- Huntington Ingalls Industries (Fort Meade, MD)
- …and information to others. + Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, ... cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …doc exploitation , formal teaching + Crypto Experience: target development, network analysis, drafting intel reports, speaker/language identification + 6 of 10 ... cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- Leidos (Alexandria, VA)
- **Description** Leidos has a current job opportunity for a **Senior Malware Analyst ** on the DISA GSM-O program in Alexandria, VA.An active Top Secret security ... prevent future risks. **Responsibilities include:** + Demonstrated advanced experience with network traffic and communications, including known ports and services; +… more
- Serco (Langley AFB, VA)
- **Position Description** Serco is looking for an **Industrial Security Analyst - Security Engineer,** at Langley Air Force Base in Hampton, Virginia. Bring your ... Surveillance Countermeasures (TSCM) requirements. + Ensure systems authorization for government network systems required for CAF DTC Mission support such as but… more
- Mastercard (New York, NY)
- …and governments realize their greatest potential._ **Title and Summary** Lead Red Team Analyst Who is Mastercard? Mastercard is a global technology company in the ... operational experience with common offensive security tools, C2 frameworks, TTPs, and exploitation techniques * Skilled in presenting complex data to technical and… more
- Deloitte (Baltimore, MD)
- …data protection requirements. + Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, ... and COAs to solve complex cybersecurity problems to include: + Coordinating network defense operations with DOD Component Commands / Services / Agencies /… more
- General Dynamics Information Technology (Springfield, VA)
- …GDIT's fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program ... be applied to current and future investigations + Utilize network and endpoint defensive tools to identify and analyze...methods of tracking and detecting malicious activity within a network + Be available for after-hours support when required.… more
- General Dynamics Information Technology (Pearl Harbor, HI)
- …fastest long-standing growing programs! US Battlefield Information Collection and Exploitation Systems eXtended (US BICES-X) is a cutting-edge program supporting ... and government personnel on overall program security posture + Conduct network and system audits for vulnerabilities using Security Technical Implementation Guides… more
- Northrop Grumman (Aurora, CO)
- …By joining in our shared mission, we will support yours by expanding your personal network and developing skills, whether you are new to the field or an industry ... processes and technology and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are an expert with… more
- Global Dimensions (Wahiawa, HI)
- …doc exploitation , formal teaching + Crypto Experience: target development, network analysis, drafting intel reports, speaker/language identification + 6 of 10 ... yrs in crypto language processing - above (OLA 2) plus QC'ing, and mentoring + 6 of 10 yrs has to be in the required language(s) + 4 of 6 yrs performing crypto language processing + 3 of 6 yrs simply translating, transcribing, and gisting + 1 yr experience… more