Search Results: 9,022 vacancies
...The Information Security Analyst, for Threat & Vulnerability, will provide service and operational... ..., penetration testing and social engineering activities.
Support the implementation... ...procedures.
Incident and Problem management system support working with Security...
Suggested
...Job Description
Reverse Engineer / Vulnerability Researcher
Do you want to lead the way in processes, techniques, tools, tactics, and... ...GNU Make, cross-compilers, etc.)
•Software configuration management (Git, Subversion, etc.)
•Automated test and CI/CD systems...
Suggested
Holiday work
Full time
Temporary work
Work experience placement
Flexible hours
Axient -:
DEFENSE
Overview:
Systems Engineering Group (SEG), a wholly owned subsidiary... ...models and tools to characterize threat ballistic and cruise missile performance... ...data and models
Interfacing with SEG management, program management, and government customers...
Suggested
Work experience placement
...customer-oriented Cryptographic Vulnerability Analyst to join our team in... ...Analysis and Cryptographic Engineering technical expertise.... ...vulnerabilities and cybersecurity threats to program, functions,... ...communicates with co-workers, management and customers, which may involve...
Suggested
Axient -:
DEFENSE
Overview:
Systems Engineering Group (SEG), a wholly owned subsidiary... ...sensor and missile performance against threat ballistic and cruise missiles through... ...external customer forums.
Assist program management in defining future efforts and author...
Suggested
For contractors
Work experience placement
Remote job
...feel valued as more than just an engineer. The scope of my job makes every... ...at BlueHalo?
As a Senior Vulnerability Assessment Analyst with our Intel... ...the context of an organization's threat environment that improve its risk management posture
Engage with stakeholders...
Suggested
Local area
...DEFENSE
Overview:
Systems Engineering Group (SEG), a wholly owned... ...currently seeking a Junior Threat and Weapons System Engineer... ...forums.
Assist program management in defining future efforts and... ...digital information systems vulnerabilities, and computer and network...
Suggested
For contractors
Work experience placement
Remote job
...include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data... ...small teams with close coordination with customers. All our engineers write code, but many of our engineers spend as much time taking...
Suggested
Holiday work
Temporary work
Work experience placement
Flexible hours
Overview:
SEG is seeking a Threat and Weapons System Engineer with ML/AI t o be part of a systems analysis team providing technical contributions and analysis for U.S. Surface Navy (e.g. Aegis Baseline) programs and Missile Defense Agency (MDA) Ballistic Missile...
Suggested
For contractors
Work experience placement
Remote job
...value the mission and where I feel valued as more than just an engineer. The scope of my job makes every day a dynamic blend of technical... ...and the world are counting on us to deliver.
As a Cyber Threat Analyst with our Intel Division, you will be responsible for...
Suggested
...Description Description :
The candidate will be working with the customer stakeholders to research, develop, refine, and deploy a management system for virtual and local testing.
Skills Requirements:
Active and current TS.SCI w FSP
Proficiency with both Re...
Suggested
Local area
Remote job
...intelligence, and services offerings.
Position Description:
Vulnerability researchers at Nightwing CODEX analyze systems to understand... ...small teams with close coordination with customers. All our engineers write code, but many of our engineers spend as much time...
Suggested
Holiday work
Temporary work
Work experience placement
Work alone
Flexible hours
...broad capabilities across IT managed services, cybersecurity,... ...is seeking a Senior Cyber Threat Intelligence Analyst
Duties... ...Computer Science/Computer Engineering, Information/Network Security... ...motivations, TTPs, cyber kill chain, vulnerability threat intelligence, and...
Suggested
Remote job
Shift work
...PRIME on this mission-focused cyber program!
The Jr. Threat / Warning Analyst finds, analyzes, summarizes, and reports... ...~ Aid in collection and initial processing of threat- and vulnerability- related information from multiple sources.
~ Support...
Suggested
Flexible hours
...Description/Job Summary
Vulnerability Assessment Analyst - Journeyman
Job Location: Fort Meade, MD
Job Category:
Position Type... ...Information Technology and Communications consulting, system engineering, integration, deployment and operations of stat of the art...
Suggested
Full time
Local area
...: 300 Sentinel Drive Suite 300 AJ 300 Sentinel Drive Suite 300, Annapolis Junction, MD, 20701 USA - Position Role Type:Onsite. You have been redirected to RTXs career page as Research, Vulnerability, Senior, Security, Cybersecurity, Manufacturing, Technology, Systems...
Job Title:
Cyber Threat Intelligence Analyst
Overview:
EverWatch is a government solutions company providing advanced defense... ...with a Security Operations Center (SOC)
Knowledge of vulnerabilities and attacks
Knowledge of cyber threats, open-source research...
...looking to hire a full-time Cyber Threat Modeling and Simulation Engineer, Lead for a contract with... ...years of operational and program management experience to help organizations... ...principles, including threat vectors, vulnerabilities, and defense mechanisms, is crucial...
Full time
Contract work
Temporary work
For contractors
Responsibilities:
This Cyber Threat Analyst position supports the Defense Cyber Crime Center (DC3) and participates as a team member... ...communicate status. Uses Columbo, the DAD, and Splunk to ingest, manage, and fuse multiple intelligence streams and perform analysis....
...Incident Response Analyst - Threat Hunter for a legacy project... ...Security Information and Event Management), Malware Analysis, Network... ...Operations Center (SOC), Vulnerability Assessment, IDS/IPS (Intrusion... ..., network admin, network engineer, NetOps, NetworkOps, Net Ops...
Contract work
Local area
Remote job
Shift work
1 day per week