• Cyber System Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …to the success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
    MIT Lincoln Laboratory (05/14/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop ... cyber operations, from the reverse engineering and exploitation of software and hardware systems to...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
    MIT Lincoln Laboratory (04/10/24)
    - Save Job - Related Jobs - Block Source
  • Principal Cyber Operations Infrastructure…

    The MITRE Corporation (Fort Meade, MD)
    …Summary: Do you have a Cyber Warfare Operations background or Cyber / Digital Network Exploitation Analyst and an interest in Operational Technology ... coupled with significant experience in critical infrastructure environments. + Offensive Cyber Operations: Conduct research and development of innovative … more
    The MITRE Corporation (06/04/24)
    - Save Job - Related Jobs - Block Source
  • Senior SIGINT & Cyber Analyst

    CACI International (Fort Meade, MD)
    …a bridging infrastructure between SIGINT/ CYBER and SOCOM entities, merging SIGINT/ CYBER systems capabilities and the integration of new systems ... Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation more
    CACI International (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    BlueHalo, LLC (Annapolis Junction, MD)
    …career. You'd like to do this + Conduct in-depth target analysis and research + Develop innovative tradecraft, exploitation techniques, and concepts of operation ... make this impact now. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As...is required You could also have this: + Open-source research background + Experience using learning management systems more
    BlueHalo, LLC (04/11/24)
    - Save Job - Related Jobs - Block Source
  • Computer Network Exploitation Analyst

    BigBear.ai (Columbia, MD)
    …and technical expertise to understand information found in SIGINT and cybersecurity systems and facilitate the exploitation of digital networks. Working closely ... mission forward. What you will do Conduct in-depth target analysis and research . Develop innovative tradecraft, exploitation techniques, and concepts of… more
    BigBear.ai (05/10/24)
    - Save Job - Related Jobs - Block Source
  • Threat Investigator, Human Exploitation

    Meta (Washington, DC)
    …from a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking a security analyst - threat ... will have an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our platforms.The ideal candidate… more
    Meta (06/07/24)
    - Save Job - Related Jobs - Block Source
  • Senior Security Intel Engineer, Vulnerability…

    Amazon (Annapolis Junction, MD)
    …is seeking an innovative Senior Security Intel Engineer to join the Vulnerability and Exploitation Threat Intelligence (VEX TI) team as a part of Amazon Cyber ... and report timely, accurate, and actionable threat intelligence. ACTI delivers cyber threat intelligence to Amazon and AWS leadership, service teams, partners,… more
    Amazon (06/06/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... Amentum is seeking multiple Digital Network Exploitation Analyst (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to… more
    Amentum (06/08/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Solutions Developer

    Lockheed Martin (Fort Meade, MD)
    …\(FPGA/VHDL/PCB/SDR\); debugging tools \(Ghidra/etc\.\)\. Software vulnerability analysis and exploitation \. Extensive knowledge in intrusion detection systems , ... **Description:** Lockheed Martin is seeking a Classified Cyber Solutions Developer in the in the Fort...Fort Meade, MD area\. Essential duties include leading advanced research projects in highly specialized areas of computer network… more
    Lockheed Martin (03/28/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Forensic Analyst

    Three Saints Bay (Washington, DC)
    …of dominant and alternate crypto currencies, defi tokens and/or privacy coins. + Data exploitation ; and + Deep and Dark Web research and monitoring. + May ... ** Cyber Forensic Analyst (3432)** Location **Washington, DC** Job...was responsible for it. **Cryptocurrency/Blockchain Analytics and Deep/Dark Web Research ** + Provide assistance with Cryptocurrency analysis, Blockchain analytics,… more
    Three Saints Bay (03/21/24)
    - Save Job - Related Jobs - Block Source
  • Junior Cyber Threat Intelligence Analyst

    Chenega Corporation (Washington, DC)
    **Req ID:** 31180 **Summary** **Junior Cyber Threat Intelligence Analyst** **Hybrid Schedule: In person, in the Washington, DC office twice a pay period.** Are you ... cutting-edge technology and take your career to the next level! Chenega Systems (CS) provides federal agencies empowered solutions in Cybersecurity and Data… more
    Chenega Corporation (05/23/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Engineer

    Federal Bureau of Investigation (Washington, DC)
    … to identify security vulnerabilities, and other access vectors analyzed in cyber systems /networks. Formulate plans to use accepted operational tools to ... while leading a small, highly technical team to develop and deploy unique cyber capabilities. Responsibilities GS-13: Analyze cyber data obtained from technical… more
    Federal Bureau of Investigation (06/06/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Operator/Developer/Analyst

    Belay Technologies (Columbia, MD)
    …required to have the following skills: + CODA Overall Experience + Exploitation of Commercial Network Infrastructure; Cyber Operations; Enterprise Computer and ... up in 2020 and a finalist in 2021! Belay Technologies is seeking a Cyber Operator/Developer/Analyst to join our intel team. The selected candidate should understand … more
    Belay Technologies (04/18/24)
    - Save Job - Related Jobs - Block Source
  • Systems Engineer

    Parsons Corporation (Annapolis Junction, MD)
    …This exciting role includes performing traditional System Engineering and Vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO ... years [Relevant Degrees: Electrical/Computer/Software Engineering, Computer Science, Math or Information Systems )._ + System Engineering of DoD command, control,… more
    Parsons Corporation (04/16/24)
    - Save Job - Related Jobs - Block Source
  • Software Engineer, Senior

    Parsons Corporation (Annapolis Junction, MD)
    …This exciting program includes performing software engineering, reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations) ... (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We need our developers to be… more
    Parsons Corporation (04/17/24)
    - Save Job - Related Jobs - Block Source
  • DSP/FPGA Engineer (Engineer - RF 2)

    Huntington Ingalls Industries (Adelphi, MD)
    …sensor systems . The Developer applies advanced DSP/FPGA concepts, and research techniques during the investigation of highly complex and advanced technical ... designing, development, and utilization of DSP/FPGA architectures for prototype sensor systems . * Develop project requirements, analyze system capabilities, and… more
    Huntington Ingalls Industries (06/07/24)
    - Save Job - Related Jobs - Block Source
  • Software Engineer, Associate (Engineer Software 1)

    Huntington Ingalls Industries (Hanover, MD)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... towers to processors, we design, develop, integrate and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and… more
    Huntington Ingalls Industries (05/24/24)
    - Save Job - Related Jobs - Block Source
  • Software Engineer (Engineer Software 2)

    Huntington Ingalls Industries (Hanover, MD)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... towers to processors, we design, develop, integrate and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and… more
    Huntington Ingalls Industries (05/16/24)
    - Save Job - Related Jobs - Block Source
  • Deputy Director and Chief Information Security…

    Department of Energy (Washington, DC)
    …comprised of three primary offices: the Office of the Director, the Cyber Security Division, and the Information Technology Services Division. Responsibilities As ... of the Chief Information Security Officer, to create and implement an SC-wide cyber security strategy and vision, in alignment with DOE and OMB policies, directives,… more
    Department of Energy (06/04/24)
    - Save Job - Related Jobs - Block Source