Bradenton, FL
... Detailed exploitation and analysis of multiple intelligence sources, including National Technical Means, LiDAR, Buckeye, DTED, Multi-Spectral Imaging (MSI), and Full Motion Video (FMV). The end product gave maximum situational awareness in a complex ...
- May 02
Orlando, FL, 32801
... CI/CD: Jenkins, GitLab CI/CD, CircleCI Test Management: Jira, Azure Boards, TestRail, Tools: Docker, Postman, Allure, Selenium Grid, Sauce Labs Penetration Testing & Exploitation Tools: Aircrack-ng, BeEF, Burp Suite, Hydra, John the Ripper, ...
- May 01
Katy, TX
... Planned project activities related to the mine, selected the mine contractors for exploitation. Reviewed all safety and security activities. Established norms and procedures of the project for ore extraction. Prepared monthly reports, discuss, and ...
- Apr 29
Fayetteville, NC
... oConducted classroom environment training on optimum exploitation techniques for Near Infrared (NIR) to Short Wave (SW) capabilities to identify differences in materials on the ground. oEvaluate programs and adjusts as necessary to accommodate ...
- Apr 25
Houston, TX
... Acclimated in the proper procedures related to reporting abuse, neglect and exploitation of the elderly, disabled and handicapped as required by law. Review deficiencies in EPIC an ensure that they are corrected and completed within a timely manner. ...
- Apr 23
Washington, DC
... ● Perform document exploitation (scan, research, and analyze foreign language documents for intelligence information and identify/extract information components meeting military information requirement list criteria. SENIOR HUMAN RESOURCES MANAGER ...
- Apr 23
Charlotte, NC
... peri guard system EDUCATION AND ACCOMPLISHMENTS 1999 High School Diploma South Philadelphia High School- Philadelphia, PA TRAININGS • Supervisor skills • ASAM criteria training • Preventing abuse, Neglect, and Exploitation • Cultural Competence
- Apr 23
Wesley Chapel, FL
... Tasking, Processing, Collection, Exploitation, Dissemination (TCPED) Processes, and Ground Based Command & Control (C2); Over- head Persistent Infrared Systems (OPIR); Program Management; Information Assurance & Crypto De- vices; MILSATCOM, Earth ...
- Apr 22
St. Cloud, FL, 34771
... Understanding of System Vulnerabilities and Exploitation • Understanding of Vulnerability Mitigation and Verbal Communication Skills • Microsoft 365 • IAM Certification • Analytical Skills • Technical Writing • Communication Skills • Problem Solving
- Apr 20
Irvine, CA
... Orchestrated external penetration testing activities by collaborating with HackerOne and other external partners, leading to identification and mitigation of critical vulnerabilities before exploitation while achieving fortified external defenses ...
- Apr 19