International (Fort Bragg, NC)
    …communications, cyberspace operations, collection management, or analysis or the exploitation of publicly available information or social media. Preferred ... Qualifications: + Degree from an accredited college; preferred degree in Computer Science or Information Technology + CompTIA Network + + CompTIA Sec + Computer Skills: + Advanced knowledge of Microsoft Office tools (Word, Excel, and PowerPoint). + Working… more
    IDS International (10/13/25)
    - Related Jobs
  • Information Warfare Exercise Design Specialist

    IDS International (Arlington, VA)
    …communications, cyberspace operations, collection management, or analysis or the exploitation of publicly available information or social media. + Demonstrated ... working knowledge of computer networking, including Local Area Networks (LAN) and Cloud Networks + Special Operations Forces experience in both intelligence and operations Computer Skills: + Advanced knowledge of Microsoft Office tools (Word, Excel, and… more
    IDS International (10/13/25)
    - Related Jobs
  • ADA-Human Trafficking Unit

    Bronx County District Attorney's Office (Bronx, NY)
    …NYPD's Human Trafficking and Special Victims Squads, the FBI/NYPD Child Exploitation and Human Trafficking Task Force, Homeland Security Investigations, the Office's ... Digital Forensics Lab, crime victims' advocates and therapists in the Office's Crime Victims Assistance Bureau, and various governmental and nongovernmental social service providers. Candidates should be passionate about these types of cases and working with… more
    Bronx County District Attorney's Office (10/12/25)
    - Related Jobs
  • Senior Embedded Vulnerability Researcher

    Draper (Boston, MA)
    …+ Experience with JTAG/SWD/BDM, and eMMC/NAND/SPI flash data extraction + Exploitation techniques for embedded devices across platforms and architectures + ... Familiarity of network stack and internals + Familiarity of operating system internals throughout user mode, kernel mode, and during boot processes for at least one of the following: GNU/Linux, RTOS + Familiarity with architectures and assembly: x86, ARM,… more
    Draper (10/11/25)
    - Related Jobs
  • AI Tech Lead

    Steampunk (Mclean, VA)
    …process. + You will contribute to the growth of our AI & Data Exploitation Practice! **Qualifications** + Ability to hold a position of public trust with the ... US government. + Bachelor's, Master's, or Ph.D. in Computer Science, Artificial Intelligence, Machine Learning, or a related field. + 5+ years of experience in software engineering, focused on AI/ML development. + Proven track record of leading and mentoring… more
    Steampunk (10/11/25)
    - Related Jobs
  • Embedded Cyber Software Engineer

    Lockheed Martin (Denver, CO)
    …Side‑channel analysis mitigation \(power/EM analysis\)\. * Embedded security testing \(red‑team exploitation of Linux kernel and user‑space bugs\)\. * IoT protocol ... stacks \(MQTT, CoAP, LwIP\) with security considerations\. * Edge‑device machine‑learning inference \(TensorFlow Lite, ONNX Runtime, model optimization\)\. \#LMSpaceCyberEng \#LMSpaceSoftwareEng **Security Clearance Statement:** This position requires a… more
    Lockheed Martin (10/10/25)
    - Related Jobs
  • Specialist - Outreach-Fixed Term

    Michigan State University (East Lansing, MI)
    …identity harassment, sexual harassment, sexual misconduct (sexual assault, sexual exploitation , dating violence, domestic violence, stalking, etc.), and retaliation. ... All applicants will be asked to sign an authorization and release, which authorizes the University to contact the candidate's current and former employers, for a period of 7 years prior to the date of application, related to any pending investigations,… more
    Michigan State University (10/10/25)
    - Related Jobs
  • UxS Engineer, Expert

    CACI International (Macdill AFB, FL)
    …. Lead the technical and functional examination of target devices through exploitation and research to identify critical components of unmanned systems. . Assist ... in the management of nonstandard acquisition projects to procure threat-representative systems, track funding and order lists, and identify suitable substitutes for essential items. . Conceive and implement non-standard and novel solutions to complex problem… more
    CACI International (10/09/25)
    - Related Jobs
  • Senior Russian Language Analyst

    Huntington Ingalls Industries (Fort Meade, MD)
    …(In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching + Crypto Experience: target development, network ... analysis, drafting intel reports, speaker/language identification + 6 of 10 years in crypto language processing plus QC'ing and mentoring + 6 of 10 years has to be in the required language (if candidate has worked with multiple languages) + 4 of 6 years… more
    Huntington Ingalls Industries (10/09/25)
    - Related Jobs