- Hawaiian Electric (Honolulu, HI)
- …+ Develops and manages programs and processes for privacy, e- discovery , security awareness training, digital forensics, patch management, vulnerability remediation, ... ethics as they relate to cybersecurity and privacy. + Cyber threats and vulnerabilities. + Cryptography and cryptographic key...+ Traffic flows across the network (eg, Transmission Control Protocol [TCP] and Internet Protocol [IP], Open… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... About the Cyber System Assessment Group: The Cyber ...+ Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Deloitte (Rosslyn, VA)
- …technical issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Lead teams performing health check, discovery ... Our Deloitte Cyber team understands the unique challenges and opportunities...broader deployments. + Oversee technical support for ENTRA ID cyber services and resolve service-related issues through research and… more
- CACI International (Florham Park, NJ)
- …hardware state. * Develop custom tools and scripts (eg, in Python3) to automate analysis workflows such as firmware unpacking, protocol decoding, and memory ... Cyber Embedded Software Engineer Job Category: Engineering Time...really work, and excels in low-level software and hardware analysis . You'll play a key role in evaluating security… more
- Leidos (Odenton, MD)
- …Apply now! **Job Responsibilities/Qualifications:** + **Mission Focus** : Perform computer protocol analysis and session reassembly of known and unidentified ... opportunity for a ** Protocol Analyst-3** in our **National Security Sector's (NSS) Cyber & Analytics Business Area (CABA)** . Our talented team is at the… more
- Huntington Ingalls Industries (Wright Patterson AFB, OH)
- …systems and designs to include system architecture evaluation, protocol analysis , hardware and/or software vulnerability discovery , and documentation of ... . Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of… more
- Guardian Life (Holmdel, NJ)
- …Identity & Access Management + Event log aggregation, searching, and analysis + Familiarity with security architectures and operating and troubleshooting principles ... Microsoft Windows and Linux operating systems + Knowledge of TCP/IP protocol stack, including routing, network address translation, TCP/UDP connectivity, and… more
- Leidos (Scott Air Force Base, IL)
- …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... with customers._ The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Unified Capabilities (UC) NOC… more
- SOS International LLC (Pearl Harbor, HI)
- …to include Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. + Experience ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more