• Cyber Test & Exploitation

    Lockheed Martin (Grand Prairie, TX)
    …the world and find solutions using creativity and collaboration\. We are seeking a Senior Staff Cybersecurity Test Exploitation to join our team in Dallas, ... will include but not be limited to: * Conducting exploitation testing to improve integrity and security of weapon...integrating custom hardware into existing embedded systems \-Adapting common cyber security tools for use on embedded systems *… more
    Lockheed Martin (05/16/24)
    - Save Job - Related Jobs - Block Source
  • Supervisor Cyber Assessment & Vulnerability…

    PSEG (Bethpage, NY)
    …understanding of information security and experience in vulnerability management, and cyber exploitation techniques. You must also possess excellent ... career development, coaching and counseling and manage compensation for Cyber assessment staff . + Responsible for conducting...of CBD products may result in a positive drug test for THC/Marijuana and such use is not a… more
    PSEG (05/15/24)
    - Save Job - Related Jobs - Block Source
  • Threat and Cyber Growth Lead - Aerospace…

    Leidos (VA)
    …and Technical Intelligence; Foreign Material Exploitation ; Modeling and Simulation, Test and Training Range Community; Rapid Prototyping; Cyber Technology ... has a career opportunity for an experienced Threat and Cyber Growth Lead responsible for business development and strategy...in the loop (HWIL) development + Experience with Western Test Ranges operations and Large Force Exercise support +… more
    Leidos (04/23/24)
    - Save Job - Related Jobs - Block Source
  • Test and Evaluation Analyst (Operations…

    Huntington Ingalls Industries (Albuquerque, NM)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
    Huntington Ingalls Industries (05/22/24)
    - Save Job - Related Jobs - Block Source
  • Penetration Test NAMR Lead

    JPMorgan Chase (Columbus, OH)
    …and propelling continuous improvement. As an Assessments & Exercises Vice President in Cyber and Tech Controls line of business, you will contribute significantly to ... Penetration Testers who conduct manual in-depth assessments to replicate relevant cyber security threats targeting the firm. The successful candidate will have… more
    JPMorgan Chase (05/12/24)
    - Save Job - Related Jobs - Block Source
  • Staff Classified Cybersecurity Analyst…

    Northrop Grumman (Beale AFB, CA)
    …only part of history, they're making history. **Cybersecurity Leaders, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. Almost ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/31/24)
    - Save Job - Related Jobs - Block Source
  • Staff Classified Cybersecurity Analyst

    Northrop Grumman (Redondo Beach, CA)
    …of history, they're making history. **Information Systems Security Leaders, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/12/24)
    - Save Job - Related Jobs - Block Source
  • Data Security Specialist

    PSEG (Bethpage, NY)
    …risk of data exfiltration and misuse. This engineering resource collaborates with Cyber Governance & risk to integrate technical data protection mechanisms. This ... (eg, encryption, access control, and identity management) to reduce exploitation opportunities on PSEG's Data * Actively detect and...Qualifications: * Bachelors degree and 6 years of relevant cyber security experience * In lieu of a degree… more
    PSEG (05/17/24)
    - Save Job - Related Jobs - Block Source
  • Software Reverse Engineer (TS/SCI)- Senior & Mid

    Vexterra Group (Bethesda, MD)
    …Unix variants + Advanced or Expert knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and ... by clearly articulating ideas through papers and presentations to technical staff , management and customer decision makers + Take advantage of opportunities… more
    Vexterra Group (04/18/24)
    - Save Job - Related Jobs - Block Source
  • DARC Chinese Mandarin Cryptologic Linguist

    CACI International (Homestead AFB, FL)
    …services, infrastructure, and expertise to assist the government in day-to-day staff support functions and operations against Counter External State Actors (ESA)/AKA ... (SIGINT), Support to Human Intelligence (HUMINT), emerging technologies Processing, Exploitation , and Dissemination (PED), and Next-Generation ISR collection directed… more
    CACI International (05/22/24)
    - Save Job - Related Jobs - Block Source
  • Software Developer

    Cintel Inc (Huntsville, AL)
    …to effectively portray opposition force Computer Network Attack, Computer Network Exploitation , and Computer Network Defense. * Define requirements and develop ... and passively expose and exploit information system vulnerabilities. * Exploitation and vulnerability research, tool design and development (software/application/scripting/coding),… more
    Cintel Inc (04/25/24)
    - Save Job - Related Jobs - Block Source
  • Classified Cybersecurity Analyst 3/4

    Northrop Grumman (Cincinnati, OH)
    …only part of history, they're making history. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of threats. ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/25/24)
    - Save Job - Related Jobs - Block Source
  • Principal Classified Cybersecurity Analyst

    Northrop Grumman (Linthicum, MD)
    …history, they're making history. **Information Systems Security Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/22/24)
    - Save Job - Related Jobs - Block Source
  • Sr Principal Classified Cybersecurity Analyst

    Northrop Grumman (Linthicum, MD)
    …history, they're making history. **Information Systems Security Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/18/24)
    - Save Job - Related Jobs - Block Source
  • Northrop Grumman (DoD SkillBridge) - Sr. Principal…

    Northrop Grumman (Linthicum, MD)
    …are willing to work on-site.** Information Systems Security Professionals, We Want You! Cyber assets everywhere are under siege from a wide spectrum of threats. ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/18/24)
    - Save Job - Related Jobs - Block Source
  • Embedded Systems Security Engineer

    Huntington Ingalls Industries (Dayton, OH)
    …protected from global reverse engineering threats. Work alongside senior technical staff and our US Government customer to identify weaknesses and vulnerabilities ... technical recommendations to senior DoD decision makers. Participate in formalized test activities to verify correctness of final anti-tamper implementations and… more
    Huntington Ingalls Industries (03/28/24)
    - Save Job - Related Jobs - Block Source
  • Simulations & Analysis Electronics Engineer…

    Huntington Ingalls Industries (Adelphi, MD)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
    Huntington Ingalls Industries (04/23/24)
    - Save Job - Related Jobs - Block Source
  • Lead Mechanical Engineer (Engineer Mechanical 4)

    Huntington Ingalls Industries (Crane, IN)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... to support integrated intelligence, surveillance and reconnaissance (ISR) operations, exploitation and analysis for the Intelligence Community, the military… more
    Huntington Ingalls Industries (04/20/24)
    - Save Job - Related Jobs - Block Source
  • Software and Embedded Coding Engineer

    Pennsylvania State University (University Park, PA)
    APPLICATION INSTRUCTIONS: + CURRENT PENN STATE EMPLOYEE (faculty, staff , technical service, or student), please login to Workday to complete the internal application ... Emphasis, with a desire to work in a growth area of electromagnetics and cyber disciplines. VSD is a newly formed department invested in the spectrum convergence… more
    Pennsylvania State University (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Classified Cybersecurity Analyst 3/4

    Northrop Grumman (Aurora, CO)
    …history, they're making history. **Information Systems Security Professionals, We Want You!** Cyber assets everywhere are under siege from a wide spectrum of ... speed. Support our entire enterprise and build the networks, staff the teams, and develop the processes that will...a holistic approach to cybersecurity, looking at the whole cyber landscape of people, processes and technology and the… more
    Northrop Grumman (05/30/24)
    - Save Job - Related Jobs - Block Source