- Lockheed Martin (Arlington, VA)
- …areas, you will be assessed for your ability to develop these skills: \- Applied research skills \- Embedded systems development \- Compiler Design and ... a vital member of our world\-class team, composed of applied researchers and engineers who contribute to projects that.../IO/CNO R&D If you have demonstrated a passion for cyber technologies, are self\-motivation, and adept at research… more
- The MITRE Corporation (Mclean, VA)
- …rapid prototypes, and tools development provide unprecedented capabilities designed to be applied to real-world missions. Our experts provide cyber capabilities ... Design and develop automated decision-making and control methods for cyber systems + Design and develop applied ...direct work programs on the convergence of AI and Cyber Operations across Research , capability development, and… more
- ICF (Arlington, VA)
- … with Subject Matter Expert (SME) -Level experience to lead and support the research and development of new cyber analytic capabilities that will help the ... and critical information systems. The successful cleared candidate will act as a Data Scientist SME to support a large federal cyber security analytic program.… more
- Leidos (Arlington, VA)
- …+ Develop innovative solutions to challenging problems of interest to the Defense Applied Research Projects Agency (DARPA) and US Department of Defense (DoD). ... **Description** Are you a motivated Principal Resilient Systems Scientist with a technical vision and hands-on knowledge...solvers, or other automated reasoning tools + Experience conducting applied research areas of CPS such as… more
- The MITRE Corporation (Mclean, VA)
- …rapid prototypes, and tools development provide unprecedented capabilities designed to be applied to real-world missions. Our experts provide cyber capabilities ... us. Department Summary: MITRE's Offensive Operations & Effects department, part of the Cyber Operations & Effects Innovation Center, enables cyber operations by… more
- Amentum (Bethesda, MD)
- …as penetration testing, ethical hacking, and reverse engineering to guide research and analysis of software, hardware, network components, security protocols, and ... cloud-based services. + Specializes in cyber -enabled platforms, particularly those involving automated video analysis, biometric verification, and identity… more