procurement. Specific Focus: Analysis of worldwide threats/countries/issues affecting NGA supply chain risk equities. Skills and Experience: Required: At least 5 years relevant experience with Debriefings, Open-Source Exploitation, Digital Media Exploitation, Collection Requirements. At least 5 years' experience with Intelligence Analysis and Production: Creating Analytical products, Intelligence Information Reports, Source-Directed Requirements, Threat More ❯
GridIron IT is seeking a All Source Threat Analyst local to Chantilly, VA. Active TopSecret Clearance required! Must be able to obtain SCI CI Polygraph Conduct research and analysis at the operational or strategic level of the scale of analysis and, as appropriate, communicate analytic assessments in operational? or strategic?level analytic intelligence products and through oral briefings. Build … and maintain subject matter expertise in their assigned substantive or functional area. Review source reporting and raw intelligence to determine its value, significance, and relevance. Develop objective analytic assessments, when appropriate, by using logical argumentation based on intelligence information. Apply analytic integrity and tradecraft standards, including Office of the Director of National Intelligence (ODNI) Intelligence Community (IC) analytic standards … on?boarding. Successfully complete FBI's Understanding Technical Collection and Exploitation (INTEL 1315) course via FBI's Virtual Academy within three months of on?boarding. Successfully complete FBI's OpenSource Action Group's (OSAG) On Demand training courses and the FBI's Privacy and Civil Liberties legal training, required to obtain Aperture Social Media Tools Access within More ❯
a Level 2 Information Systems Security (ISS) position that is staffed in the Security Operations Control Center (SOCC). Essential Functions: • Responsible for cybersecurity threat intelligence data collection via open intelligence sources. • Organizes, documents, and collaborates discovered intelligence via information sharing platform. • Research threat actors, malware, attack vectors, and other threat information, collects indicators of compromise, documents and advises … management on prevention and remediation strategies. • Continually evaluates accuracy of opensource threat intelligence and evolves intelligence collection strategies as sources deteriorate or conflict. • Maintains and updates past intelligence with new information is provided. • Produces well-written reports outlining current industry threats, findings on managed network, and best practices following detected threats. • Collaborates with other teams to locate More ❯
GridIron IT is seeking a All Source Threat Analyst local to Chantilly, VA. Active Top Secret Clearance required! Must be able to obtain SCI CI Polygraph Conduct research and analysis at the operational or strategic level of the scale of analysis and, as appropriate, communicate analytic assessments in operational? or strategic-level analytic intelligence products and through oral briefings. … Build and maintain subject matter expertise in their assigned substantive or functional area. Review source reporting and raw intelligence to determine its value, significance, and relevance. Develop objective analytic assessments, when appropriate, by using logical argumentation based on intelligence information. Apply analytic integrity and tradecraft standards, including Office of the Director of National Intelligence (ODNI) Intelligence Community (IC) analytic … on?boarding. Successfully complete FBI's Understanding Technical Collection and Exploitation (INTEL 1315) course via FBI's Virtual Academy within three months of on?boarding. Successfully complete FBI's OpenSource Action Group's (OSAG) On Demand training courses and the FBI's Privacy and Civil Liberties legal training, required to obtain Aperture Social Media Tools Access within More ❯
Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration … due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat (s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in … day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused all source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat (s) to NGA to inform security decisions. Produce relevant input to the CI Cyber More ❯
software design methodologies appropriate to the development environment Provides specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of OpenSource Software (OSS) and/or Commercial Off-The-Shelf (COTS)/Government Off-The- Shelf (GOTS) software in place of new development, and requirements analysis and synthesis More ❯
Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Draper UT Salary: 190K-230K Background Conducting advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information Maintaining appropriate databases for targeting More ❯
software design methodologies appropriate to the development environment. Provides specific input to the software components of system design to include hardware/software trade-offs, software reuse, use of OpenSource Software (OSS) and/or Commercial Off-The-Shelf (COTS)/Government Off-The- Shelf (GOTS) software in place of new development, and requirements analysis and synthesis More ❯
Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information Maintain appropriate databases for targeting, tasking, and analysis Identify intelligence gaps to tailor current collection or enable new collection to close the gaps Employ multiple analysis disciplines such More ❯
and assess incoming information, reports, collection strategies, and plans. Create and deliver technical documentation, summaries, and presentations. Navigate Microsoft Office Suite and web-based applications effectively. Conduct classified and open-source research to identify, organize, and present relevant information. Apply critical thinking and sound judgment to analyze and interpret data and program needs. Ensure all products and reports More ❯
requirements and missions. Prioritize, assess, evaluate, and report information obtained from passive and active collection, network evaluation and analysis, and from related collateral sources (for example IMINT, MASINT, HUMINT, opensource and others as needed) for use or decision by the customer. Maintain awareness of internal and external customer needs. Collaborate with collectors and analysts to refine collection More ❯
approach to defending against evolving cyber threats. Key Responsibilities • Monitoring & Analysis: Continuously monitor computer networks, investigate security breaches, and analyze threat activity. • Threat Intelligence: Collect and evaluate data from open-source intelligence, dark web monitoring, and internal systems. • Incident Response: Support cyber defense activities, contributing to investigations and real-time response efforts. • Reporting & Documentation: Prepare detailed reports, advisories More ❯
approach to defending against evolving cyber threats. Key Responsibilities Monitoring & Analysis: Continuously monitor computer networks, investigate security breaches, and analyze threat activity. Threat Intelligence: Collect and evaluate data from open-source intelligence, dark web monitoring, and internal systems. Incident Response: Support cyber defense activities, contributing to investigations and real-time response efforts. Reporting & Documentation: Prepare detailed reports, advisories More ❯
deploying robotics systems in real-world settings Desirable: Experience leading perception for robotic manipulation platforms Multi-modal perception knowledge (vision + depth + tactile) Track record of academic publications Open-source contributions Benefits Competitive salary + equity options Comprehensive health & dental cover Opportunities for conferences and development Excellent on-site facilities Join a deeply technical, collaborative team working More ❯
Palo Alto switches, routers, and firewalls Experience in troubleshooting and restoring network and system outages Experience with SDN Technologies and vendors, including SD-WAN, NSX-T, Cisco, Juniper, and open-source solutions Experience in engineering and administering WAN solutions. Experience in Quality of Service (QoS) technology engineering. Experience with MS Visio software. Certifications: AIT Level II Security Certification More ❯
solutions to protect national interests. The work includes intelligence analysis, advanced data management, and the development of next-generation cybersecurity capabilities. Position Responsibilities: Conduct advanced analysis of collection and open-source data to generate insights and leads. Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information. Maintain appropriate databases for targeting More ❯
solutions to protect national interests. The work includes intelligence analysis, advanced data management, and the development of next-generation cybersecurity capabilities. Position Responsibilities: Conduct advanced analysis of collection and open-source data to generate insights and leads Ensure target continuity, profile targets and their activities, and develop techniques to gain additional target information Maintain appropriate databases for targeting More ❯
Digital Network Analyst (TDNA)to join a growing team in multiple location such as Annapolis Junction, MD and Salt Lake City, UT. Responsibilities: Conduct advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities. Sound understanding of the principles and methods of exploiting communications and communication systems to identify, collect More ❯
s IT infrastructure, positioning us at the forefront of a rapidly evolving technology landscape. We're a team of experts experimenting, discovering new ways to harness the power of open-source solutions, and embracing enterprise agile methodology. We encourage professional development to ensure you bring innovative ideas to our products while satisfying your own intellectual curiosity. Our Application More ❯
Cambridge, Cambridgeshire, England, United Kingdom
Hays Specialist Recruitment Limited
sources. Exceptional attention to detail in managing complex tasks. Preferred Qualifications Bachelor's degree in a relevant field. Demonstrated experience in task execution and project coordination. Ability to leverage open-source resources for research. Adaptability to fast-paced, evolving environments. Experience managing cross-functional stakeholder relationships. Advanced proficiency in Microsoft Office Suite and common business tool Alongside a More ❯
knowledge of REST APIs and HTTP • Bonus: native Android (Kotlin) or iOS (Swift) skills Bonus Points • Jenkins, Firebase Test Lab, or E2E tooling • Backend/API exposure • Community or opensource contributions • Mentoring, blogging, or dev advocacy About hedgehog lab hedgehog lab is a digital product consultancy with 20 years of experience. Based in Northern England, we help More ❯
learning models including large generative models for language, vision and other modalities . Experience writing C Triton/CUDA kernels for performance optimisation of ML models. Have contributed to open-source projects or published research papers in relevant fields. Knowledge of cloud computing platforms. Keen to present, publish and deliver talks in the AI community. Benefits In addition More ❯
Oracle, Microsoft SQL Server, MySQL, Amazon RDS, and PostgreSQL databases. Perform server and device network setup and troubleshooting in a large enterprise environment. Perform setup, administration, and maintenance of open-source technologies. Perform changes as required and respond to outage resolution requests promptly. Provide support to the IT Vendor Manager to perform asset management activities. Manage Amazon Web More ❯
to develop mission models. Demonstrated experience with UPDM or UAF meta-model frameworks is desired. • Define and demonstrate the appropriate data standards, data structures, and supporting COTS, GOTS, and Open-Source technologies required to manage the data needs • Integrate enterprise tools and develop MBSE-based processes to support requirements engineering, the customer's ERB process, CONOPS and architecture More ❯
application development. Experience with Java or Kotlin. Preferred qualifications Experience with Android or other mobile platforms such as Compose, Canvas, Wakelocks, Broadcast Receivers, Intents or similar technologies. Experience with OpenSource software development. Experience using AI, either for coding or building user experiences. Knowledge of 2D and 3D graphics technologies, such as Skia, OpenGL and font rendering. About More ❯