• Tyto Athene (Washington, DC)
    …and ad hoc. **Responsibilities:** + Provide support for complex computer network exploitation and defense techniques + Deter, identify, and investigate endpoint and ... surveillance/monitoring + Provide technical support for continuous monitoring, computer exploitation , and reconnaissance + Research and maintain proficiency in open… more
    DirectEmployers Association (11/01/25)
    - Save Job - Related Jobs - Block Source
  • Applied Research Associates, Inc. (Niceville, FL)
    …training of both the JMEM Weaponeering Software (JWS) and the Digital Imagery Exploitation Engine (DIEE) software programs. This position is an integral part of the ... JTCG/ME products (eg, JMEM Weaponeering Software (JWS) and/or Digital Imagery Exploitation Engine (DIEE). Experience as a trainer (Goodfellow AFB, Joint Targeting… more
    DirectEmployers Association (10/25/25)
    - Save Job - Related Jobs - Block Source
  • Battelle Memorial Institute (Columbus, OH)
    …identify and mitigate risks related to system vulnerabilities and adversarial exploitation . + Develop protection strategies for critical program information (CPI) ... implement countermeasures and mitigation plans to enhance system resilience against exploitation and reverse engineering. + Prepare and deliver program protection… more
    DirectEmployers Association (11/14/25)
    - Save Job - Related Jobs - Block Source
  • Applied Research Associates, Inc. (Fort Belvoir, VA)
    …identify weaknesses, test and evaluate protection strategies, and demonstrate exploitation of identified vulnerabilities. Components of these assessments include, ... authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Experience with firewalls and network TAP… more
    DirectEmployers Association (09/20/25)
    - Save Job - Related Jobs - Block Source
  • Applied Research Associates, Inc. (Fort Belvoir, VA)
    …identify weaknesses, test and evaluate protection strategies, and demonstrate exploitation of identified vulnerabilities. Components of these assessments include but ... authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Experience with firewalls and network TAP… more
    DirectEmployers Association (09/20/25)
    - Save Job - Related Jobs - Block Source
  • MedMark Treatment Centers (Jacksonville, FL)
    …kickbacks paid or caused to be paid, or which may result in financial exploitation of patients or their families in connection with the provision of drugs, ... medication, supplies or pharmaceuticals. Document all his/ hers visits and activities including irregularities Give proper training for instruction to the persons at the facility, who have day to day responsibility, for receipt, administration of medication to… more
    job goal (12/18/25)
    - Save Job - Related Jobs - Block Source
  • Ally (Lansing, MI)
    …Collaborate with stakeholders to develop remediation strategies. * Demonstrating practical/working exploitation of security flaws. * Develop and enhance processes to ... automate the delivery of application security metrics. * Review security scan output for false positives. Assist developers with remediation. * Serve as an application security subject matter expert for all areas. * Participate in threat modeling exercises. *… more
    DirectEmployers Association (12/16/25)
    - Save Job - Related Jobs - Block Source
  • Unity Technologies (San Francisco, CA)
    …Strong foundation in: + Reinforcement learning, contextual bandits, and exploration- exploitation strategies. + Auction theory, mechanism design, and multi-objective ... optimization. + Probabilistic modeling, causal inference, and counterfactual evaluation. + Online learning, off-policy evaluation, simulation, and A/B testing. + Proficiency with Python and common ML libraries (eg, PyTorch, TensorFlow, JAX); experience with… more
    DirectEmployers Association (12/13/25)
    - Save Job - Related Jobs - Block Source
  • Applied Research Associates, Inc. (Birmingham, AL)
    …Experience designing, manufacturing, and piloting UAS + Sensitive site exploitation **Technical Subject Matter Expert Desired Skills/Qualifications:** + Prior ... service with 20th Special Forces Group (Airborne) preferred; equivalent Special Operations experience will be considered + Advanced Special Operations Techniques - Level III (or equivalent) + Advanced Technical Surveillance Course (or equivalent) + Successful… more
    DirectEmployers Association (12/11/25)
    - Save Job - Related Jobs - Block Source
  • COLSA Corporation (Shalimar, FL)
    …of operational planning, the Cyber Tasking Order (CTO) cycle, and developing exploitation strategies. Applicant selected will be subject to a government security ... investigation and must meet eligibility requirements for access to classified information. COLSA Corporation is an Equal Opportunity Employer, Minorities/Females/Veterans/Disabled. All qualified applicants will receive consideration for employment without… more
    DirectEmployers Association (12/06/25)
    - Save Job - Related Jobs - Block Source
  • Warner Music Group (New York, NY)
    …relevant provisions of the underlying artist, publisher and union contracts that govern WMG's exploitation of the assets that is at issue in the audit; + Develop ... recommendations for the WMG label client(s) concerned regarding how to respond to the audit claims in a given audit; + Facilitate the settlement of each audit, on behalf of the WMG label client concerned; in close coordination with that label's Business &… more
    DirectEmployers Association (11/26/25)
    - Save Job - Related Jobs - Block Source
  • Ally (Raleigh, NC)
    …preferred. * Knowledge in Elder Abuse and/or Elder Financial Exploitation investigations strongly preferred. * Proven knowledge of regulatory Suspicious ... Activity Report experience - must have skills related to identifying, analyzing, and reporting suspicious activities. * Proficient in conducting interviews with various stakeholders strongly preferred. * Ability to make appropriate judgments and decisions with… more
    DirectEmployers Association (11/20/25)
    - Save Job - Related Jobs - Block Source
  • Battelle Memorial Institute (Columbus, OH)
    …or other custom operating systems + Knowledge of advanced exploitation techniques (ret2libc,use-after-free,type confusion) + Knowledge of exploit protection ... techniques (DEP, ASLR/NX) + Ability to code in C + Understanding of network protocols + Ability to work individually and in small fast paced team environments + Passion and drive to constantly need to improve your skill set + Must Be a US Citizen with the… more
    DirectEmployers Association (11/14/25)
    - Save Job - Related Jobs - Block Source
  • HP Inc. (Sacramento, CA)
    …animer des reunions avec des parties prenantes de haut niveau. + Exploitation des connaissances clients, secteur, produits et services pour developper des strategies ... de croissance a long terme. + Culture de developpement commercial proactif, collaboration, responsabilite et suivi, avec de solides competences en negociation et cloture de transactions. + Experience dans la direction d'equipes de comptes al'echelle locale et… more
    DirectEmployers Association (11/12/25)
    - Save Job - Related Jobs - Block Source
  • Warner Music Group (New York, NY)
    …their fields. **Here you'll get to:** + Negotiate deals for the digital exploitation of audio and video music content, including with digital service providers, ... social media platforms, app developers, digital content aggregators, emerging tech companies, and AI platforms + Draft agreements and ancillary documentation (eg, summaries, presentation decks) as part of such deals and provide advice to WMG business units to… more
    DirectEmployers Association (10/30/25)
    - Save Job - Related Jobs - Block Source
  • Deluxe (Minneapolis, MN)
    …security (AWS, Azure, GCP), computer forensics, ethical hacking, network exploitation , penetration testing, and security tool development. + Development experience ... in one or more languages: .NET, Java, Perl, Python. + One or more industry-recognized certifications: CISSP, CISM, SABSA, TOGAF, OSCP, GWAPT, TOGAF, or cloud security certifications: (eg, AWS Security Specialty, Azure Security Engineer) + Proven ability to… more
    DirectEmployers Association (09/24/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    Belay Technologies (Hanover, MD)
    …runner up in 2020 and a finalist in 2021! Belay is hiring an Exploitation Analysts (EA) to work on a critical mission supporting the Intelligence Community (IC). ... have many of the same skills of Digital Network Exploitation Analyst (DNEA), but their primary mission is more...(DNEA), but their primary mission is more focused on exploitation . In addition to maintaining DNEA-level understanding of adversary… more
    Belay Technologies (10/14/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    Amentum (Norfolk, VA)
    Amentum is looking for an Exploitation Analyst that will develop or oversee development of detailed plans that are executed by the OPTEVFOR Red Team. The ... Exploitation Analyst will function as a subject matter expert...in DoD defensive or offensive cyberspace operations planning or exploitation analysis + Proficiency in decomposing complex computer systems/networking… more
    Amentum (11/12/25)
    - Save Job - Related Jobs - Block Source
  • OPTEVFOR- Cyber OT&E Exploitation Analyst

    Rigid Tactical (Norfolk, VA)
    Rigid Tactical is actively seeking a Subject Matter Expert (SME) Exploitation Analyst to join our mission-focused team as Key Personnel supporting OPTEVFOR Cyber ... complex Navy IT systems, determine system access points, and develop detailed exploitation strategies and test objectives for the supporting Red Team. Your work… more
    Rigid Tactical (11/01/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analysts 1-4 (EA)

    Amentum (Fort Meade, MD)
    Amentum is seeking ** Exploitation Analysts 1-4 (EA)** to use information collected from a variety sources (eg, intrusion detection systems, firewalls, network ... against events that might occur. Essential Duties: + Primary mission is exploitation . Create exploitation plans and make operational adjustments using… more
    Amentum (10/24/25)
    - Save Job - Related Jobs - Block Source