1 to 8 of 8
Sort by: Date | Relevance
450 / 451/ 452 Grads Tools DVT, WVT, PKTSWING Ability to dig into massive sets of hexdump and pick out repeatable sets of data that could be forms of communication hiding in the signal. The Level 3 Protocol Analyst shall possess the following capabilities The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstre
Posted 1 day ago
Responsible for analyzing target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected and computer network defense resources. Analyze metadata collected for communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from analysis. Categorize traf
Posted 4 days ago
Utilize experience in signals analysis and understanding of Machine to Machine (M2M) communication and technologies to support mission operations. Previous experience with military exercises is preferred and have strong written/verbal communication skills, as well as experience in writing reports and technical evaluations. The Level 2 Technology Vulnerability Analyst shal
Posted 4 days ago
Utilize expe rience in signals analysis and understanding of Machine to Machine (M2M) communication and technologies to support mission operations. Previous experience with military exercises is preferred and have strong written/verbal communication skills , as well as experience in writing reports and technical evaluations. The Cryptologic Cyber Planner shall possess the
Posted 8 days ago
Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target systems, knowledge discovery of passive and active systems, or other cr
Posted 22 days ago
Prepare synthesized product for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to mission requirements. Prioritize, assess, evaluate and report information obtained from various sources for use or decision by Government personnel. Maintain awareness of internal and external customer needs. Collaborate with c
Posted 24 days ago
Evaluate operational or developmental networks and systems for weaknesses and susceptibility to network attack, advise customers on countermeasures including configuration of commercial products or hardware or software additions, produce evaluation reports and brief customers on results. The Level 2 Network Engineer shall possess the following capabilities Possess a base
Posted 26 days ago
T he Cyber Defense Analyst 2 uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports events that occur in order to protect data, information systems, and infrastructure. Finds trends, patterns, or anomaly correlations utilizing security relevant data. Recommends pr
Posted 26 days ago
Email this Job to Yourself or a Friend
Indicates required fields