Past 24 hours
Colorado Springs, CO (72)
Years of Experience
0-4 years (16)
5-7 years (50)
8-10 years (32)
11-14 years (36)
15+ years (2)
Vice President (0)
Individual Contributor (0)
Booz Allen Hamilton (10)
Leidos holdings (9)
Northrop Grumman Corporation (8)
Linquest Corporation (4)
Easy Apply only
Expert at operating in a command-line environment, to include chaining utilities, complex commands integration of tcpdump to analyse novel protocols, IP protocols, and protocols outside the scope of I...
Ability to analyses complex (multipacket, multi-vector, multi-exploit, large volume) traffic and derive meaningful conclusions. Self-directed research, development, customization, or other contributio...
Daily consumption of domestic and international news from multiple sites, awareness of the differing biases / slants in presentation of the sites, able to conduct additional research for historical co...
The Industrial Security Analyst provides day-to-day support of all security aspects for a facility. The successful candidate will be expected to maintain and administer policies and procedures in comp...
Researches, develops, and recommends appropriate Cybersecurity countermeasures for networks, systems, and/or applications based upon test and evaluation information...
The Software Security Research (SSR) team specializes in approaching security from the perspective of how we build and use software. SSR is responsible for conducting security research which leads to...
Ensure that the cybersecurity architecture and design of the customer's systems shall be functional and secure with the ability to detect and respond to Cyber events...
Performing risk assessment activities for evaluating System Security Plans (SSP), Interim Authorization To Test (IATTs), Authorization to Operate (ATO), and Authorization to Connect (ATC)...
Support or lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customer’s national and international security interests are protected as...
Interacting with members of intrusion analysis, incident response, vulnerability assessment, external assessment, and cyber threat analysis teams to support the capabilities of the organization and pr...
Documentation and verification of all installation and configuration steps for the labs and fielded systems.Develop test plans/procedures for software integration and unit test...
Provides evaluations of T & E activities to include acceptance test criteria against system requirements for operational performance, communications, training, logistics, and sustainment...