and support architectural decisions that promote data governance and regulatory standards. Promote system and human access to data through well-governed, secure, and scalable mechanisms. Design access controls and metadata strategies that support democratised data usage while safeguarding privacy and security. Champion cost-aware architectural strategies that optimise resource utilisation, striking an effective balance between performance and budget. Oversee platform … new data domains and analytical use cases. Ensure that all additions adhere to platform standards and contribute to the platform's maturity and strategic value. Advocate for excellence in metadata management, data quality, and access control. Foster a culture of continuous improvement and innovation across the technology teams and wider enterprise. Identify and support the reduction of our legacy technology More ❯
with engineering support) across multiple brands. Drive user segmentation and clustering to improve personalisation and subscription performance. Collaborate with editorial and product teams to help predict content relevance using metadata tagging. Work on user experience optimisation, such as improving content recommendations and personalisation strategies across web, CRM and app platforms. Partner with the analytics and engineering teams to define data More ❯
remote sensing phenomenologies (for example EO/IR/SAR) Knowledge of NSG tasking, collection, processing, exploitation and dissemination (TCPED) image chain Experience with product quality assessments, visual or metadata assessments More ❯
keywords and keyword sets. • Develop and manage organization-specific records repository datasets to include configuration of record type, retention schedule, user account, security group and location. • Develop organization-specific metadata and taxonomy for use in the records repository and SharePoint term store. Provide integration solutions between SharePoint and the records repository in order to seamlessly archive SharePoint-based content based More ❯
years' applicable experience with an associate degree, OR 15 years' applicable experience without a degree Relevant experience requires aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience requirements. More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
software house that is developing a highly complex network cyber security platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by in-house algorithms and allows customers to detect hackers, malware, data leakage and other malicious activity. As a Software Developer you will focus on enabling More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
software house that is developing a highly complex network cyber security platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by in-house algorithms and allows customers to detect hackers, malware, data leakage and other malicious activity. As a C++ Developer you will focus on enabling More ❯
API (Application Programing Interface) for data services and databases Designs, develops, builds, analyzes, evaluates, installs and administers database management systems to include database modeling and design, relational database architecture, metadata and repository creation and configuration management Designs and implements databases with respect to access methods, access time, batch processes, device allocation, validation checks, organization, ETL tasks, protection and security, documentation More ❯
remote sensing phenomenologies (for example EO/IR/SAR) Knowledge of NSG tasking, collection, processing, exploitation and dissemination (TCPED) image chain Experience with product quality assessments, visual or metadata assessments Security Clearance: Active TS/SCI Clearance and the willingness to sit for a CI polygraph, if needed IC-CAP provides equal employment opportunities (EEO) to all applicants for More ❯
create parsers for network protocols, develop fingerprints and signatures to identify suspicious and anomalous network activity, and deploy solutions to customer supported tools to automate and enable data and metadata analysis. Job responsibilities include, but are not limited to: Collaborate closely with customers to overlay network datasets through an existing architecture with the ABYSS product. Integrate parsers and signatures into More ❯
Development: Assist in developing key acquisition documents, including Statements of Work (SOWs), Requests for Proposal (RFPs), and cost estimates. Technical Expertise: Provide subject matter expertise on GEOINT data formats, metadata, classification, release requirements, and sensor phenomenology. Compliance & Governance: Advise on compliance with NGA and Intelligence Community (IC) enterprise standards, architectural concepts, and security guidelines. Stakeholder Coordination: Coordinate across various NGA More ❯
access and version control across stakeholder groups. Configures SharePoint to support task tracking, deliverable submission, data dashboards, and workflow automation aligned with Army National Guard G-2 requirements. Applies metadata and taxonomy best practices to structure knowledge repositories and streamline retrieval of program artifacts and status updates. Supports monthly and ad hoc reporting by developing content management dashboards for use More ❯
system activity to identify malicious activity • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on network traffic - Reconstruct a malicious attack More ❯
and education. Job Description: Responsible for analyzing target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected and computer network defense resources. Analyze metadata collected for communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from analysis. Categorize traffic as benign, suspicious, or malicious activity; and More ❯
years applicable experience with an associate degree, OR 15 years applicable experience without a degree Relevant experience requires aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience requirements. Benefits: Weeghman and Briggs is a company specializing More ❯
and end users to facilitate adoption of current and emerging Information Knowledge Management standards, guidance, and best practices • Performs advanced configuration of SharePoint sites, pages, lists, document libraries, and metadata • Enhances existing applications, where possible, to automate business processes • Captures process and technology gaps and identifies Out-of-the-Box and/or custom SharePoint solutions to satisfy user needs More ❯
and end users to facilitate adoption of current and emerging Information Knowledge Management standards, guidance, and best practices • Performs advanced configuration of SharePoint sites, pages, lists, document libraries, and metadata • Enhances existing applications, where possible, to automate business processes • Captures process and technology gaps and identifies Out-of-the-Box and/or custom SharePoint solutions to satisfy user needs More ❯
and end users to facilitate adoption of current and emerging Information Knowledge Management standards, guidance, and best practices • Performs advanced configuration of SharePoint sites, pages, lists, document libraries, and metadata • Enhances existing applications, where possible, to automate business processes • Captures process and technology gaps and identifies Out-of-the-Box and/or custom SharePoint solutions to satisfy user needs More ❯
create parsers for network protocols, develop fingerprints and signatures to identify suspicious and anomalous network activity, and deploy solutions to customer supported tools to automate and enable data and metadata analysis. Responsibilities: Collaborate closely with customers to overlay network datasets through an existing architecture. Develop parsing and processing of network protocols to populate customer data repositories. Prototype and develop analytic More ❯
be a US Citizen Active TS/SCI clearance/polygraph required Minimum six (6) years of experience in one or more of the following areas Signals Analysis SIGINT Metadata Analysis SIGINT Target Development Cyber/Network Threat Analysis Cyber Planning Target Digital Network Analysis Digital Network Intelligence Analysis Digital Network Exploitation Analysis Malware Analysis Conducting Network Vulnerability Assessments Familiar More ❯
system activity to identify malicious activity Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information Identify and analyze anomalies in network traffic using metadata Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools Identify applications and operating systems of a network device based on network traffic Reconstruct a malicious attack More ❯
the Security Control Assessment (SCA) team to achieve ATO (Authorization to Operate) Perform application security testing on mission critical IC systems Identify and analyze anomalies in network traffic using metadata Ability to reconstruct a malicious attack or activity based on network traffic Assess network topology and device configurations identifying critical security concerns Perform network monitoring, network mapping, vulnerability scanning, and More ❯
on them to determine how targets communicate, move, operate, and live. Applies geospatial analysis techniques against network packet information, computer OS system data, executable file data, host data, and metadata collected from tasked communication system to identify anomalies, locate and track targets, and to accurately report the intelligence gained from the analysis to characterize anomalies on USG networks. Qualifications: - Minimum More ❯
meets the timelines dictated by the management authority for the intended operational environment. Maintain baseline system security according to organizational policies. Identify and analyze anomalies in network traffic using metadata Isolate and remove malware. Identify applications and operating systems of a network device based on network traffic. REQUIRED SKILLS/YEARS OF EXPERIENCE Minimum of 5 years of experience in More ❯