Computer Security Job Vacancies

26 to 50 of 85 Computer Security Jobs

Computer Network Defense Analyst with Security Clearance

Wahiawa, Hawaii, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will … wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Defense Analyst with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will … wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer - Splunk with Security Clearance

Fayetteville, North Carolina, United States
Anonymous Employer
Primary Responsibilities • Provides technical/management leadership on major tasks or technology assignments • Leads integration effort between all customer defined Security Operations Center tools with the Splunk Security Information and Event Management (SIEM) platform • Performs technical troubleshoot efforts in support of customer resources for complete network environments to identify and inform relevant parties of network or security configuration issues for SIEM data collection • Responsible for SIEM security design review and recommendations, technical data gathering, security and policy review and configuration, security device implementation planning, configuration and implementation of security products, and technical quality assurance • Designs, architects, and implements Splunk solutions in support of cyber-security and IT operations and data scientists … Expected to demonstrate security related knowledge and skills, and good interpersonal and coordination skills • Create custom parsers and correlation rules for alerting security personal to potential security incidents. • Research cyber security related emerging trends • Provide experience architecting and managing Splunk Core and Splunk ES • Assist in managing TAs, source types and data formats, search, index clustering More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Office III (ISSO) with Security Clearance

Chantilly, Virginia, United States
LV8D Solutions
Information System Security Officer (ISSO) Level 3 LV8D Solutions is looking for an Information System Security Officer (ISSO) Level 3 to provide advice and assistance to the Government regarding secure configuration and operation of IT assets. Level 3 ISSOs apply extensive knowledge and experience of a variety of information system security concepts, practices, and procedures. Interested candidates … degree and 5+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • Familiarity with conducting research and analysis • Thorough understanding and application of network security principles, practice, and implementations • Familiarity with controlling, labeling, virus scanning, and appropriately transferring data (uploading/downloading) between information systems at varying classification levels • Excellent communication, interpersonal, and team … procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM) • Working knowledge of cross-functional integration of information systems into a physical security environment • Working knowledge of system functions, security policies, technical security safeguards, and operational security measures • Understanding of system methodologies including but not limited to client server More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Evaluator with Security Clearance

Maryland, United States
MultiLingual Solutions Inc
seeking Network Evaluators to join our team. Network Evaluators work to evaluate operational or developmental networks and systems for weaknesses and susceptibility to network attacks. Requirements Candidates shall: - Conduct computer network defense - Develop hardware and software tools - Plan missions for Government decision or implementation - Review Information Needs (IN's) to understand operational, tactical or strategic mission requirements - Conduct computer/network security to provide advice to the Government - Use digital forensics and conduct vulnerability discoveries Degree and minimum years of relevant work experience as follows: - BS + 2-11 years' experience or; - MS + 3-9 years' experience or; - PhD + 2-7 years' experience Required: - Degree must be in Network Engineering, Systems Engineering, Information Technology or … related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). - Information Assurance Certification may be required. - All candidates must have a current TS/SCI clearance and must be willing to submit to a polygraph. Desired: - Microsoft Networking, CNA, CISSP, ISSEP More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Network Defense Analyst with Security Clearance

Annapolis Junction, Maryland, United States
Elucidation Concepts LLC
as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Requirements: - Experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. - Additionally … yrs OR Masters + 9 yrs OR PhD + 7 yrs Education: - Requires a degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). - Up to 18 semester hours of military training …/coursework in networking, computer science, or cyber topics may be equivalent to an Associate degree. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undgergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Target Digital Network Analyst (TDNA) - multiple levels - CLEARA with Security Clearance

Maryland, United States
Constellation Technologies Inc
JCAC, XKS, Dx, 8140, 8570, OSI, WireShark, port, protocol, packets, exploitation, Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph This position is open to multiple levels of years … analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience requirements. Relevant experience could also be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis … penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience. Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities More ❯
Employment Type: Permanent
Salary: USD 250,000 Annual
Posted:

Senior Web Developer with Security Clearance

Fairfax, Virginia, United States
Cohere Technology Group
high availability, and enterprise infrastructure. Programming languages and scripting methods including Python, PHP, Java, Bash, HTML, CSS, JavaScript, and jQuery. Experience creating secure applications systems utilizing IC or DoD security guidelines. Experience utilizing DEVOPs tools such as a version control system (Github preferred, Subversion OK) Software testing, documentation, and training Experience with InDesign, Adobe Illustrator, Adobe Creative Suite/… your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computer security and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ServiceNow Developer with Security Clearance

Fairfax, Virginia, United States
Cohere Technology Group
your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computer security and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Manager, Operational Technology, Cybersecurity, Global

London, England, United Kingdom
Hybrid / WFH Options
Vantage Data Centers
looking for ways to strike the best balance between technology, performance and cost. The Vantage Cybersecurity Department also participates in designing each of our new data center building’s security infrastructure. If you like getting your hands dirty and helping to design, build and maintain Cybersecurity infrastructure in a modern data center, then come work at Vantage. We’re … Position Overview The OT Manager, Cybersecurity, Global at Vantage Data Centers is responsible for developing, managing, and strengthening the organization's cybersecurity posture. This role focuses on coordinating enterprise security programs, ensuring compliance with industry regulations, mitigating risks, and implementing standard processes. The ideal candidate will have a deep understanding of cybersecurity, risk management, and regulatory compliance, with the … ability to collaborate across departments and lead strategic security initiatives. This position requires a proactive approach to identifying and addressing security vulnerabilities while encouraging a culture of security awareness across the organization. The OT (Operational Technology) Manager, Cybersecurity, Global will be part of the leadership team responsible for protecting a rapidly expanding global enterprise. The OT Manager More ❯
Posted:

INFORMATION SECURITY ANALYST, JOURNEYMAN (96) - CALIFORNIA - URG with Security Clearance

Point Arena, California, United States
Cyberstrike Group
Job Number: 96 Job Category: GovTech Job Title: INFORMATION SECURITY ANALYST Job Type: Full-time Clearance Level: Top secret Work Arrangement: On-site Job Location: CA Point Mugu Salary: 120K- 153K Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose and … implement risk mitigation strategies Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Assist in the continuous integration, continuous delivery/deployment (CI/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure Work … with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years of practical CEAT computer security experience in secure network and system design, analysis, procedure/test generation, test execution and implementation More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Evaluator with Security Clearance

Maryland, United States
Tailored Access, LLC
Experience must be working in a security domain (e.g., cyber security, network security, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using network security intrusion or computer network diagnostic software utilities (e.g., SNORT … and trace-route). Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics (including Applied Math); or a related field (i.e., other Engineering or Math) with at least one programming and at least four upper-level math classes (Calculus and above). Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst (EA) Level 1 - 4 with Security Clearance

Maryland, United States
Tailored Access, LLC
findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree. Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Secuirty Analyst with Security Clearance

Camarillo, California, United States
Brandes Associates Inc
BAI, a defense contractor, is seeking an Information Security Analyst with 3+ years of experience with DevSecOps Automation and Continuous Integration Continuous Delivery (CI/CD) experience to work Department of Defense (DoD) programs at the Naval Base Point Mugu located near Camarillo, CA. Opportunities for career advancement, excellent benefits, and stability are some of the advantages of our … be based on current qualifications, directly related experience, geographic location, and possible contractual requirements which could fall outside of this range. Responsibilities: Information Assurance Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure May respond to computer security breaches and viruses Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses DevSecOps Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code More ❯
Employment Type: Permanent
Salary: USD 120,000 Annual
Posted:

Exploitation Analyst (Multiple Levels) with Security Clearance

Annapolis Junction, Maryland, United States
Weeghman & Briggs
including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers Qualifications: Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree. Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer … an associate degree Benefits: Weeghman & Briggs was established in 2016. We are a team of like-minded people who do business, generate ideas and realize them. Consulting and Cyber Security are our main directions and we know how to deal with many current issues and provide the best services in offering resolutions. Weeghman & Briggs is an Equal Employment Opportunity More ❯
Employment Type: Permanent
Salary: USD 121,900 Annual
Posted:

Exploitation Analyst 3 with Security Clearance

Georgia, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 3 Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Georgia, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst (EA) with Security Clearance

Annapolis Junction, Maryland, United States
BlueHalo
for the details and apply to make the most out of your career. You'd like to do this Conduct in-depth target analysis and research. Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. Develop innovative tradecraft, exploitation techniques, and concepts of operation. Leverage knowledge of AMOD and proficiency in AMOD tools. Work closely with … You're required to have this Clearance: Active TS/SCI with polygraph Degree Type: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Years of Experience by Level: Level … Bachelor's degree and 2 years of experience in computer or information systems design/development/analysis or related fields. 2 additional years of experience may be substituted if you have an associates degree. Level 2 - Bachelor's degree and 5 years of experience in computer or information systems design/development/analysis 2 additional years More ❯
Employment Type: Permanent
Salary: USD 220,000 Annual
Posted:

Exploitation Analyst 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

San Antonio, Texas, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Aurora, Colorado, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst 3 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Wahiawa, Hawaii, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for an Exploitation Analyst with experience in computer or information systems design, development, and analysis. You will apply a deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make … operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/development/analysis roles Experience engineering hardware and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Hampton, Virginia, United States
BlueHalo
read on for the details and apply to make the most of your career. You like to do this: Conduct in-depth target analysis and research. Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. Develop innovative tradecraft, exploitation techniques, and concepts of operation. Leverage knowledge of AMOD and proficiency in AMOD tools. Work closely with … You're required to have this: Clearance: Active TS/SCI with polygraph Degree Type: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Years of Experience by Degree: 10+ years … with Associates degree; 8+ years with Bachelors degree; 6+ years with Masters degree; 4+ years with Doctorate Degree. Relevant experience must be in computer or information systems design/development/analysis. Experience in AMOD and proficiency in AMOD tools required. Certifications: 18 semester hours of military training/coursework in networking, computer science, or cyber topics is More ❯
Employment Type: Permanent
Salary: USD 157,000 Annual
Posted:
Computer Security
25th Percentile
£24,460
Median
£25,640
75th Percentile
£26,820
90th Percentile
£45,910