- SOS International LLC (Reston, VA)
- …+ Develop and apply expert-level understanding and skills for social media analysis and exploitation . + Utilize language or technical skills on a near daily basis to ... of experience in the IC. + Minimum four years targeting or open-source exploitation experience; 10-plus years preferred. + Proven track-record in written and verbal… more
- M&T Bank (Wilmington, DE)
- …Responsibilities:** + Complete penetration testing or red team/adversarial exploitation exercises of web applications, Application Programming Interfaces (APIs), ... and mobile. + Perform reconnaissance, social engineering, initial access, and post- exploitation activities across internal and external environments. + Develop and… more
- Textron (Fort Worth, TX)
- …penetration or adversarial testing, cyber threat analysis, vulnerability detection / exploitation , adversarial attack development, and system exploitation on ... in developing new attack techniques, methods and implementing custom exploits and exploitation tools in support of penetration tests or cyber threat emulation… more
- SJ Technologies Inc (Springfield, VA)
- …Geography, Geomatics, Surveying, or related engineering disciplines Experience with various exploitation software such as ARC-GIS, SOCET GXP, QT Modeler, Active ... assessment experience Applied knowledge of sensor imaging systems, products, and exploitation processes Basic understanding of the systems engineering lifecycle to… more
- Steampunk (Mclean, VA)
- …been a more important aspect in achieving mission and business goals. Our data exploitation experts work with our clients to support their mission and business goals ... with the best and data practitioners around. Our data exploitation approach is tightly integrated with Human-Centered Design and...You will contribute to the growth of our Data Exploitation Practice! **Qualifications** + Ability to hold a position… more
- Steampunk (Mclean, VA)
- …been a more important aspect in achieving mission and business goals. Our data exploitation experts work with our clients to support their mission and business goals ... with the best and data practitioners around. Our data exploitation approach is tightly integrated with Human-Centered Design and...You will contribute to the growth of our Data Exploitation Practice! **Qualifications** + Ability to hold a position… more
- Amentum (Fort Shafter, HI)
- …metadata within the Pacific AOR. You will perform signals identification and exploitation of digital network data using advanced SIGINT systems, databases, and ... of digital network analyses, including network activity summaries, potential exploitation vectors, and indications and warnings. + Develop intelligence products… more
- Meta (Menlo Park, CA)
- …matters related to terrorism, threats of violence, child safety, human exploitation , and fraud/scams 2. Counsel integrity teams on investigations, crisis response, ... or derogatory language, and other potential objectionable material, ie child exploitation , graphic violence, self-injury, animal abuse, and other content which may… more
- Centene Corporation (Olympia, WA)
- …to evolving threats + Collaborate with cross-functional teams for vulnerability exploitation , and tool integration while also demonstrating the ability to work ... on-premises and in cloud environments + Demonstrate a strong understanding of exploitation of Microsoft platforms used in the enterprise environment such as Windows… more
- Tyto Athene (Washington, DC)
- …and ad hoc. **Responsibilities:** + Provide support for complex computer network exploitation and defense techniques + Deter, identify, and investigate endpoint and ... surveillance/monitoring + Provide technical support for continuous monitoring, computer exploitation , and reconnaissance + Research and maintain proficiency in open… more