- UpvoteDownvoteShare Job
- Suggest Revision
This TTO provides normalization of cyber security data and automation of threat intelligence. The services enable the Data Transformation, Malware Analysis, and Cyber Threat Intelligence processing and sharing capabilities for the customer, fulfilling mission objectives and offering actionable information to detect and mitigate cyber threats.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
We combine best of breed engineering practices, subject matter expertise, design services, computer science, and data analytics with innovative approaches in artificial intelligence and machine learning, AR/VR, R&D, and physics-based modeling and simulation providing tailored solutions addressing our customer’s unique threat requirements.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KMI is a Minority Business Enterprise (MBE) and Small Disadvantage Business (SDB) that specializes in Logistics, Warehouse Services, Distance Learning\/Training, Enterprise Solutions, Financial Management Support, Program Management, Intelligence Analysis & Threat Assessment, and Data Analytics\/Operations Research.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Examine how to best integrate and use new and emerging threat intelligence and knowledge management software and systems; use existing architecture to provide rapid identification and fusion of existing threat data to identify vulnerabilities; use resident mis- or non-attributable systems cover accounts, exploitation and forensic database tools and repository data systems.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience conducting meta-data analysis exploitation is typically found in analysts who have experience supporting operational units and require a foundational understanding of using open-source intelligence software tools.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Mastery knowledge of enterprise Architecture, software/hardware/network management and lifecycles, cybersecurity, IA, LE/CI principles, policies, products, and services, data sources, and threat assessment tools, techniques, and methodologies enabling technical and operational solutions to assess risk factors.
Part-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Incumbents complete a wide range of possible tasking, to include model based systems engineering, threat weapon system study and analysis, system and software architecture development, software development, database design, system development, system and software evaluation, intelligence data sensor engineering, countermeasures development, Radio Frequency (RF) system design and measurement, and others.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Willbrook Solutions is seeking a mid-level Modeling & Simulation Engineer/Analyst to support the Defense Intelligence Agency (DIA) and perform intelligence data evaluation, analysis, and design for advanced conventional weapon systems.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The team member shall provide cybersecurity data analysis services, which designs, develops, builds, tests, configures, employs, operates, integrates, sustains, and refreshes the Security Information Events Management (SIEM) capability (i.e. Enterprise Audit), long-term analytics platform, log aggregation platform, and the cyber threat intelligence capability, signature development and deployment, and reputation management services.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
With the largest contingent of contracted Red Team operators in the DoD, we provide an unmatched level of threat intelligence and battle-tested experience for customers in both the DoD and federal civilian markets.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Other task may include creating the Defense Intelligence Agency Threat Assessment, (DIA TAC) request and submitting to proper authority etc. We support the ever-evolving areas of advanced communication technologies, cyber, systems and software engineering, digital transformation, and enterprise data management.
Full-timeExpandApply NowActive JobUpdated 1 month ago
FEATURED BLOG POSTS
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.Â
10 Best Tips to Find a Job When Relocating
Are you planning to move? That’s great news, but now you might wonder what that means for your job. Some people are lucky – they can relocate and keep working the same position as always, just remotely. For others, however, this isn’t an option. They must search for and land a job in their soon-to-be new city. This can be intimidating, given that getting a new job even under normal circumstances can be challenging. Now you’ll have to overcome additional hurdles. This article provides valuable tips on how to find a job in another state. Because it can be done! Read on to learn how.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.
Looking for New Candidates?
Before the turn of the century, recruiters could put their "help wanted" ads in the newspaper, and applications would pour in. Since then, recruiting has turned a new page. The use of the internet and other technologies allows recruiters to broaden their candidate pool for the simple reason being