- CACI International (Chantilly, VA)
- Digital Network Exploitation Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph ... conducting or providing direct technical targeting/target analysis support to computer network exploitation operations + Demonstrated ability to find and… more
- CACI International (Chantilly, VA)
- Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee ... events where you get to engage with your co-workers and expand your career network . We are a fun, engaging environment with a management team focused on growing… more
- Vexterra Group (Bethesda, MD)
- …analysis + Network forensics and analysis + Generate professional technical exploitation reports of interest to the customer and the Intel Community. + Perform ... Vexterra Group is searching for a Digital Forensic Analysts to provide the following support:...requirements + Coordinate, enhance, and promulgate forensic and technical exploitation standards for forward deployed customer assets + Provide… more
- Nightwing (Sterling, VA)
- …and immediate investigation and resolution using host-based, cloud-based and network -based cybersecurity analysis capabilities. Team personnel provide front line ... response for digital forensics/incident response (DFIR) at Teir 2 and Teir...and assess evidentiary value - Correlate forensic findings to network events in support of developing an intrusion narrative… more
- Nightwing (Sterling, VA)
- …and immediate investigation and resolution using host-based, cloud-based and network -based cybersecurity analysis capabilities. Team personnel provide front line ... response for digital forensics/incident response (DFIR) at Teir 2 and Teir...critical customer mission. Responsibilities: - Correlate forensic findings to network events in support of developing an intrusion narrative… more
- CACI International (Chantilly, VA)
- Cyber Threat Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of ... yet elegant.** **Responsibilities:** **Use GOTS, commercial, and/or open source data exploitation and visualization tools for analysis, preferably broad in scope.**… more
- ManTech (Herndon, VA)
- **ManTech** seeks a motivated, career and customer-oriented **Cyber Security Forensics Analyst ** to join our team in the DC, Maryland, and Virginia (Northern) **DMV ... . In this role you will be responsible for conducting advanced digital forensics investigations, analyzing cyber threats, and developing strategies to mitigate… more
- SMX (Fort Belvoir, VA)
- Vulnerability Analyst (4274) (TS/SCI) (Ft. Belvoir, VA)at SMX(View all jobs) (https://www.smxtech.com/careers/) Fort Belvoir, VA SMX is seeking a **Vulnerability ... Analyst ** to perform regular vulnerability assessments and scans of...Research and report on new threats, attack vectors, and exploitation methods, demonstrating a thorough understanding of cyber threat… more
- ManTech (Herndon, VA)
- **ManTech** seeks a motivated, career and customer-oriented **Midlevel Cyber Security Forensics Analyst ** to join our team in the **DC, Maryland, and Virginia (DMV) ... . In this role you will be responsible for conducting advanced digital forensics investigations, analyzing cyber threats, and developing strategies to mitigate… more
- SMX (Fort Belvoir, VA)
- …jobs) (https://www.smxtech.com/careers/) Fort Belvoir, VA SMX is seeking a **Data Analyst ** to design, develop, and implement data-driven solutions to enhance ... and situational awareness to cybersecurity analysts and stakeholders. The Data Analyst shall utilize the GISA Governance Board determined Security Information and… more
- General Dynamics Information Technology (Chantilly, VA)
- …of related experience **US Citizenship Required:** Yes **Job Description:** Database Analyst Advisor A qualified Data Exploiter reviews, manipulates, triages, and ... operational and analytical requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will… more