- Nightwing (Arlington, VA)
- …with the restoration of services. Nightwing is seeking a Cyber Threat Analyst to support this critical customer mission. **Responsibilities:** - Researching and ... enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) - Skill in recognizing and categorizing… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Technologies Division is currently seeking a Senior Russian Cryptologic Language Analyst to perform tasks required to process language materials/data at the ... (In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching + Crypto Experience: target development, network… more
- Nightwing (Sterling, VA)
- …with the restoration of services. Nightwing is seeking a Cyber Network Defense Analyst to support this critical customer mission. The CDNA uses information collected ... activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze… more
- Air National Guard Units (Fargo, ND)
- … Exploitation , and Dissemination (TPED). Serves as a Targeting Intelligence Analyst in the IMINT exploitation section, responsible for IMINT operations ... to perform specialized IMINT duties as a Targeting Intelligence Analyst and to train assigned military unit members in...Works with other crew members to ensure the IMINT exploitation section maintains a capability to provide timely and… more
- Amentum (Quantico, VA)
- …military system capabilities and limitations to assess opportunities for USMC exploitation and USMC system and doctrine vulnerabilities. + Produce written ... intelligence assessments and briefings to support consumers at the tactical, operational, and strategic level. + Assess information gaps, develop collection strategies, compose collection requirements, and provide feedback to collection officers. + Possess… more
- Leidos (Hampton, VA)
- …(AF DCGS)** Enterprise stakeholders. + Collaborate with **AF DCGS Analysis and Exploitation Teams (AET)** to support current operations and Analytic Lines of Effort ... (ALOE). + Assist with long- and short-term analysis, focusing on **Air Operation Center (AOC) mission planning** , ISR operations, and assessments of foreign military capabilities and defense issues. + Develop responses for **Requests for Information (RFI)**… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …fastest long-standing growing programs! The US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting-edge program supporting ... DoW intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war… more
- Global Dimensions (Wahiawa, HI)
- …(In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching + Crypto Experience: target development, network ... analysis, drafting intel reports, speaker/language identification + 6 of 10 yrs in crypto language processing - above (OLA 2) plus QC'ing, and mentoring + 6 of 10 yrs has to be in the required language(s) + 4 of 6 yrs performing crypto language processing + 3… more
- Global Dimensions (Fort Meade, MD)
- …(In target language) oral translations, non-crypto audio/graphic translations, doc exploitation , formal teaching. + Crypto Experience: target development, network ... analysis, drafting intel reports, speaker/language identification. + 6 of 10 yrs in crypto language processing - above (OLA 2) plus QC'ing, and mentoring. + 6 of 10 yrs has to be in the required language(s). + 4 of 6 yrs performing crypto language processing.… more
- Nightwing (Sterling, VA)
- …activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze ... anomalies in network traffic using metadata - Identify applications and operating systems of a network device based on network traffic - Identify network mapping and operating system (OS) fingerprinting/other baselining activities - Assist in the construction… more