Post Job Free

Analyste or Exploitation resumes in United States

Sign in
Search for: Jobs   Resumes


Distance: Resume alert Resumes 361 - 370 of 2108

Security Analyst Information

Laurel, MD
... Exploitation was done based on the analysis. Using the OWASP mobile security project as a guideline, the following vulnerabilities were checked and exploited: Insecure transmission of data to determine how encryption has been implemented and ... - 2024 Mar 20

3D Modeling Team Leader

Tucson, AZ
... PROFESSIONAL EXPERIENCE: 2014 –Present: Manager geologist offshore Mediteranean Sea,Egypt-Exploration and exploitation assessment: 2D and 3D seismic studies Regional or fieldwide structural and stratigraphic studies and subsurface mapping Estimates ... - 2024 Mar 19

Mental Health Quality Assurance

Miami, FL
... • 9/2015 – 3/2016 Adult Protective Investigator, Department of Children and Families, Fort Myers, FL Investigate vulnerable adults and elderly against abuse, neglect, and exploitation and offer services to assist with their daily needs. • Additional ... - 2024 Mar 13

Project Management Master Level

Suffolk, VA
... •Led a staff of 145 instructors - both military and civilian for 56 IT and CT curriculums, courses and CONOPS development to include Cyber and Communications exploitation. •Awarded the NETC training excellence award and retention excellence award. ... - 2024 Mar 12

Quality Assurance Project Management

Manhattan, NY, 10007
... Ferry, New York AWARDS/RECOGNITIONS: Spoke before the United Natation’s General Assembly, 2023 Briefed the Senate Judiciary Committie on Legislation about Child Exploitation, 2023 Award Outstanding Leader in Nonprofit Organization by the NASW, 2022 - 2024 Mar 09

Data Analysis Analyst

Allen, TX
... Technical Skills: Data exploitation and analysis Data Querying Data Modelling Data Visualization Data Storytelling and Reporting Tools: Microsoft Excel Python SQL Tableau Jupyter Notebooks VBA Scripting Pandas Databases: MySQL PostgreSQL Microsoft ... - 2024 Mar 07

Information Technology Software Development

Houston, TX
... engineering attacks, bypass anti-virus software, Information gathering, finding vulnerabilities, capturing traffic, client side exploitation, wireless attacks, web application testing, mobile hacking etc ●Application Testing implementing Burp Suite: ... - 2024 Mar 04

All Source Intelligence

Woodbridge, VA, 22191
... ALC/ NMEC Team VA Aug 2010-Dec 2011 •Analyst/Linguist Tysons Corner-Reston VA • Triaged, analyzed, quality controlled Translated and gist’s Persian and Turkish documents •Performed document exploitation of open sources for any potential tread; ... - 2024 Feb 29

Management Systems Technical Skills

Linthicum Heights, MD
... This includes satellite mission planning, contact scheduling, collection, analysis, anomaly resolution and dissemination operations, as well as the field of Electronics, Data Exploitation, RF Footprint, Mobile, and Cross Access Collection Strategy ... - 2024 Feb 28

Front End Information Security

Elk Grove, CA
... Knowledge & Skill Areas: Password-Cracking, Forensics, Cryptography, Log Analysis, Network Traffic Analysis, Network Scanning, Enumeration and Exploitation, Web-Application Security, Front-End Web Development; User-Friendly Web Design/Responsive ... - 2024 Feb 27
Previous 34 35 36 37 38 39 40 Next