106 to 120 of 176
Intelligence Analyst SME 1 TSOC Job Locations US VA Vienna # of Openings 13 Category Intelligence Clearance Top Secret/SCI w/CI Polygraph Clearance Status Active Overview Intelligence Analyst SME 1 TSOC Location Vienna, VA Clearance TS/SCI w/CI Poly Support the Terrorist Screening Center (TSC) oversight and management of the US Government's (USG) Terrorist Watchlist, also
Posted 10 days ago
Intelligence Analyst SME 1 VRR Job Locations US VA Vienna # of Openings 9 Category Intelligence Clearance Top Secret/SCI w/CI Polygraph Clearance Status Active Overview Intelligence Analyst SME 1 VRR Location Vienna, VA Clearance TS/SCI w/CI Poly Support the Terrorist Screening Center (TSC) oversight and management of the US Government's (USG) Terrorist Watchlist, also kn
Posted 10 days ago
Conduct in depth research and analysis of current and emerging cyber threats, including threat actors, tactics, techniques, and procedures (TTPs) Develop and maintain comprehensive threat profiles to understand attacker motivations and capabilities Manage and curate threat intelligence feeds from internal and external sources Enrich and analyze threat data using advanced
Posted 10 days ago
s of the PSEA The private sector assessment in the Kyrgyz Republic will 1) Provide an overview of private education sector stakeholders and their respective roles; 2) Conduct mapping of potential private partners in education and key private sector actors, private education associations; 3) Perform private sector landscaping of education governance and regulation to advanc
Posted 10 days ago
s of the PSEA The private health sector assessment in the Kyrgyz Republic will 1) Provide an overview of private health sector stakeholders and their respective roles; 2) Conduct mapping of potential private partners in health, key private health sector actors, private health associations; 3) Perform private sector landscaping of health governance and regulation to advance
Posted 10 days ago
Emulate a potential adversary's offensive cyberspace operations, reconnaissance, and exploitation techniques against a targeted mission, system, network, component, or capability Use information gathered from readily available open source internet resources to identify exposed or compromised information, vulnerabilities, and misconfigurations Employ tools against identifi
Posted 11 days ago
Directing, tracking, and implementing enterprise wide countermeasures across a wide spectrum of endpoint, network, and cloud based tools. Assessing, validating, and ensuring deployment and continuous efficacy of deployed countermeasures in the environment. Create, recommend, and assist with development of new security content as the result of coordination with other teams
Posted 11 days ago
Acclaim Technical Services, founded in 2000, is a leading language and intelligence services company supporting a wide range of U.S. Federal agencies. We are an Employee Stock Ownership Plan (ESOP) company, which is uncommon within our business sector. We see this as a significant strength, and it shows ATS is consistently ranked as a top workplace among DC area firms and
Posted 11 days ago
Leadership In close consultation with the Policy Director, develop, assess, and manage key policy workstreams for projects that have policy action taking and engagement as a goal, especially federal and state policy related to Benefits21 and Inclusive Financial Systems. Serve as a go to resource within Aspen FSP for relevant policy developments, opportunities, and decisio
Posted 11 days ago
FHI 360 staff working in the United States are required to be fully vaccinated for COVID 19, regardless of the type of project or client they serve, or of their employment status (full/part time, remote, telework, or in office), unless an accommodation applies. FHI 360 complies with federal, state, and local laws with regard to accommodations related to this policy. Provi
Posted 11 days ago
Use information collected to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Develop strategies and plans of action to help strengthen and defend networks from malicious actors. Utilize information to mitigate and report that occur in their domain and possible responses to them. The Level 3 CDNA sh
Posted 12 days ago
Use information collected to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. Develop strategies and plans of action to help strengthen and defend networks from malicious actors. Utilize information to mitigate and report that occur in their domain and possible responses to them. The Level 2 CDNA sh
Posted 12 days ago
The Senior Illicit Finance Expert(s) will support IFES's technical interventions to bolster capacity, strategies, and mechanisms to counter IFFs in elections. This includes the development of specialized training curricula in target areas, including IFF detection and analysis, investigative techniques, forensic accounting, and digital currency tracking. Selected experts w
Posted 15 days ago
The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research. If your application is approved, we will test you o
Posted 16 days ago
The candidate will be primarily focused on conducting hardware/software analysis of embedded products. The focus will be on reverse engineering and potentially vulnerability analysis of provided systems via static and/or dynamic tools and techniques. Enablement of potential further analysis, repeatable exploitation processes, feature addition, and technical reporting are
Posted 16 days ago
Email this Job to Yourself or a Friend
Indicates required fields