Brooklyn, NY
... Drafted SAR narratives related to suspicious fraudulent activity such as Check Kiting, ACH Fraud, Elder Financial Exploitation, Romance Scams and Identity Theft Listened to suspicious callers who contacted the client's customer service with the ...
- Jan 01
Elkridge, MD
... Active TS/SCI with Full Scope Polygraph (Adjudicated July 16, 2021) SUMMARY CNO/SIGINT Analyst with 9+ years of experience conducting and teaching complex computer network exploitation, vulnerability analysis, and digital network operations. ...
- 2025 Dec 28
Cullman, AL
... Advising Web 2 and Web3 Projects •Programming & Scripting: Python, Perl, Golang, C#, Visual Basic •Penetration Testing & Exploitation: Metasploit, Cobalt Strike, Empire, PowerSploit, MimiKatz, Fuzzers, Debuggers, Ghidra, Olly •Enterprise Solutions: ...
- 2025 Dec 25
Kapolei, HI, 96707
... • Exploitation IT & Support • Help desk Tier 1/ Tier 2 • Troubleshooting EXPERIENCE EDUCATION Bachelor of Science at the University of Maryland Global Campus, 3.7 GPA, Graduation March 2026 LEADERSHIP • Deacon at Ignite Church Hawaii • Retired U.S. ...
- 2025 Dec 20
Houston, TX
... high-risk vulnerabilities and recommending remediation actions, reducing exposure to critical security risks by 25% Security Exploitation Training Using Metasploitable • Practiced vulnerability exploitation in controlled environments, developing ...
- 2025 Dec 20
Tucson, AZ, 85746
... Force’s primary Intelligence, Surveillance, and Reconnaissance (ISR) Planning and Direction, Collection, Processing and Exploitation, Analysis and Dissemination (PCPAD) weapon systems that employed a global communications architecture that connects ...
- 2025 Dec 19
Columbus, IN
... clients Medicaid, Medicare and Social Security eligibility benefits Completing investigations for all abuse, neglect and exploitation incidents Handling all unemployment hearings Developing relationships with community resources to promote inclusion ...
- 2025 Dec 17
Leominster, MA
... analyzed psychological exploitation methods such as framing, elicitation, and pretexting; designed awareness and training programs to mitigate human-factor vulnerabilities. • Practical Research in Cybersecurity: Authored graduate research paper ...
- 2025 Dec 14
West Pikeland Township, PA, 19425
... • Spearheaded revenue growth initiatives leveraging machine learning in the Office365 team, driving identification and exploitation of revenue opportunities through data-driven customer scenarios. • Developed innovative Teams Bots and web ...
- 2025 Dec 10
Roxboro, NC
... When transporting children in foster care to medical or therapeutic appointments and has contact with the service providers ● 10% of job includes receiving calls from a variety of sources regarding allegations of abuse, neglect and exploitation of ...
- 2025 Dec 04