1 to 15 of 199
Sort by: Date | Relevance
Assist with taskings and project coordination Assist with planning and execution of complex projects Prepare assessments and make recommendations Prepare and conduct briefings; provide advice on projects Respond to field requests and draft communications to preserve/support operational equities. Communicate and support operational requirements; provide interface between c
Posted Today
We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engi
Posted Today
We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understan
Posted Today
We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffi
Posted Today
We are looking for a Target Digital Network Analyst (TDNA) who will conduct advanced analysis of collection and open source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information. You will also maintain appropriate databases for targeting, tasking, and analysis. You
Posted 1 day ago
We are looking for a System Vulnerability Analyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems. You will compare and contrast various system attack techniques and
Posted 1 day ago
Provides support for implementation, troubleshooting and maintenance of information Technology (IT) systems. Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day to day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1
Posted 1 day ago
The Software Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing intensive analytics, novel algorithm development, manipulation of extremely large data sets, real time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews and tests software co
Posted 1 day ago
We are looking for a senior software developer looking to join a small, dedicated team taking an important operational system to the next level. This program currently supports a modern and expanding tech stack that include Java / Java Spring, AWS, Angular, Hibernate, PostgreSQL, Docker/Swarm (converting to Podman) and JHipster, a free and open source application generato
Posted 1 day ago
Seeking true SIGNALS analysts proficient in DNI, Cyber, and PROFORMA (TSR), potentially tasked with developing and delivering training initiatives. This role requires expertise in SIGNALS analysis rather than SIGINT, emphasizing a nuanced understanding of signals intelligence for comprehensive mission support. The Signals Analyst shall possess the following capabilities R
Posted 1 day ago
iNovex Information Systems
- Joint Base Lewis-McChord, WA
Provide Physical, Personnel, Special, Special Access Program (SAP) and Industrial Security specialists to assist, monitor, and advise on all aspects of security activities. Plan and assist in implementation of security activities at the highest classification to ensure USSOCOM personnel (Military, Civilians, and Contractors) and all supported tenant organizations are prep
Posted 1 day ago
We are looking for an Intrusion Analyst to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources. You will analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained fr
Posted 1 day ago
We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understan
Posted 1 day ago
We are looking for a Digital Network Exploitation Analyst to evaluate target opportunities through comprehensive analysis of all source data. The role involves mapping target networks and assisting in the development of detailed exploitation and operational plans. Responsibilities include analyzing SIGINT and cybersecurity data across various OSI network layers, understan
Posted 1 day ago
iNovex Information Systems
- Reston, VA / McLean, VA / Herndon, VA
Review specialized data for intelligence leads Draft comprehensive targeting packages in support of the client's objectives Engage a variety of stakeholders to address requirements and develop new leads for exploitation Conduct detailed searches on items of interest and relay pertinent data to relevant customer components in a variety of written and briefing formats. Use
Posted 2 days ago
Email this Job to Yourself or a Friend
Indicates required fields