46 to 60 of 231
Strong sigdev background with good command of the sigint system . Ability to script and automate analytical workflows using python, jupyter , GM, etc. Translate practical mission needs and analytic quesitons into technical requirements and asist in fulfilling those requirements. The Level 3 Cryptologic Computer Scientist shall possess the following capabilities The Crypto
Posted 9 days ago
Utilize expe rience in signals analysis and understanding of Machine to Machine (M2M) communication and technologies to support mission operations. Previous experience with military exercises is preferred and have strong written/verbal communication skills , as well as experience in writing reports and technical evaluations. The Cryptologic Cyber Planner shall possess the
Posted 9 days ago
Conducts analysis of collection and open source data ensuring continuity of targets and their activities. Analyzes DNI and DNR information for reportable intelligence used to build target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and increasing target knowledge through advanced analytic 100 technique
Posted 9 days ago
Analyzes user's requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integrat
Posted 9 days ago
Conducts analysis of collection and open source data ensuring continuity of targets and their activities. Analyzes DNI and DNR information for reportable intelligence used to build target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and increasing target knowledge through advanced analytic 100 technique
Posted 9 days ago
Conducts analysis of collection and open source data ensuring continuity of targets and their activities. Analyzes DNI and DNR information for reportable intelligence used to build target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and increasing target knowledge through advanced analytic techniques. I
Posted 9 days ago
Conducts analysis of collection and open source data ensuring continuity of targets and their activities. Analyzes DNI and DNR information for reportable intelligence used to build target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and increasing target knowledge through advanced analytic techniques. I
Posted 9 days ago
Evaluate tar get s using collection and open source data to better understand and amp out targeted networks enabling Computer Network Operations . Assist planning of further exploitation opportunities and operational plans . Use DNR tools and information to build target profiles, maintain appropriate databases , and perform sustained target network analysis . Identify int
Posted 9 days ago
Evaluate tar get s using collection and open source data to better understand and amp out targeted networks enabling Computer Network Operations . Assist planning of further exploitation opportunities and operational plans . Use DNR tools and information to build target profiles, maintain appropriate databases , and perform sustained target network analysis . Identify int
Posted 9 days ago
HTS (iNovex) was built on the principle that people matter first and foremost.We believe in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth.We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to w
Posted 9 days ago
Support the identification of vulnerabilities of and attacks against specific system s. Analyze attack techniques and develop countermeasures. Produce formal and informal reports, and briefings relating to system vulnerability analysis. The Level 2 System Vulnerability Analyst shall possess the following capabilities Analyze existing architecture and recommend policies an
Posted 10 days ago
We are seeking a Data Scientist proficient in Python and experienced in automating workflows, data manipulation, and visualization using Jupyter Notebooks. This role involves leveraging Python expertise to streamline processes and create insightful visualizations for data driven decision making. The Level 3 Data Scientist shall possess the following capabilities Foundatio
Posted 10 days ago
Uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports events that occur to protect data, information systems, and infrastructure. Finds trends, patterns, or anomaly correlations utilizing security relevant data. Recommends proactive security measures. Conducts an
Posted 10 days ago
Data science is a multi disciplinary field that uses elements of mathematics, statistics, computer science, and application specific knowledge to gather, make, and communicate principled conclusions from data. Data Scientists tackle challenging real world problems leveraging big data, high performance computing, machine learning, and a breadth of other methodologies. We a
Posted 10 days ago
The ideal candidate will have a FORNSAT background and experience with and troubleshooting RF signals. The Level 2 Software Engineer shall possess the following capabilities Analyze user requirements to derive software design and performance requirements Debug existing software and correct defects Provide recommendations for improving documentation and software developmen
Posted 10 days ago
Email this Job to Yourself or a Friend
Indicates required fields