Mobile Computer Network Exploitation Analyst with Security Clearance Information Technology (IT) - Severn, MD at Geebo

Mobile Computer Network Exploitation Analyst with Security Clearance

Description Active Top Secret (TS/SCI) clearance with polygraph required As a Mobile Computer Network Exploitation Analyst within Foundational Services, you will combine analytic and technical expertise to facilitate the exploitation of digital networksYou will work closely with the customer, operators, users, analysts, software engineers, and other technical experts to develop solutions that automate and improve mission success and operational securityYou will gain experience with Jupyter Notebooks, Python scripting, and other proprietary technologiesFor over 12 years, Visionist has been solving the Intelligence Community's toughest software and analysis challengesWe are an employee- owned small business, meaning our employees see the benefit of their contributions and have a stake in our overall successIf you'd like to join a collaborative group supporting mission critical tasking in a cleared environment, then Visionist is the place for youLearn more about us at www.
visionistinc.
com----- 5 Benefits We Know You Will Love! - Grow with career progression opportunities and personalized road maps - Supported and company paid upskilling through continued education, training, conferences, and lunch & learns - 32 days off per year (4 weeks PTO
12 holidays) and flexible work hours - Competitive pay including an annual raise AND end of year bonus - Fun and frequent employee events and family gatherings like lunches, happy hours, cooking contests, D&D club, and much more!
Responsibilities:
- Provide mobile subject matter expertise to all parts of the organization - Identify and provide technical assistance to bespoke related problems - Work closely with operators and partners to identify new opportunities for automating mobile operations - Adapt to new information, changing conditions, and unexpected obstacles Requirements:
- Bachelor's degree in a technical discipline(Additional 4 years of experience may substitute degree) - 8 years of experience in exploitation analysis - Experience in mobile forensics - Deep knowledge of the concepts, principles, and methods for network connectivity (e.
g.
, TCP/IP, DNS, SSL, etc.
) - Knowledge of iOS and / or Android internals, as well as knowledge of mobile computer security principles, vulnerability analysis, and exploitation methods ----- Not a good fit? To see other opportunities we have available go to:
https:
//jobs.
jobvite.
com/visionist Next steps:
Apply online and one of our recruiters will reach out to youWe have a streamlined process of phone screen with a recruiter, interview with a Visionist team at our HQ in Columbia, MD, and that is all! Interested in learning more about Visionist and the work we do? Check out our website! https:
//www.
visionistinc.
com/what-we-do ----- U.
S citizenship required (green card holders and permanent residents are not eligible)Applicants selected will be required to obtain / maintain a government security clearanceVisionist, Incis an Equal Opportunity / Affirmative Action / Protected Veterans / Individuals with Disabilities employer.
Recommended Skills Analytical Automation Cooking Dns Forensic Sciences Jupyter Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3r3wd729trps2r3cz8', 'ExternalApply-j3r3wd729trps2r3cz8'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.