- Stratus Solutions (Scott Air Force Base, IL)
- …security, deliver justice and serve the public with advanced technologies and quality analysis . We work closely with agencies and industry to overcome technical and ... alerting and rapid response to potential threats. * Provide continuous monitoring and analysis of network traffic and system alerts to identify and combat malicious… more
- BlueVoyant (College Park, MD)
- …including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows ... Qualifications + Excellent teamwork skills + Knowledge of and experience with intrusion detection /prevention systems and SIEM software + Advanced knowledge and… more
- Bosch (Pittsburgh, PA)
- …including security and machine learning, applications of data miniing to security, intrusion detection , anomaly detection , network security,etc. + You ... duties during an average day including but not limited to log analysis , incident response, forensics, system/tooling development, and risk assessment, just to name… more
- BlueVoyant (College Park, MD)
- …including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows ... Qualifications + Excellent teamwork skills + Knowledge of and experience with intrusion detection /prevention systems and SIEM software + Strong knowledge and… more
- UNIVERSAL Technologies, LLC (Brooklyn, NY)
- …and directing techniques for detecting host and network-based intrusions using intrusion detection technologies. + Knowledge of anti-forensics tactics, ... admissibility (eg Rules of Evidence). + Knowledge of malware analysis tools (eg, Oily Debug, Ida Pro).... Pro). + Knowledge of malware with virtual machine detection . + Knowledge of NIST's Cybersecurity Framework (CSF) with… more
- Leidos (Columbia, MD)
- …+ Demonstrated experience programming techniques to evade host and/or network-based intrusion detection systems. + Demonstrated experience developing programs to ... the customer + Lead a small team conducting vulnerability analysis , reverse engineering, and software development. + Manage Sprints,.... + Experience utilizing reverse engineering tools such as IDA Pro to analyze firmware of embedded devices. +… more
- Leidos (Columbia, MD)
- …+ Demonstrated experience programming techniques to evade host and/or network-based intrusion detection systems + Demonstrated experience developing programs to ... closely with customers? Are you intrigued by offensive cyber vulnerability analysis and reverse engineering (VR/RE)? How about offensive cyber tool development?… more
- ManTech (Hanover, MD)
- … analysis * Computer forensic analysis and data recovery * Computer intrusion detection and analysis * Computer incident response * Reverse ... Engineering (Ghidra, IDA Pro, Binary Ninja) **Position Benefits:** * Choose-your-own work schedule (whether it's staggered shifts, four 10 hour days, early mornings,… more
- Leidos (Columbia, MD)
- …+ Demonstrated experience programming techniques to evade host and/or network-based intrusion detection systems. + Demonstrated experience developing programs to ... doing:** + Work on a small team conducting vulnerability analysis , reverse engineering, and software development. **What does Leidos.... + Experience utilizing reverse engineering tools such as IDA Pro to analyze firmware of embedded devices. +… more