1 to 11 of 11
Sort by: Date | Relevance
Utilize RE skills to look for vulnerabilities across a myriad of software, to include malware and COTS. Utilize coding skills in multiple languages to then productize that vulnerability and provide a finished product to customers. The Level 3 Reverse Engineer shall possess the following capabilities The Reverse Engineer will perform technical analysis of malicious binarie
Posted 3 days ago
Performs technical analysis for malicious, in order to ascertain functionality and capability, assist with attribution and identification of indicators of compromise. Provide information and documentation that enables malware detection, signature creation, and mitigation. The Level 3 Data Scientist shall possess the following capabilities Employ some combination (2 or mor
Posted 3 days ago
Provides analytic support for SIGINT operations. Capabilities include software development skills and experience using a programming language, such as Python, C#, Java, or C++. Experience in front end software development, involving Angular, React, Javascript, or HTML/CSS is highly desired, as is experience with high performance computing, AI and data analytics. The Level
Posted 3 days ago
450 / 451/ 452 Grads Tools DVT, WVT, PKTSWING Ability to dig into massive sets of hexdump and pick out repeatable sets of data that could be forms of communication hiding in the signal. The Level 3 Protocol Analyst shall possess the following capabilities The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstre
Posted 6 days ago
Responsible for analyzing target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected and computer network defense resources. Analyze metadata collected for communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from analysis. Categorize traf
Posted 9 days ago
Utilize experience in signals analysis and understanding of Machine to Machine (M2M) communication and technologies to support mission operations. Previous experience with military exercises is preferred and have strong written/verbal communication skills, as well as experience in writing reports and technical evaluations. The Level 2 Technology Vulnerability Analyst shal
Posted 9 days ago
Utilize expe rience in signals analysis and understanding of Machine to Machine (M2M) communication and technologies to support mission operations. Previous experience with military exercises is preferred and have strong written/verbal communication skills , as well as experience in writing reports and technical evaluations. The Cryptologic Cyber Planner shall possess the
Posted 13 days ago
Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target systems, knowledge discovery of passive and active systems, or other cr
Posted 27 days ago
Prepare synthesized product for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to mission requirements. Prioritize, assess, evaluate and report information obtained from various sources for use or decision by Government personnel. Maintain awareness of internal and external customer needs. Collaborate with c
Posted 29 days ago
Evaluate operational or developmental networks and systems for weaknesses and susceptibility to network attack, advise customers on countermeasures including configuration of commercial products or hardware or software additions, produce evaluation reports and brief customers on results. The Level 2 Network Engineer shall possess the following capabilities Possess a base
Posted 1 month ago
T he Cyber Defense Analyst 2 uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports events that occur in order to protect data, information systems, and infrastructure. Finds trends, patterns, or anomaly correlations utilizing security relevant data. Recommends pr
Posted 1 month ago
Email this Job to Yourself or a Friend
Indicates required fields