- Lockheed Martin (Arlington, VA)
- …areas, you will be assessed for your ability to develop these skills: \- Applied research skills \- Embedded systems development \- Compiler Design and ... a vital member of our world\-class team, composed of applied researchers and engineers who contribute to projects that.../IO/CNO R&D If you have demonstrated a passion for cyber technologies, are self\-motivation, and adept at research… more
- United States Army Futures Command (Fort Belvoir, VA)
- Summary The Senior Research Scientist (Signal and Image Processing) position is located in the US Army Combat Capabilities Development Command (CCDC), Command, ... paramount qualifications at the time of selection.** The Senior Research Scientist (SRS) in the US Army...and Technology Integration (RTI) Directorate is responsible for conducting applied research and manufacturing technology in the… more
- Mastercard (Arlington, VA)
- …Experience having applied data science learning to an internship or research /lab position - Experience retrieving data from databases and other systems and tools ... and delivers better business results. **Title and Summary** Data Scientist Intern, Summer 2025 - United States This role...of customer use. For instance, do banks that assess cyber risk before partnering with a merchant suffer less… more
- The MITRE Corporation (Fort Meade, MD)
- …across sponsors using knowledge and skills such as cybersecurity engineering, applied research and development, reverse engineering, software engineering, ... systems engineering and integration, offensive and defensive cyber operations, advanced cyber threats, adversary...role you will be required to: + Complete software research and development supporting a classified sponsor in multiple… more
- The MITRE Corporation (Fort Meade, MD)
- …across sponsors using knowledge and skills such as cybersecurity engineering, applied research and development, reverse engineering, software engineering, ... systems engineering and integration, offensive and defensive cyber operations, advanced cyber threats, adversary methodologies, cyber threat intelligence… more