PROTOCOL ANALYSIS AND CYBER jobs in MARYLAND, United Kingdom

Job Posting: Protocol Analysis and Cyber Discovery Technique Developer (SATD2) You Might Also Have: Knowledge... processing. You have an understanding of signals and protocol analysis techniques, and can apply this to discovery activities...

InterImage

and update files on signal characteristics in SIGINT-relevant databases. Perform computer protocol analysis and session... shall conduct protocol analysis: Understand interdependencies and relationships of protocol layers (e.g., OSI model...

The Kenjya-Trusant Group

and update files on signal characteristics in SIGINT-relevant databases. Perform computer protocol analysis and session... shall conduct protocol analysis: Understand interdependencies and relationships of protocol layers (e.g., OSI model...

The Kenjya-Trusant Group

Network Packet Protocol (TCP/IP) & Network Analysis Tools Experience with Analysis of Binaries, assembly, and source code in... and a finalist in 2021! Belay Technologies is seeking a Cyber Operator/Developer/Analyst to join our intel team. The selected...

Belay Technologies

and a finalist in 2021! Belay Technologies is seeking a Senior Cyber Operator/Developer/Analyst to join our intel team... Experience: Exploitation of Commercial Network Infrastructure; Cyber Operations; Enterprise Computer and Telecommunication...

Belay Technologies

, multiplexing, forward error correction, and randomization Demonstrated Protocol Analysis experience to include bit-level analysis... coding experience Experience in detailied protocol analysis Basic Communications Signals Collection and Processing Course...

Lockheed Martin

Information Assurance Administrator / Cyber Security Job Category: Information Technology Time Type: Full time... and Interconnection Security Agreements, Risk Analysis, and IA documentation. Mitigation of vulnerabilities and maintaining IAVA...

CACI International

Protocol Analysis experience to include bit-level analysis and payload identification and analysis Demonstrated experience... Scripting experience such as Bash, Shell, etc. and/or Python coding experience Experience in detailied protocol analysis Basic...

Lockheed Martin

The Leidos Defense Group has an opening for a Cyber Security Fusion Analyst on the DISA GSM-O II program supporting... Joint Force Headquarters DODIN at Fort Meade. Position Summary: GSM-O II provides network operations and cyber defense...

Leidos

will include cyber tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated...) Network Protocol Analysis (Wireshark, Tcpdump) Emulator/Virtualization Technologies (VMWare, QEMU) Operating System...

MIT Lincoln Laboratory

will include cyber tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated...) Network Protocol Analysis (Wireshark, Tcpdump) Emulator/Virtualization Technologies (VMWare, QEMU) Operating System...

MIT Lincoln Laboratory

Information Security Risk Specialist The Opportunity: Cyber threats are everywhere, and the constantly evolving... nature of these threats can make understanding them seem overwhelming to the Department of Defense. In all of this “cyber...

Booz Allen Hamilton

Information Security Risk Specialist, Senior The Opportunity: Cyber threats are everywhere, and the constantly... evolving nature of these threats can make understanding them seem overwhelming to the DoD. In all of this “cyber noise...

Booz Allen Hamilton

expertise, and a broad knowledge of Defense Cyber Operations (DCO) to support the MARFORCYBER position..., and Transmission Control Protocol/Internet Protocol (TCP/IP) networking protocols. Requirements Conditions of Employment...

Federal government of the United States

proficiency in the use of Network construction, topology, and Transmission Control Protocol/Internet Protocol (TCP/IP) networking..., and maintain a government credit card for travel and travel-related purchases. This position has been designated as a Cyber...

Federal government of the United States

. Direct experience with providing expert support, analysis and research in Intelligence Community (IC) and DoD Risk Management... functions. Fully understand DISA Port Protocol, and Services Management (PPSM) requirement and able to obtain PPSM account...

Paragone Solutions, Inc.

; performing cyber threat emulation; assessing intelligence; assessing malware analysis. (2) Evaluating, defining, designing... expertise, and a broad knowledge of Defense Cyber Operations (DCO) to support the MARFORCYBER position...

Federal government of the United States