- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Huntington Ingalls Industries (Wright Patterson AFB, OH)
- …systems and designs to include system architecture evaluation, protocol analysis , hardware and/or software vulnerability discovery , and documentation of ... . Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of… more
- BAE Systems (Merrimack, NH)
- …in three or more of the following: + Cyber Operations + Defensive Cyber + Algorithm development / data analysis + Experience with low-level software ... that run the spectrum of technical leadership, algorithm design, system analysis , software development, customer interaction, or new concept development. Most… more
- CACI International (Florham Park, NJ)
- …hardware state. * Develop custom tools and scripts (eg, in Python3) to automate analysis workflows such as firmware unpacking, protocol decoding, and memory ... Cyber Embedded Software Engineer Job Category: Engineering Time...really work, and excels in low-level software and hardware analysis . You'll play a key role in evaluating security… more
- Leidos (Odenton, MD)
- …Apply now! **Job Responsibilities/Qualifications:** + **Mission Focus** : Perform computer protocol analysis and session reassembly of known and unidentified ... opportunity for a ** Protocol Analyst-3** in our **National Security Sector's (NSS) Cyber & Analytics Business Area (CABA)** . Our talented team is at the… more
- Battelle Memorial Institute (Augusta, GA)
- …challenging and meaningful projects + Pursue ideas in scientific and technological discovery + Collaborate with world-class experts in an inclusive environment + ... the next generation of scientific leaders and business professionals Battelle's Cyber team is seeking **SkillBrigde Network Security Analyst** candidates to collect… more
- Deloitte (Atlanta, GA)
- …issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Implementing industry-leading practices around data governance ... Our Deloitte Cyber team understands the unique challenges and opportunities...challenges using Microsoft Purview. This will include: + Conducting analysis and recommendations for clients' Microsoft Purview environments, including… more
- Henry Ford Health System (Detroit, MI)
- …Unix\Linux operating systems including logging facilities. + Understanding of network protocol analysis , public key infrastructure, SSL, Active Directory. ... to computer forensic investigations, live response and triage, and electronic discovery . The Principal Forensic and Incident Response Architect will also perform… more
- SOS International LLC (Pearl Harbor, HI)
- …to include Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. Experience with ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more
- Leidos (Scott Air Force Base, IL)
- …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... with customers._ The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Unified Capabilities (UC) NOC… more