- Lockheed Martin (Grand Prairie, TX)
- …the world and find solutions using creativity and collaboration\. We are seeking a Senior Staff Cybersecurity Test Exploitation to join our team in Dallas, ... will include but not be limited to: * Conducting exploitation testing to improve integrity and security of weapon...integrating custom hardware into existing embedded systems \-Adapting common cyber security tools for use on embedded systems *… more
- PSEG (Bethpage, NY)
- …understanding of information security and experience in vulnerability management, and cyber exploitation techniques. You must also possess excellent ... career development, coaching and counseling and manage compensation for Cyber assessment staff . + Responsible for conducting...of CBD products may result in a positive drug test for THC/Marijuana and such use is not a… more
- Leidos (VA)
- …and Technical Intelligence; Foreign Material Exploitation ; Modeling and Simulation, Test and Training Range Community; Rapid Prototyping; Cyber Technology ... has a career opportunity for an experienced Threat and Cyber Growth Lead responsible for business development and strategy...in the loop (HWIL) development + Experience with Western Test Ranges operations and Large Force Exercise support +… more
- Huntington Ingalls Industries (Albuquerque, NM)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
- JPMorgan Chase (Columbus, OH)
- …and propelling continuous improvement. As an Assessments & Exercises Vice President in Cyber and Tech Controls line of business, you will contribute significantly to ... Penetration Testers who conduct manual in-depth assessments to replicate relevant cyber security threats targeting the firm. The successful candidate will have… more
- Northrop Grumman (Beale AFB, CA)
- …only part of history, they're making history. **Cybersecurity Leaders, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. Almost ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
- Northrop Grumman (Redondo Beach, CA)
- …of history, they're making history. **Information Systems Security Leaders, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
- PSEG (Bethpage, NY)
- …risk of data exfiltration and misuse. This engineering resource collaborates with Cyber Governance & risk to integrate technical data protection mechanisms. This ... (eg, encryption, access control, and identity management) to reduce exploitation opportunities on PSEG's Data * Actively detect and...Qualifications: * Bachelors degree and 6 years of relevant cyber security experience * In lieu of a degree… more
- Vexterra Group (Bethesda, MD)
- …Unix variants + Advanced or Expert knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and ... by clearly articulating ideas through papers and presentations to technical staff , management and customer decision makers + Take advantage of opportunities… more
- CACI International (Homestead AFB, FL)
- …services, infrastructure, and expertise to assist the government in day-to-day staff support functions and operations against Counter External State Actors (ESA)/AKA ... (SIGINT), Support to Human Intelligence (HUMINT), emerging technologies Processing, Exploitation , and Dissemination (PED), and Next-Generation ISR collection directed… more
- Cintel Inc (Huntsville, AL)
- …to effectively portray opposition force Computer Network Attack, Computer Network Exploitation , and Computer Network Defense. * Define requirements and develop ... and passively expose and exploit information system vulnerabilities. * Exploitation and vulnerability research, tool design and development (software/application/scripting/coding),… more
- Northrop Grumman (Cincinnati, OH)
- …only part of history, they're making history. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
- Northrop Grumman (Linthicum, MD)
- …history, they're making history. **Information Systems Security Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
- Northrop Grumman (Linthicum, MD)
- …history, they're making history. **Information Systems Security Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
- Northrop Grumman (Linthicum, MD)
- …are willing to work on-site.** Information Systems Security Professionals, We Want You! Cyber assets everywhere are under siege from a wide spectrum of threats. ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
- Huntington Ingalls Industries (Dayton, OH)
- …protected from global reverse engineering threats. Work alongside senior technical staff and our US Government customer to identify weaknesses and vulnerabilities ... technical recommendations to senior DoD decision makers. Participate in formalized test activities to verify correctness of final anti-tamper implementations and… more
- Huntington Ingalls Industries (Adelphi, MD)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
- Huntington Ingalls Industries (Crane, IN)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
- Pennsylvania State University (University Park, PA)
- APPLICATION INSTRUCTIONS: + CURRENT PENN STATE EMPLOYEE (faculty, staff , technical service, or student), please login to Workday to complete the internal application ... Emphasis, with a desire to work in a growth area of electromagnetics and cyber disciplines. VSD is a newly formed department invested in the spectrum convergence… more
- Northrop Grumman (Aurora, CO)
- …history, they're making history. **Information Systems Security Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more