- Imagine One Technology & Management (Dahlgren, VA)
- …2. Red Team Operations (government or contractor) 3. Tool/Software Development (exploits/ malware , C2, reverse engineering, bug bounties) 4. Python, C, C Sharp, ... C++, Go, Perl, Powershell 5. Web Dev/Web App Dev/Web Penetration testing 4. PHP, ASP, SQL db's, Java, HTML, No SQL [VW1] Educational Requirements: + Minimum certification as IAT Level II per DoD 8570.01, or successor. + Minimum certification as penetration… more
- Google (PA)
- …network forensic reports of electronic media, packet capture, log data analysis, malware triage and network devices in support of information security operations. + ... Ability to correlate raw intelligence from sensors, incident response engagements, and other sources into reports and briefings. + Ability to take ambiguous topics, build strategy, and influence stakeholders. + Excellent written/verbal communication to convey… more
- Intercontinental Exchange (ICE) (Atlanta, GA)
- …to apply them within the Enterprise. Awareness of SPF, DKIM, DMARC, Anti-Spam, Anti- Malware and others + Familiarity with Active Directory, Group Policy, DNS and ... Load Balancers + Familiarity with ADFS, Entra ID and SAML + Experience with management and automation scripting in PowerShell. Should be comfortable performing tasks from the command line and write basic scripts + Experience with the management and… more
- Dickinson Financial Corporation (Kansas City, MO)
- …of vulnerabilities and risks. + Will monitor the handling of firewall/IDS/IPS/ malware incidents to ensure issues are investigated and solved appropriately. Could ... include investigating incidents directly. Will keep management apprised of results. + Will develop incident procedures and oversee the investigation and reporting of security incidents including phishing, smishing, virus, dos, and privacy breaches. Will keep… more
- ManpowerGroup (Redmond, WA)
- …+ Opportunity to work in the high-impact space of cyber-crime and malware disruption. + Contribute to securing Microsoft infrastructure through automation and secure ... deployments. + Build modular, scalable systems supporting major security operations. + Engage with cutting-edge technologies and innovative security solutions. + Join a diverse and inclusive team committed to professional growth and development. **Upon… more
- Bank of America (Washington, DC)
- …email and b2b environments. Including technology that provides proxy control, malware inspection, SSL termination, and Data Loss Prevention (DLP). . Understanding ... of how Content Delivery Networks (CDNs) work, how they are designed to provide application services, and how they are used to mitigate network security threats. . Detailed knowledge of Network Security solutions such as DDOS mitigations techniques, WAF, etc. .… more
- Noblis (Chantilly, VA)
- …conferences + Advanced application of risk assessment methodologies + Complex malware analysis, digital forensics, and software reverse engineering + Management of ... high-security virtualized environments \#nowhiring Overview Noblis (http://www.noblis.org/) and our wholly owned subsidiaries, Noblis ESI , and Noblis MSD tackle the nation's toughest problems and apply advanced solutions to our clients' most critical… more
- Meta (Olympia, WA)
- …investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, ... sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience… more
- Bayer (Whippany, NJ)
- …person is responsible for analyzing system events, security incidents and potential malware , ensuring the security capabilities across the Bayer Group globally. In ... addition, the analyst maintains and improves related processes and procedures to manage cyber defense and to investigate cyberattacks. **YOUR TASKS AND RESPONSIBILITIES:** + Investigate high complexity cyber security incidents (2nd Level) with minimal… more
- Nightwing (Sterling, VA)
- …defensive cyber operations** **Vulnerability research, and exploit development** ** Malware analysis** **Network protocol development, analysis, and reverse ... engineering** **Host and network-based forensic analysis** **Machine learning methods as applied to cyber security problems** **Program analysis (including vulnerability detection and/or remediation)** **Use critical thinking to bring together information from… more