Because You Deserve More Than Just a Job As a Digital Network Exploitation Analyst, you will: evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. analyze SIGINT and cybersecurity data at multiple levels up … and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network. be involved in developing new tradecraft needed to perform this analysis as technologies evolve. be part … e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information More ❯
Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network defenses and protect against attacks on … network infrastructure devices or systems. Knowledge may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Advance your career as you develop increasing expertise … in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise. Apply your innate curiosity and analytical talent to More ❯
Russian Language proficiency preferred Experience conducting NetDev/Supply Chain analysis, developing networks and charts reflecting activities of interest Experience delivering All-Source and Network development analysis Ability to query relevant high side databases Working knowledge of Analyst Notebook Language proficiency in Russian, Chinese, Korean, or Arabic is More ❯
Weeghman & Briggs is seeking Target Digital Network Analysts of multiple levels. Join our growing team and support an important mission within the Federal Government. Location: Annapolis Junction, Alaska (TDNA3), Hawaii (TDNA 2) Clearance Required: TS/SCI w/Polygraph As a TDNA, your responsibilities will include: Conduct advanced … gaps to tailor current collection or enable new collection to close the gaps Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Apply your knowledge and understanding of IC needs and missions Be part of a team, working together with government, military … experience with an associate degree, OR 15 years applicable experience without a degree Relevant experience requires aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience More ❯
Tired of just being a number and ready to join a company dedicated to furthering your growth within the intelligence community? LEAD Endeavors is seeking proactive technical professionals who are searching for increased job satisfaction and career advancement opportunities with More ❯
Analyzes network characteristics (e.g., traffic, connect time, transmission speeds, packet sizes and throughput) and recommends procurement, removals and modifications to network components. Designs and optimizes network topologies and site configurations. Plans installations, transitions and cut-overs of network components and capabilities. Coordinates requirements with users and More ❯
SolarWinds platform to ensure stability, security, and optimal performance * Custom widgets, NOC dashboards, and performance monitoring * Proven ability to optimise and manage SolarWinds for network visibility and troubleshooting General requirements: * Requirements will need to be delivered on site, outside of standard working hours by resources with direct hands-on More ❯
gaps to tailor current collection or enable new collection to close the gaps Employ multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Apply your knowledge and understanding of IC needs and missions Be part of a team, working together with government, military … experience with an associate degree, OR 15 years' applicable experience without a degree Relevant experience requires aspects of Intelligence Analysis (e.g., target development, social network analysis, metadata analysis, knowledge of customer tool sets and databases). In some cases, foreign language proficiency may also be used to satisfy experience More ❯
KBC Group is uitgegroeid tot een internationale organisatie met een sterke digitale strategie. De infrastructuur die dat mogelijk maakt, wordt beheerd door Group Data Centers. We beheren de vier belangrijkste datacenters van KBC Group, die gevestigd zijn in België en More ❯
IT Systems Administrator/End User Support - Full time permanent role - Based in Twickenham, South West London - Salary up to £50,000 plus benefits A large and leading organisation in the South West London area is looking for an IT More ❯
Twickenham, Hampton, Greater London, United Kingdom
Ashdown Group
IT Systems Administrator/End User Support - Full time permanent role - Based in Twickenham, South West London - Salary up to £50,000 plus benefits A large and leading organisation in the South West London area is looking for an IT More ❯
Job Description: Essential Job Functions: Work directly for the customer in whatever Network or Voice requirement is needed at the time. Support Cisco networking hardware. Participate in the implementation of new or refreshed networks More ❯
Job Duties Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Required Skills: US … of relevant experience and eighteen (18) semester hours of military coursework/training in networking, computer science, or cyber topics Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information … Assurance, or Computer Security) Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or system engineering. Must have experience in network or system administration Compensation Range: $73,981.55 More ❯
transformation journey working with the best minds in the energy and utilities domain at Cognizant. Job Summary: We are looking for an experienced Business Analyst with GIS expertise, specifically in Esri's Utility Network Model (UNM), to join our team. The ideal candidate will have a strong background … implementation of Esri's UNM for utility networks. Key Responsibilities: Work with stakeholders to gather business requirements related to GIS and Esri's Utility Network Model. Analyze existing GIS workflows and propose improvements for efficiency, accuracy, and scalability. Support the migration and implementation of Esri UNM, ensuring smooth integration … with existing systems. Collaborate with IT and GIS teams to define data models, schema configurations, and network rules within Esri UNM. Document business and functional requirements, process flows, and system interactions. Assist in testing, validation, and troubleshooting of GIS applications, ensuring alignment with business needs. Provide training and support More ❯
Thomas & Herbert Consulting LLC (T&H), a high performing IT and Intelligence consulting firm, is seeking network infrastructure professionals for a long-term contract with the Maryland Procurement Office (MPO). This project is scheduled to start in the July 2025 timeframe. We are seeking a large number of More ❯
and cloud-based technology, we deliver sustainable products and services for the future. The Opportunity We have an exciting opportunity for a highly skilled Network Infrastructure - Technical Lead to join our small, talented, and growing team to collaborate and problem-solve complex technical challenges relating to the delivery of … technology enhanced learning approaches across health and social care. Do you want to play a key role in ensuring the organisation's digital network and communications infrastructure is fit for the purpose of delivery of digital products and services, essential for hosting our health and care digital systems? Do … you want to help improve the technical security and monitoring of our digital network infrastructure while maintaining optimal performance? Do you enjoy working in a multi-disciplinary team at the edge of technological innovations Do you want to play a key role in discovering, evaluating, and implementing suitable established More ❯
and cloud-based technology, we deliver sustainable products and services for the future. The Opportunity We have an exciting opportunity for a highly skilled Network Infrastructure - Technical Lead to join our small, talented, and growing team to collaborate and problem-solve complex technical challenges relating to the delivery of … technology enhanced learning approaches across health and social care. Do you want to play a key role in ensuring the organisation's digital network and communications infrastructure is fit for the purpose of delivery of digital products and services, essential for hosting our health and care digital systems? Do … you want to help improve the technical security and monitoring of our digital network infrastructure while maintaining optimal performance? Do you enjoy working in a multi-disciplinary team at the edge of technological innovations Do you want to play a key role in discovering, evaluating, and implementing suitable established More ❯
Job Number: R Cyber Network Exploitation and CNO Analyst Key Role : Process and analyze cyber threat intelligence data and compile standard and ad-hoc reports as needed. Leverage expertise of cyber data and information, analyze and identify data requirements, and use spe cia lized tools and services to … Develop innovative solutions to complex problems. Work without consider able direction, and mentor and supervise team members. Basic Qualifications : 4+ years of experience with network exploitation and signals intelligence ( SIGINT ) analysis 4+ years of experience with offensive cyber operations, processes, and capabilities 4+ years of experience with processes and More ❯
Role: Security Analyst - remote Location: London Salary: £40,000 Are you an experienced security analyst looking for your next opportunity in the security industry? If so, this so this is the perfect opportunity for you! I am working with a leading security service provider who are looking for … a Security analyst to join their growing and dedicated team in providing some the UKs largest organisations with a range of services such as, pen testing, major incident response, digital forensics, and more. This is a great opportunity for an individual to further their security career in a focused More ❯
networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic … e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information … or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in More ❯
the impact of your analysis indirectly on the battlefield and through strategic decisions made by our leaders throughout the Intelligence Community. Responsibilities: All-Source Analyst - Conducts analysis using intelligence and information from multiple sources to assess, interpret, forecast, and explain a range of national security issues and developments that … nature. Provides all-source analytic support to collections, operations, investigations, and other defense intelligence analytic requirements. Provides all-source analysis with a focus on network analysis to enable CWMD, counter proliferation, counter-improvised threats, CWMD mission support, CWMD capabilities support, CWMD partner support, and nuclear enterprise defense. Provides innovative More ❯
experience must be in computer or information systems design/development. Experience may also include hardware and/or software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or system engineering. Compensation Range: $69,396.84 - $152,673.05 _ Compensation ranges encompass a More ❯
experience must be in computer or information systems design/development. Experience may also include hardware and/or software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or system engineering. Compensation Range: $81,583.84 - $179,484.45 _ Compensation ranges encompass a More ❯
experience must be in computer or information systems design/development. Experience may also include hardware and/or software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or system engineering. Compensation Range: $101,601.12 - $223,522.46 _ Compensation ranges encompass a More ❯
and experience with Bank Secrecy Act reporting mechanisms such as Suspicious Activity Reports (SAR). Proficiency with intelligence tools such as Palantir, Google Earth, Analyst Notebook, TAC, DataXplorer, Voltron Suite. Strong understanding of interagency processes, intelligence oversight, and analytical methodologies. Skilled in Microsoft Office and data exploitation tools. Preferred More ❯