while staying involved in day-to-day technical work Strong Python and SQL skills, with experience building models, running experiments and influencing business decisions Experience with Robyn (Meta's open-source MMM tool) or managing teams who have used it commercially Exposure to MLOps tooling and workflows, including monitoring, deployment and versioning Experience deploying on a cloud environment More ❯
digital preservation service that meets the needs of collection materials and users within the Libraries and the wider University. The scope of this work includes a cloud-native and open-source digital repository and digital preservation system to underpin activities that ensure current and ongoing access to digital materials, as well as the implementation of additional tools that More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Oak Grove Technologies
Red Team Operators to use in cyber assessment operations of U.S. Government and DoD critical networks. Develop tools, exploits, and code for use on Red Team cyber operations. Conduct open-source research on cyber related vulnerabilities and exploitation development. Performing code review on all offensive scripts/code and shepherding them through all approval processes. Analyze operational Techniques … offensive cyber strategies, including reconnoitering, infiltration, network exploration, and data extraction, to simulate adversarial attacks and identify weaknesses during red team assessments. Qualifications Expertise as a Reverse engineer analyzing source code to develop tools or exploits. Expertise with Script or develop in one or more language (e.g., C, C++). Has managed significant engagements. Typically, 5-7+ years More ❯
triaging, responding to and reporting incidents and providing cyber security metrics. Evaluating and determining if/when information security violations have occurred through examination of network or device logs, open-source research, vulnerability and configuration scan data, and user provided reports. Demonstrate a strong understanding of information security policies and doctrine, ability to draft, modify and create SOPs More ❯
crime prevention. Key Responsibilities Review and investigate alerts from the firm’s transaction monitoring systems, identifying unusual or potentially suspicious activity. Conduct in-depth investigations using internal data and open-source intelligence (OSINT) tools. Draft clear, well-reasoned internal SARs for review and escalation. Work closely with the Head of Compliance to fine-tune transaction monitoring rules and More ❯
crime prevention. Key Responsibilities Review and investigate alerts from the firm’s transaction monitoring systems, identifying unusual or potentially suspicious activity. Conduct in-depth investigations using internal data and open-source intelligence (OSINT) tools. Draft clear, well-reasoned internal SARs for review and escalation. Work closely with the Head of Compliance to fine-tune transaction monitoring rules and More ❯
desired 7-10 years of successful enterprise software sales A proven track record of over-quota achievement Ability to operate in an entrepreneurial environment Sales Experience with Big Data, OpenSource Applications, Enterprise Application Integration, Database and/or Business Intelligence software concepts and products preferred BA/BS or equivalent educational background More ❯
optimisation strategies for model inference (e.g., dynamic batching, flash attention, speculative decoding). With preferred backgrounds covering some of the following: - Publications in top-tier conferences. - Contributions to popular open-source repositories. - Exceptional technical writing skills as evidenced by relevant publications or blogs. We encourage you to apply even if you do not feel you match all of … looking for, but it is not exhaustive. If you are interested in the role, the team, and our mission, we would love to consider your application. We are always open to conversations and look forward to hearing from you. Who we are: Speechmatics is the leading expert in Speech Intelligence, and uses AI and Machine Learning to unlock business … no matter their gender, identity or expression, race, disability, age, sexual orientation, religion, belief, marital status, national origin, veteran status, pregnancy, or maternity status. But we don't just open the door to diversity - we actively welcome it. Why? Because we believe every unique voice adds something special to our team, leading us to smarter solutions and a better More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Speechmatics Limited
optimisation strategies for model inference (e.g., dynamic batching, flash attention, speculative decoding). With preferred backgrounds covering some of the following: - Publications in top-tier conferences. - Contributions to popular open-source repositories. - Exceptional technical writing skills as evidenced by relevant publications or blogs. We encourage you to apply even if you do not feel you match all of … looking for, but it is not exhaustive. If you are interested in the role, the team, and our mission, we would love to consider your application. We are always open to conversations and look forward to hearing from you. Who we are: Speechmatics is the leading expert in Speech Intelligence, and uses AI and Machine Learning to unlock business … no matter their gender, identity or expression, race, disability, age, sexual orientation, religion, belief, marital status, national origin, veteran status, pregnancy, or maternity status. But we don't just open the door to diversity - we actively welcome it. Why? Because we believe every unique voice adds something special to our team, leading us to smarter solutions and a better More ❯
skills above and beyond completing their university course. This could take the form of internships within a related industry sector, ambitious and technically challenging hobby projects, or perhaps sizeable open-source contributions. You will need: Outstanding academic qualifications including a 1st or 2.1 degree from a highly ranked Russell Group or equivalent university, and mainly A and A More ❯
from analytics through a suite of operationalized AI/ML tools for data collection/ingestion and subsequent text, geospatial, time series and image/video analytics to support open-source intelligence. BlueHalo, an AV Company, is a national source for classified Cyber/SIGINT missions and a leading provider of blockchain/crypto analytics and platform More ❯
from analytics through a suite of operationalized AI/ML tools for data collection/ingestion and subsequent text, geospatial, time series and image/video analytics to support open-source intelligence. BlueHalo, an AV Company, is a national source for classified Cyber/SIGINT missions and a leading provider of blockchain/crypto analytics and platform More ❯
Palo Alto switches, routers, and firewalls Experience in troubleshooting and restoring network and system outages Experience with SDN Technologies and vendors, including SD-WAN, NSX-T, Cisco, Juniper, and open-source solutions Experience in engineering and administering WAN solutions. Experience in Quality of Service (QoS) technology engineering. Experience with MS Visio software. Certifications: AIT Level II Security Certification More ❯
identifying indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs) used by attackers required - Expertise in established cyber threat intelligence frameworks, such as MITRE ATT&CK required - Experience with open-source intelligence (OSINT) collection methods and tools preferred - Bachelor's Degree preferred - Preferred certifications include: GIAC Cyber Threat Intelligence (GCTI) Microsoft Sentinel Splunk Enterprise Security We are equal More ❯
ability to obtain within 6 months of hire Preferred Qualifications: • Experience implementing and using complicated software products that involve multiple components • Experience with vendor agnostic C2C capabilities and services, open-source components and trends, DoD integration and networks, and DoD engineering and sustainment procedures and processes to deliver real time C2C enterprise-level expertise to the customer base More ❯
or CCNA-Security), or ability to obtain within 6 months of hire Preferred Qualifications: • Experience implementing and supporting complex, multi-component software solutions • Familiarity with vendor-agnostic C2C capabilities, open-source cybersecurity tools, DoD integration practices, and sustainment procedures for delivering enterprise C2C expertise • Proficiency with Cisco Identity Services Engine (ISE) Clearance Requirements: • An active TS/SCI More ❯
solutions to protect national interests. The work includes intelligence analysis, advanced data management, and the development of next-generation cybersecurity capabilities. Position Responsibilities: Conduct advanced analysis of collection and open-source data to generate insights and leads. Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information. Maintain appropriate databases for targeting More ❯
agencies or similar organizations, following the gov.uk Service Standard. Service Assessment record is a plus. Experience with web CMS (Drupal or equivalent) and custom web app platforms built using open-source solutions (Laravel or equivalent). Experience managing software workstreams in an agile environment. Strong stakeholder engagement skills, capable of handling difficult situations and resolving conflicts. Commercial awareness More ❯
key part of the Infrastructure unit and have overall responsibility to design, maintain and provide 2 nd & 3 rd line support for all Storage & Systems hardware, Operating & Virtualisation Software, Opensource and application integration. You would work towards providing a 24/7 support system. Ensure maximum availability of core systems and that performance monitoring is in place More ❯
certifications in IAT Level II Preferred Qualifications: Knowledge and experience with Threat Intel Frameworks (e.g. Cyber Kill Chain, MITRE ATT&CK, Diamond Model) Demonstrated experience using EnCase, FTK, and Open-Source methods and tools to perform Computer Forensic investigations Experience with Splunk, CrowdStrike Falcon, Security Onion, EnCase, Axiom, FTK, Volatility, Suricata, Experience with network topologies and network security More ❯
solutions to protect national interests. The work includes intelligence analysis, advanced data management, and the development of next-generation cybersecurity capabilities. Position Responsibilities: Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information Maintain appropriate databases for targeting More ❯
Location: Annapolis Junction, Alaska (TDNA3), Hawaii (TDNA 2) Clearance Required: TS/SCI w/Polygraph As a TDNA, your responsibilities will include: Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information Maintain appropriate databases for targeting More ❯
Journeyman: High School Diploma and ten (10) or more years' experience conducting Defense or Intelligence Community intelligence support operations. Senior: Bachelors and five (5) years or more experience conducting open-source intelligence activities in support of the Defense Department or Intelligence Community Agencies; Masters and three (3) years or more OSINT experience; applicable PhD (data engineering, research, etc. More ❯
Keep up to date with evolving cyber threats, vulnerabilities, and best practices • Preferred SANS GREM: GIAC Reverse Engineering Malware certification Experience with Splunk, threat intelligence feeds and platforms, and open-source intelligence tools and information streams a plus. • Security Clearance Level: Interim Secret, Secret or Top Secret. • Location: Metro DC area • US Citizenship Required GDIT IS YOUR PLACE More ❯
/hour C2C Location: San Francisco, CA Duration: 12+ months/long-term Interview Criteria: Telephonic + Skype Direct Client Requirement 1. Systems and Software Engineering: Leverage proprietary and open-source tools and frameworks to develop ML systems and software applications. Design and implement scalable and modular software architectures, emphasizing maintainability and extensibility. Develop core capabilities for ML More ❯