- Amentum (Wahiawa, HI)
- …(AMOD) + Deep understanding of processing PCAP/packets efficiently and experience with cyber discovery and identification of indicators of compromise (IOCs). + ... theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas. + Experience...preferred but not required. + Graduate of JCAC (Joint Cyber Analysis Course) or equivalent military … more
- MIT Lincoln Laboratory (Lexington, MA)
- … tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated vulnerability discovery , reverse engineering, software ... + Infrastructure/Container Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) + Network Protocol Analysis (Wireshark, Tcpdump) + Emulator/Virtualization Technologies… more
- Huntington Ingalls Industries (Dayton, OH)
- …systems and designs to include system architecture evaluation, protocol analysis , hardware and/or software vulnerability discovery , and documentation of ... . Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of… more
- CACI International (Florham Park, NJ)
- …hardware state. * Develop custom tools and scripts (eg, in Python3) to automate analysis workflows such as firmware unpacking, protocol decoding, and memory ... Cyber Embedded Software Engineer Job Category: Engineering Time...really work, and excels in low-level software and hardware analysis . You'll play a key role in evaluating security… more
- Leidos (Odenton, MD)
- …Apply now! **Job Responsibilities/Qualifications:** + **Mission Focus** : Perform computer protocol analysis and session reassembly of known and unidentified ... opportunity for a ** Protocol Analyst-3** in our **National Security Sector's (NSS) Cyber & Analytics Business Area (CABA)** . Our talented team is at the… more
- CACI International (Annapolis Junction, MD)
- …analytic methodology by implementing tradecraft associated with identifying vulnerabilities, cyber discovery , and strategies. **You'll Bring These ... technology principles, theories, and concepts contributing to the development of innovative Cyber Discovery principles and ideas. * Experience working on… more
- Parsons Corporation (Centreville, VA)
- …+ Experience with distributed denial of service (DDoS) mitigation at network protocol level + Background in network traffic analysis and encrypted ... and commercial cryptographic implementations, with deep knowledge of secure network protocol implementation from Layer 2 through application layers. **What You'll Be… more
- Battelle Memorial Institute (Augusta, GA)
- …challenging and meaningful projects + Pursue ideas in scientific and technological discovery + Collaborate with world-class experts in an inclusive environment + ... the next generation of scientific leaders and business professionals Battelle's Cyber team is seeking **SkillBrigde Network Security Analyst** candidates to collect… more
- Deloitte (Sacramento, CA)
- …issues, analysis , client communication, and resolution as part of cyber risk mitigation steps. + Implementing industry-leading practices around data governance ... Our Deloitte Cyber team understands the unique challenges and opportunities...challenges using Microsoft Purview. This will include: + Conducting analysis and recommendations for clients' Microsoft Purview environments, including… more
- Hawaiian Electric (Honolulu, HI)
- …+ Develops and manages programs and processes for privacy, e- discovery , security awareness training, digital forensics, patch management, vulnerability remediation, ... ethics as they relate to cybersecurity and privacy. + Cyber threats and vulnerabilities. + Cryptography and cryptographic key...+ Traffic flows across the network (eg, Transmission Control Protocol [TCP] and Internet Protocol [IP], Open… more
- Henry Ford Health System (Detroit, MI)
- …Unix\Linux operating systems including logging facilities. + Understanding of network protocol analysis , public key infrastructure, SSL, Active Directory. ... to computer forensic investigations, live response and triage, and electronic discovery . The Principal Forensic and Incident Response Architect will also perform… more
- Guardian Life (Holmdel, NJ)
- …Identity & Access Management + Event log aggregation, searching, and analysis + Familiarity with security architectures and operating and troubleshooting principles ... Microsoft Windows and Linux operating systems + Knowledge of TCP/IP protocol stack, including routing, network address translation, TCP/UDP connectivity, and… more
- Leidos (Scott Air Force Base, IL)
- …one or more of the following: alarm surveillance, call routing, session initiated protocol , media call flow, packet capture analysis , Juniper IP technologies + ... with customers._ The Leidos Digital Modernization Sector and DoD Enterprise and Cyber Operations (DECO) have an opening in our **Unified Capabilities (UC) NOC… more
- SOS International LLC (Pearl Harbor, HI)
- …to include Next Generation Firewall technologies, firewall implementation, routing, protocol analysis , threat prevention and troubleshooting. + Experience ... customer's Area-of-Responsibility (AOR). Your role includes conducting network systems analysis and recommendations, configuring Layer-2/Layer-3 devices, implementing approved changes… more