Click column header to sort
The IT Program Manager will lead a software development effort using Agile methodologies. The ideal candidate will have experience with customer requirements, meeting schedule and delivery expectations, managing risks and providing regular communications.
The Systems Engineer will maintain a strong awareness of technical trends in information technology, develop and maintain a strong awareness of on-going IT projects, and business unit requirements. The candidate must be able to apply the project management model selected for a given development effort. Responsibilities also include providing analysis, design, development, deployment, and life cycle support for innovative hardware systems and applications. Responsibilities include being able to develop end-to-end cost analysis for projects, ensuring systems being developed comply with the enterprise technical architecture, helping project and program teams prepare for the sponsor project...
The Data Scientist will create data science and data engineering products that include data models, data ingestion/transform, analytics which may include machine learning, and some form of output as either a machine-readable format (e.g. file output, database output, standard/streaming output) or a user interface or dashboard.
The Cyber Security Engineer ensure highest levels of information system security.
The successful candidate will:
- Support the Customer’s risk management framework by evaluating, implementing and enforcing security policies that align with the customer’s security needs.
- Manage the A&A Process for multiple projects from concept to Authority to Operate (ATO).
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
•Conduct advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information.
•Maintain appropriate databases for targeting, tasking, and analysis.
•Develop comprehensive baseline profiles of designated target sets.
•Identify intelligence gaps to tailor current collection or enable new collection to close the gaps.
•Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints.
•Apply...
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Exploitation Analyst (EA) shall identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. The EA will leverage all authorized resources and analytic techniques to penetrate target networks. The EA shall create comprehensive strategies to develop and maintain access, conduct remote exploitation, and provide technical assistance as needed.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
The Digital Network Exploitation Analyst (DNEA) shall analyze target digital network technologies and identify and depict the connections between digital networks (protocols, routers, servers, satellites, cables, etc.). The DNEA shall perform global network analysis and assist with mapping, while identifying exploitable target communications with the global network.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.
We are seeking a Computer Network Defense Analyst to support a cyber mission. The Computer Network Defense (CND) Analyst will analyze, map, protect or discover vulnerabilities, intrusions, and threats in computer network systems. Conduct computer/network security. Conduct target development and understand all aspects of computer/network security, including firewall administration, encryption technologies and network protocols.