include the rationale for decisions to release or not to release Government information from documents. Export records from the Government processing system to provide to internal NSA stakeholders. Enter metadata into the Government processing system to ensure accurate recall of documents and cases. Ensure during the record review process that any equities falling under purview of external Government agencies, (i.e. More ❯
years' applicable experience with an associate degree, OR 15 years' applicable experience without a degree Relevant experience requires aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience requirements. More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
software house that is developing a highly complex network cyber security platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by in-house algorithms and allows customers to detect hackers, malware, data leakage and other malicious activity. As a Software Developer you will focus on enabling More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Client Server
software house that is developing a highly complex network cyber security platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by in-house algorithms and allows customers to detect hackers, malware, data leakage and other malicious activity. As a C++ Developer you will focus on enabling More ❯
remote sensing phenomenologies (for example EO/IR/SAR) Knowledge of NSG tasking, collection, processing, exploitation and dissemination (TCPED) image chain Experience with product quality assessments, visual or metadata assessments Security Clearance: Active TS/SCI Clearance and the willingness to sit for a CI polygraph, if needed IC-CAP provides equal employment opportunities (EEO) to all applicants for More ❯
create parsers for network protocols, develop fingerprints and signatures to identify suspicious and anomalous network activity, and deploy solutions to customer supported tools to automate and enable data and metadata analysis. Job responsibilities include, but are not limited to: Collaborate closely with customers to overlay network datasets through an existing architecture with the ABYSS product. Integrate parsers and signatures into More ❯
Development: Assist in developing key acquisition documents, including Statements of Work (SOWs), Requests for Proposal (RFPs), and cost estimates. Technical Expertise: Provide subject matter expertise on GEOINT data formats, metadata, classification, release requirements, and sensor phenomenology. Compliance & Governance: Advise on compliance with NGA and Intelligence Community (IC) enterprise standards, architectural concepts, and security guidelines. Stakeholder Coordination: Coordinate across various NGA More ❯
system activity to identify malicious activity • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a malicious attack More ❯
years applicable experience with an associate degree, OR 15 years applicable experience without a degree Relevant experience requires aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience requirements. Benefits: Weeghman and Briggs is a company specializing More ❯
and end users to facilitate adoption of current and emerging Information Knowledge Management standards, guidance, and best practices • Performs advanced configuration of SharePoint sites, pages, lists, document libraries, and metadata • Enhances existing applications, where possible, to automate business processes • Captures process and technology gaps and identifies Out-of-the-Box and/or custom SharePoint solutions to satisfy user needs More ❯
and end users to facilitate adoption of current and emerging Information Knowledge Management standards, guidance, and best practices • Performs advanced configuration of SharePoint sites, pages, lists, document libraries, and metadata • Enhances existing applications, where possible, to automate business processes • Captures process and technology gaps and identifies Out-of-the-Box and/or custom SharePoint solutions to satisfy user needs More ❯
and end users to facilitate adoption of current and emerging Information Knowledge Management standards, guidance, and best practices • Performs advanced configuration of SharePoint sites, pages, lists, document libraries, and metadata • Enhances existing applications, where possible, to automate business processes • Captures process and technology gaps and identifies Out-of-the-Box and/or custom SharePoint solutions to satisfy user needs More ❯
create parsers for network protocols, develop fingerprints and signatures to identify suspicious and anomalous network activity, and deploy solutions to customer supported tools to automate and enable data and metadata analysis. Responsibilities: Collaborate closely with customers to overlay network datasets through an existing architecture. Develop parsing and processing of network protocols to populate customer data repositories. Prototype and develop analytic More ❯
remote sensing phenomenologies (for example EO/IR/SAR) Knowledge of NSG tasking, collection, processing, exploitation and dissemination (TCPED) image chain Experience with product quality assessments, visual or metadata assessments SCA/Union/Intern Rate or Range Details Target Salary Range: $86,000 - $138,000. This represents the typical salary range for this position. Salary is determined by More ❯
be a US Citizen Active TS/SCI clearance/polygraph required Minimum six (6) years of experience in one or more of the following areas Signals Analysis SIGINT Metadata Analysis SIGINT Target Development Cyber/Network Threat Analysis Cyber Planning Target Digital Network Analysis Digital Network Intelligence Analysis Digital Network Exploitation Analysis Malware Analysis Conducting Network Vulnerability Assessments Familiar More ❯
the Security Control Assessment (SCA) team to achieve ATO (Authorization to Operate) Perform application security testing on mission critical IC systems Identify and analyze anomalies in network traffic using metadata Ability to reconstruct a malicious attack or activity based on network traffic Assess network topology and device configurations identifying critical security concerns Perform network monitoring, network mapping, vulnerability scanning, and More ❯
security architecture Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources Ability to identify and analyze anomalies in network traffic using metadata Experience with reconstructing a malicious attack or activity based on network traffic Experience examining network topologies to understand data flows through the network Must be able to work collaboratively across More ❯
meets the timelines dictated by the management authority for the intended operational environment. Maintain baseline system security according to organizational policies. Identify and analyze anomalies in network traffic using metadata Isolate and remove malware. Identify applications and operating systems of a network device based on network traffic. REQUIRED SKILLS/YEARS OF EXPERIENCE Minimum of 5 years of experience in More ❯
security architecture Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources Ability to identify and analyze anomalies in network traffic using metadata Experience with reconstructing a malicious attack or activity based on network traffic Experience examining network topologies to understand data flows through the network Must be able to work collaboratively across More ❯
system activity to identify malicious activity - Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a malicious attack More ❯
and balance user needs, technical constraints, and strategic goals. Demonstrable experience of successfully shaping, launching and scaling complex products to market. DESIRED BUT NOT REQUIRED: Technical understanding of how metadata can be used to define and extend digital media. If you can bring some of these skills and experience, along with transferable strengths, we'd love to hear from you More ❯
Eccles, Manchester, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
and balance user needs, technical constraints, and strategic goals. Demonstrable experience of successfully shaping, launching and scaling complex products to market. DESIRED BUT NOT REQUIRED: Technical understanding of how metadata can be used to define and extend digital media. If you can bring some of these skills and experience, along with transferable strengths, we'd love to hear from you More ❯
towards cloud. Experience working with Yocto, Debian, or Ubuntu custom Linux-based systems from the OpenEmbedded organization for embedded and IoT devices. Very important experience working with BitBake, recipes, metadata, and layers is a must-have. Experience using the Linux software update open-source utility is important.is important. More details pls reach out to me! Thanks-Sojal T E More ❯
Strong experience in designing HFM standard, Custom dimensions, metadata load process, loading and extracting of member list and data Designing HFM data forms, folders and dynamic forms, grid and cell text in HFM HFM Expertise in entering, eliminating and reporting of intercompany data HFM Journals management, adjustment, loading and managing in SmartView HFM Data translation, currency translation and running of More ❯
activities: Processes, distributes, and maintains controlled documentation using a document control system. Processes project documents including but not limited to, assigning file codes, scanning documents and completing the applicable metadata into the applicable document repository, routing and distribution, hard copy document filing and fulfillment of document retrieval requests. Processes and maintains project documents and update master copies of drawings/ More ❯