• Applied Research Associates, Inc. (Niceville, FL)
    …training of both the JMEM Weaponeering Software (JWS) and the Digital Imagery Exploitation Engine (DIEE) software programs. This position is an integral part of the ... JTCG/ME products (eg, JMEM Weaponeering Software (JWS) and/or Digital Imagery Exploitation Engine (DIEE). Experience as a trainer (Goodfellow AFB, Joint Targeting… more
    DirectEmployers Association (10/25/25)
    - Save Job - Related Jobs - Block Source
  • International Medical Corps (Los Angeles, CA)
    …includes safeguarding from the following conduct by our staff or partners: sexual exploitation and abuse; exploitation , neglect, or abuse of children, adults at ... from an applicant's previous employers about any findings of sexual exploitation , sexual abuse and/or sexual harassment during employment, or incidents under… more
    Upward (08/11/25)
    - Save Job - Related Jobs - Block Source
  • Applied Research Associates, Inc. (Fort Belvoir, VA)
    …identify weaknesses, test and evaluate protection strategies, and demonstrate exploitation of identified vulnerabilities. Components of these assessments include, ... authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Experience with firewalls and network TAP… more
    DirectEmployers Association (09/20/25)
    - Save Job - Related Jobs - Block Source
  • Applied Research Associates, Inc. (Fort Belvoir, VA)
    …identify weaknesses, test and evaluate protection strategies, and demonstrate exploitation of identified vulnerabilities. Components of these assessments include but ... authorization agreements + Experience conducting Information Operations Computer Network Defense/ Exploitation assessments + Experience with firewalls and network TAP… more
    DirectEmployers Association (09/20/25)
    - Save Job - Related Jobs - Block Source
  • GAP Solutions Inc (Mclean, VA)
    …candidates who want to be trained in FMV and become experts in FMV exploitation . Candidates will have the opportunity to start an exciting and dynamic intelligence ... be new to motion GEOINT specialized instruction in FMV tradecraft, exploitation tools, and specific cultural familiarization. + Produce imagery-derived graphic… more
    DirectEmployers Association (08/23/25)
    - Save Job - Related Jobs - Block Source
  • Warner Music Group (New York, NY)
    …their fields. **Here you'll get to:** + Negotiate deals for the digital exploitation of audio and video music content, including with digital service providers, ... social media platforms, app developers, digital content aggregators, emerging tech companies, and AI platforms + Draft agreements and ancillary documentation (eg, summaries, presentation decks) as part of such deals and provide advice to WMG business units to… more
    DirectEmployers Association (10/30/25)
    - Save Job - Related Jobs - Block Source
  • Range Mental Health Center (Hibbing, MN)
    …attendance as needed. Will report all instances of suspected abuse, neglect, and exploitation . Attend training as required by RMHC and the Department of Human ... Services to meet both minimum training requirements and mandated trainings. Communicate with Clinical Supervisor regarding issues / updates on assigned clients as required by Department of Human Services and RMHC. Must comply with all required federal and… more
    Upward (08/04/25)
    - Save Job - Related Jobs - Block Source
  • Battelle Memorial Institute (Beavercreek, OH)
    …of client missions. We welcome your unique knowledge in data exploitation , technical translation, open-source techniques, and cultural knowledge. This includes ... suggestions to develop and improve cyber and data science tools. + Language translation and science and technology assessments. + Collecting, organizing, and analyzing foreign language information from multiple sources to author reports and quick-turn tasks. +… more
    DirectEmployers Association (10/16/25)
    - Save Job - Related Jobs - Block Source
  • ABBTECH Professional Resources, Inc. (Chicago, IL)
    …will bring deep technical expertise, proven experience in vulnerability research and exploitation , and the ability to work as part of a collaborative offensive ... security team. **Primary Responsibilities** : + Conduct penetration testing operations in accordance with DHS and industry best practices. + Perform web application, network, and infrastructure testing using both commercial and open-source tools. + Safely… more
    DirectEmployers Association (10/07/25)
    - Save Job - Related Jobs - Block Source
  • Battelle Memorial Institute (Columbus, OH)
    …or other custom operating systems + Knowledge of advanced exploitation techniques (ret2libc,use-after-free,type confusion) + Knowledge of exploit protection ... techniques (DEP, ASLR/NX) + Ability to code in C and/or Python + Ability to work individually and in small fast paced team environments + Passion and drive to constantly need to improve your skill set + Must Be a US Citizen with the ability and willingness to… more
    DirectEmployers Association (10/02/25)
    - Save Job - Related Jobs - Block Source
  • Permian Basin Community Centers for MHMR (Odessa, TX)
    …and completeness of program's processes. Comply with the Abuse, Neglect, and Exploitation policy and reporting requirements. Adhere to the Code of Conduct and ... Standards of Behavior policy requirements. Establish and maintain effective work relationships with individuals served and their families, supervisors, co-workers and visitors by demonstrating cooperative, courteous and respectful behavior at all times.… more
    Upward (08/03/25)
    - Save Job - Related Jobs - Block Source
  • Caris Life Sciences (Irving, TX)
    …or government/military intelligence sectors. + Strong familiarity with social media exploitation (SOCMINT) and data analytics. + Knowledge of behavioral threat ... assessment models (eg, WAVR-21, ATAP standards, or insider threat frameworks). + Familiarity with crisis management, incident response, and business continuity concepts. + Experience in law enforcement, intelligence, military, or corporate security sectors… more
    DirectEmployers Association (09/26/25)
    - Save Job - Related Jobs - Block Source
  • Deluxe (Minneapolis, MN)
    …security (AWS, Azure, GCP), computer forensics, ethical hacking, network exploitation , penetration testing, and security tool development. + Development experience ... in one or more languages: .NET, Java, Perl, Python. + One or more industry-recognized certifications: CISSP, CISM, SABSA, TOGAF, OSCP, GWAPT, TOGAF, or cloud security certifications: (eg, AWS Security Specialty, Azure Security Engineer) + Proven ability to… more
    DirectEmployers Association (09/24/25)
    - Save Job - Related Jobs - Block Source
  • SLAC National Accelerator Laboratory (Menlo Park, CA)
    …Research Associates are engaged with the design, support, operation and/or scientific exploitation of the major programs of the laboratory, under the guidance of ... their faculty or Senior Staff Scientist / Distinguished Staff Scientist supervisor. They are expected to work with a significant degree of independence on one or more specific tasks in support of the research program, frequently interacting with the… more
    DirectEmployers Association (09/17/25)
    - Save Job - Related Jobs - Block Source
  • Hawaiian Electric (Honolulu, HI)
    …enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.). + Network security architecture concepts ... including topology, protocols, components, and principles (eg, application of defense-in-depth). + Specific operational impacts of cybersecurity lapses. + Security models (eg, Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). + Ethical… more
    DirectEmployers Association (09/16/25)
    - Save Job - Related Jobs - Block Source
  • Suburban Propane (Syracuse, NY)
    …and on call personnel records + Analyzes and recommends system exploitation techniques and enhancement recommendations + Designs, tests and implements procedure ... additions and changes and assists in the documentation and communication of those and existing procedures + Mentors co-workers to develop knowledge of call center business applications + Develops current and future state process flow diagrams and related… more
    DirectEmployers Association (08/16/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    Belay Technologies (Hanover, MD)
    …runner up in 2020 and a finalist in 2021! Belay is hiring an Exploitation Analysts (EA) to work on a critical mission supporting the Intelligence Community (IC). ... have many of the same skills of Digital Network Exploitation Analyst (DNEA), but their primary mission is more...(DNEA), but their primary mission is more focused on exploitation . In addition to maintaining DNEA-level understanding of adversary… more
    Belay Technologies (10/14/25)
    - Save Job - Related Jobs - Block Source
  • OPTEVFOR- Cyber OT&E Exploitation Analyst

    Rigid Tactical (Norfolk, VA)
    Rigid Tactical is actively seeking an Exploitation Analyst to join our mission-focused team as Key Personnel on critical defense contracts supporting OPTEVFOR Cyber ... complex Navy IT systems, determine system access points, and develop detailed exploitation strategies and test objectives for the supporting Red Team. Your work… more
    Rigid Tactical (11/01/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst (TS/SCI with Poly…

    Deloitte (Baltimore, MD)
    …and proactively manage to secure success. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and cyber investigations ... to a variety of core analytical tasks or projects. Exploitation Analysts have many of the same skills of...DNEAs, but their primary mission is enabling computer network exploitation . In addition to maintaining DNEA-level understanding of adversary… more
    Deloitte (10/03/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analysts 1-4 (EA)

    Amentum (Fort Meade, MD)
    Amentum is seeking ** Exploitation Analysts 1-4 (EA)** to use information collected from a variety sources (eg, intrusion detection systems, firewalls, network ... against events that might occur. Essential Duties: + Primary mission is exploitation . Create exploitation plans and make operational adjustments using… more
    Amentum (10/24/25)
    - Save Job - Related Jobs - Block Source