- Michigan State University (East Lansing, MI)
- …identity harassment, sexual harassment, sexual misconduct (sexual assault, sexual exploitation , dating violence, domestic violence, stalking, etc.), and retaliation. ... All applicants will be asked to sign an authorization and release, which authorizes the University to contact the candidate's current and former employers, for a period of 7 years prior to the date of application, related to any pending investigations,… more
- SciTec (Dayton, OH)
- …Government in building innovative new tools to deliver unique world-class data exploitation capabilities. SciTec is seeking a highly skilled Data Scientists to join ... our analytics team working on an innovative contract supporting NGA leveraging cutting-edge technologies from Dayton, OH. This role will be responsible for delivering automation to key national security missions interacting with petabyte-scale data on… more
- Sumaria Systems, Inc. (Bedford, MA)
- …Radar Imagery, Integrated Air/Missile Defense, and Mobile/Fixed C2ISR Performance, Exploitation & Dissemination Facilities. As the Network Services Engineer, you ... will perform work that applies a broad theoretical and practical knowledge of system network engineering to the full spectrum acquisition process with a focus on mission applications, support the development, acquisition, and accreditation efforts. In addition… more
- Executive Office for US Attorneys and the Office of the US… (San Francisco, CA)
- …crimes, including offenses involving drug trafficking and smuggling; child exploitation ; gang activity and violence; illegal immigration; national security and ... border security; elder abuse; cybercrime; theft of intellectual property; and financial crimes, complex fraud and/or corruption in government, health care, banking, securities, corporate activities, federal procurement, bankruptcies, and federal taxation. They… more
- Nightwing (Sterling, VA)
- …and security plans). + Identify and recommend mitigations for potential avenues of exploitation , including system level attacks and user level attacks. + Advises and ... assists with the Lifecycle Assessment and Authorization (A&A) process and development of Systems Security Plan (SSP) + Develops and documents security evaluation test plans and procedures + Develops SCA artifacts, including the Security Assessment Plan (SAP),… more
- Leidos (Reston, VA)
- …inside a government facility. **Role & Responsibility:** + Use exploitation products, intelligence resources and engineering expertise to produce intelligence ... to characterize selected facilities + Provide engineering guidance and judgment throughout the characterization process to produce accurate intelligence estimates of standard facility operations (power, HVAC, security, etc.) and equipment + Model different… more
- ADM (Erlanger, KY)
- …Intelligence analysis tradecraft skills + Strong experience in vulnerability, exploitation , penetration testing concepts + Strong experience with information ... security, host- and network-based forensics, monitoring, detection, and incident response best practices + Strong experience in computer intrusions, malicious code, and technical aspects of associated threat vectors, adversarial TTPs, and their relation to the… more