Job Description. SALARY RANGE. $100,000 - $110,000/year. DUTIES. As a successful candidate for the Technology Vulnerability Analyst I you will identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms. . Required Skills. QUALIFICATIONS. A Bachelor’s Degree with 2 years of relevant experience or Associates degree with 4 years of relevant ...
Job Description. SALARY RANGE. $120,000 - $140,000/year. . Required Skills. QUALIFICATIONS. Bachelor's degree plus 5 years of relevant experience or a Master's degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. A high school diploma or GED plus 7 years of relevant experience, or an Associate's degree plus 7 years of relevant experience will be considered for those who have relevant military degree...
Job Description. SALARY RANGE. $115,000 - $125,000/year. DUTIES. As a successful candidate for the Data Scientist II role, you will devise strategies for extracting meaning and value from large datasets. Make and communicate principled conclusions from data using elements of mathematics, statistics, computer science, and application-specific knowledge. Through analytic modeling, statistical analysis, programming, and/or another appropriate scient...
Job Description. SALARY RANGE. $115,000 - $125,000/year. . Required Skills. QUALIFICATIONS. A Bachelor's degree plus 5 years of relevant experience, or a Master's degree plus 3 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. A high school diploma or GED plus 12 years of relevant experience, or an Associate's degree plus 7 years of relevant experience will be considered for those who have completed one of th...
Job Description. SALARY RANGE. $120,000 - $140,000/year. DUTIES. As a successful candidate for the Cryptologic Computer Scientist II role, you will design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target...