- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a… more
- Zero Point, Inc (Southern Pines, NC)
- …and vehicle-borne tactical electromagnetic warfare detection, identification, and exploitation equipment/systems in an expeditionary environment. + Support the ... development of science and technology related to electronic, acoustic, magnetic, seismology, radiography, radio frequency, and unintended radiated emissions phenomenology. Support includes, but is not limited to, testing, technical assessment, and/or… more
- Nightwing (Sterling, VA)
- …- Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information - Collects network device ... integrity data and analyze for signs of tampering or compromise - Assists with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite… more
- JHNA (Newport News, VA)
- …with JHNA's core mission areas, including autonomy, digital transformation, data exploitation , and decision intelligence. + Contribute to the expansion of automation ... capabilities as part of future COTS product offerings and scalable enterprise solutions. Analytical and Technical Execution + Partner with program leads and technical experts to define meaningful metrics and data requirements that support mission objectives. +… more
- JHNA (Newport News, VA)
- …with JHNA's core mission areas, including autonomy, digital transformation, data exploitation , and decision intelligence. - Contribute to the expansion of automation ... capabilities as part of future COTS product offerings and scalable enterprise solutions. Analytical and Technical Execution - Partner with program leads and technical experts to define meaningful metrics and data requirements that support mission objectives. -… more
- Masego (St. Louis, MO)
- …artifacts required for the end-user in the collection, production, dissemination, and exploitation of GEOINT. + Serve as Subject Matter Experts (SMEs) to the ... World Geodetic Systems and Geomatics - Focus Group (WGSG FG) and the Geospatial-Intelligence Standards Working Group (GWG) providing guidance as to the mandating of WGS and Geomatics standards in the DoD IT Standards Registry (DISR) and the IC Standards… more
- General Dynamics Information Technology (Langley AFB, VA)
- …supports the Air Forces' Distributed Common Ground System (DCGS) Processing, Exploitation , Dissemination (PED) Operations Center (DOC). Specifically, you will be ... providing Tie-1 Network monitoring, Operational Support, and Help Desk services across a global enterprise. **Task: Network Monitoring/Help Desk Support Subtasks.** + Conduct fault management to detect, isolate, and correct abnormal network and information… more
- Leidos (Reston, VA)
- …a government SCIF facility. Role and Responsibility: * Use tradecraft exploitation tools, intelligence sources and engineering expertise to produce characterizations ... of selected facilities * Provide engineering guidance and judgment throughout the characterization process to produce accurate intelligence estimates * Brief senior officials regarding capability trends and analysis **Required Qualifications:** * Candidate… more
- CoStar Realty Information, Inc. (Arlington, VA)
- …/ Experienced (OSEP) + Hack the Box Bug Bounty Hunter (CBBH) / Web Exploitation Expert (CWEE) + Hack the Box Penetration Testing Specialist (CPTS) / AD Pentesting ... Expert (CAPE) + INE Security Web Application Penetration Tester eXtreme (eWPTX) + **Those certifications can be substituted with considerable experience in CTFs, impressive CVEs, or impressive bug bounty reports.** **Preferred Qualifications and Skills** +… more
- Global Dimensions (Quantico, VA)
- …security objectives and senior policy making. + Provide real-time FMV exploitation , instruction, and both periodic and on-the-spot evaluations of analysts. + ... Provide instruction on FMV analysis and associated tasks by performing first-phase FMV analysis. + Instruction shall include, but is not limited to: FMV analysis, initial qualification training, mission qualification training, mentor/evaluator training, and… more