Search Results: 2,722 vacancies
...Vulnerability Assessment Analyst
Salary: $118k/yr.
Location: Ft. Meade, MD (fully on-site)
Industry: Government/Defense
Clearance: Active TS/SCI required
Qualifications :
Bachelor s degree in computer science, Cyber Security, or Information Technology...
Suggested
Local area
...Vulnerability Assessment Analyst - Journeyman
Required Security Clearance: TS/SCI
Job Location: Fort Meade, MD
Job Category: Cyber Security or Information Technology
Position Type: Full Time, 40 hours per week
Athena Technology Group, Inc. is a Service...
Suggested
Full time
Local area
...there is no limit to where you can take your career with us. Are you ready to launch a career at BlueHalo?
As a Senior Vulnerability Assessment Analyst with our Intel Division, you will perform assessments of systems and networks to determine the effectiveness of...
Suggested
Local area
Clear Ridge Defense is seeking TS/SCI cleared professionals to serve as System Vulnerability Analysts in Fort Meade, MD.
Roles and Responsibilities
You will...
Identify vulnerabilities of and attacks to the design and operation of a system (examples: hardware,...
Suggested
Holiday work
Temporary work
Flexible hours
Identified vulnerabilities and attacks to the design and operation of a system
Perform control system security analysis
Perform wired and wireless network security analysis
Conducts vulnerability analysis
Develops scalable mitigation strategies
Suggested
Contract work
...impact on every client you work with.
ARSIEM is looking for Vulnerability Researchers, Levels 1 - 3 . Candidates must have experience... ...+ Meets all qualifications of a CNO Vulnerability Researcher/Analyst I, but has the following increased experience and skill levels...
Suggested
Remote job
...Job Description
Job Description Salary: DOE
Ability to i dentify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
Ability to c haracterize those attacks...
Suggested
Work experience placement
Local area
Fine-Tune Your Search!
Filter the job list with Smart Tags that match your preferences
Full time(292)
Immediate start(279)
Remote job(274)
Part time(272)
Work from home(252)
Weekend work(236)
...hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and... ...Mitigations Engineers and System Vulnerability Analysts at NSA have the opportunity to work in... ...configurations - Fusing vulnerability assessments from all sources into a unified...
Suggested
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...intelligence, and services offerings.
Job Summary
We are looking for a Network and Embedded Devices expert to lead a small team of vulnerability researchers pushing the envelope on what's possible. If you are looking for a leadership opportunity to grow a small team into a...
Suggested
Holiday work
Temporary work
Work experience placement
Work alone
Flexible hours
...Job Description
Reverse Engineer / Vulnerability Researcher
Do you want to lead the way in processes, techniques, tools, tactics, and technology supporting Offensive Cyber Operations?
Are you skilled in Reverse Engineering or Vulnerability Research?
#RMSC6ISR...
Suggested
Holiday work
Full time
Temporary work
Work experience placement
Flexible hours
...Job Summary:
The Information Security Analyst, for Threat & Vulnerability, will provide service and operational support to all ACS Information... ...threat intelligence to develop in-depth analysis and assessment on threats to critical networks and infrastructure components...
Suggested
Full time
...Campaign Assessment SME
Key Role:
Participate and provide input throughout all planning functions, from translating strategic guidance through concept and plan development to plan assessments and associated functions. Develop assessment strategies for key tasks...
Suggested
Holiday work
Full time
Contract work
Part time
Local area
Remote job
Work from home
Flexible hours
...Job Description
Job Description Position Overview:
Cantada has Vulnerability Research positions on multiple contracts. The successful candidate will analyze systems to understand how they work and react when they break. Candidates must have a strong development...
Suggested
...Job Description
Job Description Are you a Mobile Vulnerability Researcher who is ready for a new challenge that will launch your career... ...areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure,...
Suggested
Full time
Contract work
Remote job
...Description OPS Consulting is seeking experienced Exploitation Analysts 2 with a deep understanding of adversary networks, network... ...also have experience programming, computer/network security, vulnerability analysis, penetration testing, computer forensics,...
Suggested
...Performing security audits, risk analysis, application-level vulnerability testing, and security code reviews
Developing and implementing... ...tool improvement opportunities
Supports Cyber security assessment activities as needed
Supports DevSecOps compliance and...
For contractors
Local area
Relocation
...Job
As a Digital Network Exploitation Analyst, you will:
evaluate target... ...analytical talent to form hypotheses, critically assess and choose analysis techniques, then query... ...programming, computer/network security, vulnerability analysis, penetration testing, computer...
For contractors
Local area
...member of the ROUNDTABLE Cyber Collaboration Team, as a threat analyst, on a project that analyzes event data for security... ...security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment.Experience with Malware (including...
Holiday work
Temporary work
Work experience placement
Local area
...perform a vast array of Cyberspace intelligence analyst duties without guidance. Apply in-depth... ...of intelligence analytic concepts to monitor, assess, and report on Cyberspace operations, capabilities, and vulnerabilities. Contribute substantive content for reports and...
...techniques, our team of technologists and analysts employ capabilities spanning... ...warning intelligence products (e.g., threat assessments, briefings, intelligence studies, country... ...experience in Computer Network Exploitation, Vulnerability Assessment, Penetration Testing, or...