
ELEVI Associates
Jobs at Similar Companies
Similar Companies Hiring
Jobs at ELEVI Associates
Let Your Resume Do The Work
Upload your resume to be matched with jobs you’re a great fit for.
Success! We’ll use this to further personalize your experience.
Recently posted jobs
Information Technology
As an Exploitation Analyst, you will analyze and develop exploitation plans based on adversary networks, collaborate with a diverse team to understand intelligence needs, and apply analytical techniques to evaluate data for actionable insights. You will document and share findings with partners and stakeholders.
Information Technology
As an Exploitation Analyst, you will develop exploitation plans based on adversary networks and enhance operational tactics in a collaborative environment. You will utilize data analysis to derive insights and communicate findings effectively to various stakeholders.
Information Technology
As an Exploitation Analyst, you will develop exploitation plans, analyze adversary networks and defenses, and collaborate with teams to meet intelligence needs. Your analytical skills will support data evaluation and sharing of insights, and you'll be responsible for contextualizing findings and new tradecraft.
Information Technology
As a Target Digital Network Analyst, you'll conduct advanced analysis of open-source data, profile targets, and bridge intelligence gaps. You'll work with a team to collaborate on analysis strategies, and share findings with stakeholders while employing various analysis disciplines.
Information Technology
As a Target Digital Network Analyst, you will analyze data to generate insights, maintain databases, identify intelligence gaps, and collaborate with team members to meet intelligence needs. You'll apply analysis techniques to draw conclusions and share findings effectively. Shift work is required, with specific start times for day and night shifts.
Information Technology
The Digital Network Exploitation Analyst Level 3 will evaluate target networks using various data sources, analyzing SIGINT and cybersecurity data across the OSI stack. Responsibilities include developing tradecraft, collaborating with military and government personnel, applying analytical techniques, and documenting findings.
Information Technology
As a Sr Systems Engineer, you will be responsible for managing enterprise tools like Splunk and SCCM, ensuring system performance, executing patch management, maintaining security compliance, and providing performance analytics. You will also lead service monitoring and issue remediation efforts while communicating effectively with stakeholders.
Information Technology
As a Digital Network Exploitation Analyst, your role involves analyzing and mapping target networks using various data sources, developing operations plans, and creating tradecraft. You will assess and analyze cybersecurity data and work collaboratively with team members and stakeholders. Your findings will be documented and shared to enhance intelligence sharing and operational effectiveness.
Information Technology
The Software Developer Advisor will design, develop, and modify enterprise-wide systems and applications. Responsibilities include overseeing all phases of the software development lifecycle, providing guidance on documentation and system maintenance, and conducting advanced analysis for project specifications.
Information Technology
As a Network Engineer, you will manage and migrate data to Microsoft 365 and OneDrive from NetApp storage systems, ensuring security and optimal performance. You'll lead projects, offer technical support, monitor storage solutions, and stay updated on storage and cloud technology trends.
Information Technology
As a Software Engineer at ELEVI, you will research, design, and develop enterprise-wide systems and applications. Responsibilities include applying software development lifecycle knowledge, conducting updates and testing, and providing guidance for optimal documentation. A focus on ServiceNow development experience and compliance with security standards is essential.
Information Technology
As a Computer Network Defense Analyst, you will identify vulnerabilities, respond to cyber events, and strengthen network defenses. Collaborate with a team to understand intelligence needs, and share findings. Your role encompasses various data transport methods and requires expertise in network security and protocols.
Information Technology
As a Digital Network Exploitation Analyst Level 2, you will analyze SIGINT and cybersecurity data, evaluate target networks, and develop exploitation plans. Collaborating with military and contractor teams, you will craft tradecraft techniques, document findings, and share insights to inform intelligence needs.
Information Technology
As a Digital Network Exploitation Analyst, you will evaluate target opportunities, analyze SIGINT and cybersecurity data, develop new tradecraft, collaborate with government and military personnel, and share insights derived from your analytical efforts.
Information Technology
As a Computer Network Defense Analyst Level 3, you will identify vulnerabilities, respond to cyber events, develop defenses, collaborate with a team, and analyze data to produce reports on vulnerabilities. You will work with various networking protocols and technologies to strengthen network security.
Information Technology
As an Exploitation Analyst Level 2, you will develop exploitation plans and adjust them as necessary while collaborating with military and government personnel. You will analyze adversary networks and share insights, documenting findings and new tradecraft for stakeholders.
Information Technology
As a Digital Network Exploitation Analyst, you will evaluate target opportunities, analyze SIGINT and cybersecurity data, develop new tradecraft, and collaborate with teams to analyze intelligence needs and share findings.
Information Technology
As a Computer Network Defense Analyst Level 2, you will identify vulnerabilities, respond to cyber events, develop network defenses, and work with teams in both military and civilian sectors to enhance network security. You’ll utilize analytical skills and collaboration to document findings and contribute to improving network security protocols.
Information Technology
As a Computer Network Defense Analyst, you'll identify and respond to cyber events, strengthen network defenses, and work with a team to analyze vulnerabilities and enhance security protocols. Your role will involve leveraging various data sources and collaborating across teams while using your analytical skills to produce actionable insights.
Information Technology
As a Digital Network Exploitation Analyst, you will analyze target networks using SIGINT and cybersecurity data, develop operations plans, and create new analysis techniques. Collaboration with various personnel will be required to understand intelligence needs, and you will need to document and share findings with the team.