- Amentum (Fort Meade, MD)
- Amentum is seeking multiple **Digital Network Exploitation Analyst 1 -4 (DNEA)** to perform technical analysis of metadata and content to ensure target ... the traffic movements in a network . + Shift-work may be required. **Digital Network Exploitation Analyst 1 ** Minimum Requirements: + Must be a US… more
- Belay Technologies (Hanover, MD)
- …full security clearance. There are multiple levels available for the Digital Network Exploitation Analyst : + DNEA LEVEL 1 : Bachelor's degree and 2 Years' ... in developing detailed exploitation and operations plans. The Digital Network Exploitation Analyst will have a solid understanding of logical/physical IP… more
- Belay Technologies (Hanover, MD)
- …There are multiple levels available for the Digital Network Exploitation Analyst : + Exploitation Analysts Level 1 + Exploitation Analysts ... EA have many of the same skills of Digital Network Exploitation Analyst (DNEA), but...Analysts Level 4 Years' Experience by Degree Type: + Exploitation Analysts Level 1 + Bachelor Degree… more
- Acclaim Technical Services (Annapolis Junction, MD)
- …among DC area firms and continues to grow. We are actively hiring a Digital Network Exploitation Analyst to join our Defense & Homeland Security Division ... working in Annapolis Junction, MD. We are hiring Digital Network Exploitation Analysts (DNEAs) of all skill...by years of experience + educational degrees: + Level 1 + 2 years' applicable experience with a bachelor's… more
- Belay Technologies (Hanover, MD)
- …levels available for the Digital Network Exploitation Analyst : + Computer Network Defense Analyst Level 1 + Computer Network Defense ... Defense Analyst Level 4 Years' Experience by Degree Type: + Computer Network Defense Analyst Level 1 + Bachelor Degree with 2 years of experience. +… more
- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …be great for someone who:** + Is a transitioning or former military intelligence analyst with hands-on experience with technical exploitation of enemy devices, + ... TECHSIGINT, SIGINT/CYBER, MASINT) from all levels of classified information to support exploitation efforts to enable threat network targeting. + Conduct… more
- Cayuse Holdings (Huntsville, AL)
- …features and limitations. + Acquire proficient understanding of mobile application security, network protocols, and the potential exploitation vectors. + Learn ... Handler (GCIH). + GIAC Certified Forensic Analyst (GCFA). + GIAC Certified Intrusion Analyst (GCIA). + GIAC Network Forensic Analyst (GNFA). + GIAC Cloud… more
- Alaka'ina Foundation Family of Companies (Honolulu, HI)
- Cyber Defense Analyst Location HI - Honolulu Job Code 12739 # of openings 1 Apply Now ... Foundation Family of Companies (FOCs) is looking for a Cyber Defense Analyst to support our government customer located in Honolulu, Hawai'i. DESCRIPTION OF… more
- Cayuse Holdings (Huntsville, AL)
- …of each platform. + Demonstrate expertise in mobile application security, network protocols, and potential exploitation vectors associated with mobile ... Handler (GCIH). + GIAC Certified Forensic Analyst (GCFA). + GIAC Certified Intrusion Analyst (GCIA). + GIAC Network Forensic Analyst (GNFA). + GIAC Cloud… more
- Leidos (Whitehall, OH)
- …of network threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion set tactics, techniques, open-source, and procedures ... do business. We are in search of a Cybersecurity Analyst to join our task force in **Columbus, OH;...cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis (using raw packet data), net flow,… more
- ManTech (Stennis Space Center, MS)
- **ManTech** seeks a motivated, career and customer-oriented **Junior Cyber Security Forensics Analyst ** to join our team in the **Stennis, MS** area. In this role ... systems and networks, identify vulnerabilities, and support the development of new exploitation techniques + Apply the MITRE D3FEND framework to develop and… more
- Parsons Corporation (Huntsville, AL)
- …for. **Job Description:** Parsons is looking for an amazingly talented **Senior-Level Intelligence Analyst ** to join our team! In this role you will get to be ... and tracking; 6-DOF missile flyout, command, and seeker endgame; network -centric warfare techniques; command-and-control (C2/C4); and advanced RF techniques. The… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …doc exploitation , formal teaching + Crypto Experience: target development, network analysis, drafting intel reports, speaker/language identification + 6 of 10 ... cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- UKG (Ultimate Kronos Group) (Atlanta, GA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks). * Working knowledge of ... the Team** As a Senior Security and Threat Monitoring Analyst , you will be part of UKG's Global Security...years of experience with common attack vectors on the network layer, different classes of attacks (eg, passive, active,… more
- USAA (Chesapeake, VA)
- …competitive products, exceptional service and trusted advice. We seek to be the # 1 choice for the military community and their families. Embrace a fulfilling career ... us special and impactful. **The Opportunity** As a dedicated Lead, Business Analyst Identity Proofing MIAM Business Applications, you will be responsible for the… more
- Global Dimensions (Fort Meade, MD)
- …doc exploitation , formal teaching. + Crypto Experience: target development, network analysis, drafting intel reports, speaker/language identification. + 6 of 10 ... of 6 yrs simply translating, transcribing, and gisting. + 1 yr experience QC'ing at ILR level 3 in...3 of 10 yrs reporting as primary duty. + 1 of 6 yrs in target language has to… more
- V2X (Suitland, MD)
- …such as DataExplorer, Cultweave, Voltron, Multi-Media Message Monitor (M3), Analyst 's Notebook/Renoir/Palantir/IntelBook or other link/ network analysis programs, ... for a Farsi Linguist / Publicly Available Information (PAI) Analyst . This position will be based at our customer...tool and tradecraft training as required, spanning anywhere from 1 hour to three days in duration* Conduct research… more
- ARSIEM (Annapolis Junction, MD)
- …+ Minimum four (4) years of experience programming techniques to evade host and/or network -based IDS, and + Minimum four (4) years' experience in network sockets ... as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump, + Understanding of network protocols and sockets, OS internals, common CNO techniques, exploitation … more
- ARSIEM (Annapolis Junction, MD)
- …Java, Perl, and/or Python, + Minimum five (5) years' experience developing in one ( 1 ) or more of the following: Windows applications using Visual Studio or .NET ... of experience programming techniques to evade host and or network -based IDS, + Minimum two (2) years of experience... protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern… more
- ARSIEM (Annapolis Junction, MD)
- …Perl, and/or Python, + Minimum seven (7) years of experience developing in one ( 1 ) or more of the following: Windows applications using Visual Studio or .NET ... years of experience programming techniques to evade host and/or network -based IDS, and + Minimum four (4) years' experience... protocols and sockets, OS internals, common CNO techniques, exploitation mitigations such as DEP and ASLR, and modern… more
Related Job Searches:
Analyst,
Analyst 1,
Exploitation,
Exploitation Analyst,
Network,
Network Exploitation Analyst