- Johns Hopkins University (Washington, DC)
- …Demonstrated ability to handle complex assignments. Classified Title: Security Officer II Job Posting Title (Working Title): Security Officer (Day Shift) ... up to two years of non-related college course work may be applied towards the total minimum education/experience required for the respective job. Applicants… more
- Qualtrics (Reston, VA)
- …business. Join over 5,000 people across the globe who think that's work worth doing. ** Applied Scientist II ** **Why We Have This Role** We are looking for ... talented and innovative Applied Scientist to bring our Machine Learning and Artificial...to contribute to the advancement of the field through research , experimentation, and collaboration. + Willingness to stay updated… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- **Description** The Mission Concepts & Capabilitis (MCC) division of Applied Research Associates, Inc. (ARA) is building a team to conduct cyber assessments of ... knowledge of Computer Network vulnerability/compliance analysis software **COMPANY INFORMATION:** Applied Research Associates, Inc. is an employee-owned… more
- Amazon (Herndon, VA)
- …development and evaluation data sets, etc. - Master's Degree in Statistics, Applied Math, Operations Research , Economics, or a related quantitative field ... or related Science discipline, OR, Bachelor's Degree in Statistics, Applied Math, Operations Research , Economics, or a related quantitative field with 5+ years'… more
- Amazon (Arlington, VA)
- …class data systems and apply approaches from a variety of skillsets - applied macro/time series, applied micro, econometric theory, empirical IO, empirical ... Qualifications - 3+ years of industry, consulting, government, or academic research experience - Advanced expertise and knowledge of econometric analysis of… more
- Amentum (Vienna, VA)
- …analytical, technical, and operational support. + Conduct complete and accurate research and analysis on Cyber-enabled crime methods and trends, including technical ... tools such as chain analysis, TRM, and Elementus. + Applied knowledge to the enforcement of Title 18, Title...forfeiture of illegally derived property + Ability to conduct research and analysis using open source information, national and… more
- Leidos (Ashburn, VA)
- …and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and mitigation. + Will be responsible for ... minimum of 5 years of experience as a Tier II senior cyber security analyst performing intelligence analysis, collection...GISF - SecurityFundamentals + SANS - GXPN - Exploit Researcher and Advanced PenetrationTester + SANS - GMON -… more
- Johns Hopkins University (Gaithersburg, MD)
- PREP Research Associate This position is part of the National Institute of Standards (NIST) Professional Research Experience (PREP) program. NIST recognizes that ... program requires staff from a wide range of backgrounds to work on scientific research in many areas. Employees in this position will perform technical work that… more
- KBR (Arlington, VA)
- …with a minimum of 5+ years' relevant experience. + Degree must be in Applied Math, Computer Science, Operations Research , Statistics, or related fields. + Able ... manageable elements and identifying candidate Desired: + Degrees must be in Applied Math, Computer Science, Operations Research , Statistics, or related fields.… more
- Amentum (Bethesda, MD)
- …intelligence analysis and tradecraft proliferation. **Responsibilities:** + Engages in research , testing, and analysis of various automated biometric systems. ... reverse engineering (decompiling, disassembling, debugging), and vulnerability scanning/penetration testing applied to software, hardware, network components, security protocols, and… more
- Guidehouse (Washington, DC)
- …defendable, guidance-compliant and risk adjusted annual program submission. Research and evaluates program requirements, resourcing, and objectives throughout ... experience, particularly in the areas of finance, accounting, ACAT I and/or II weapon systems acquisition programs, programming and/or systems analysis, POM +… more
- Cintel Inc (Fort Belvoir, VA)
- …assurance requirements in order to sustain authorization to operate - Research and attend advanced cyber security training to enhance technical competency ... on the use of newly developed cyber technologies - Research , test and develop new technologies to enhance TSCM...baseline certification for DoD 8570.01-M Information Assurance Technician Level II (IAT2) compliance, at the sole expense of the… more
- ASM Research, An Accenture Federal Services Company (Washington, DC)
- …manage and resolve cloud computing security risk and implement "best practices" as applied within a cloud environment (across all of the different deployment and ... + Sensitivity Level: IT-I Critical Sensitive **Certifications:** + Computing Environment: IAT II or IAT III (Security+ or similar) + 01-M Baseline Certification: One… more