Weeghman & Briggs
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Weeghman & Briggs
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Information Technology • Cybersecurity
The Software Engineer 3 will design and maintain web-based analysis tools, implement CI/CD pipelines, and create infrastructure through code, supporting mission-critical applications.
Information Technology • Cybersecurity
The SIGDEV Analyst 3 will conduct SIGINT analysis to optimize customer accesses, developing targets and analytic strategies, focusing on global network communications.
Information Technology • Cybersecurity
Computer Network Defense Analysts protect network infrastructure by identifying vulnerabilities, responding to cyber threats, and developing mitigations against attacks, collaborating with teams to meet mission needs.
Information Technology • Cybersecurity
As a Digital Network Exploitation Analyst, you will analyze SIGINT and cybersecurity data, evaluate target networks, and develop tradecraft for exploitation plans.
Information Technology • Cybersecurity
Perform advanced analysis of collection and open-source data to generate insights for target continuity. Collaborate with teams to address intelligence needs and document findings.
Information Technology • Cybersecurity
The Software Engineer 2 will develop GUIs, manage AWS applications, integrate AI/ML models, and support the Federal Government's needs.
Information Technology • Cybersecurity
As an Apprentice Active Geolocation Operator, you'll provide operational support, conduct RF collection, analyze intelligence, and grow your expertise in geolocation technologies.
Information Technology • Cybersecurity
The Apprentice Passive Geolocation Operator supports 24/7 operations focusing on RF collection, analysis, and intelligence product creation, requiring 2+ years of relevant experience.
Information Technology • Cybersecurity
As a Web Developer 2, you will design, develop, and maintain websites to enhance communication for a Federal Government mission while ensuring compliance with standards and effectively meeting customer needs.
Information Technology • Cybersecurity
Develop and maintain software systems, focusing on GUI development, AWS application management, and integrating AI/ML models into workflows with a strong emphasis on automation and process improvement.
Information Technology • Cybersecurity
The System Engineer 3 analyzes user requirements, develops system specifications, leads transition activities, and supports compliance, providing technical direction and documentation for system development and integration.
Information Technology • Cybersecurity
Data Scientists will develop and implement data analysis strategies, communicate findings, and extract meaning from large datasets for government missions.
Information Technology • Cybersecurity
Responsible for analyzing legal and policy documents, identifying compliance obligations, and engaging with customers to determine solutions. The role requires maintaining documentation and reports across multiple levels of analyst roles.
Information Technology • Cybersecurity
As an Exploitation Analyst, you will apply your understanding of adversary networks to develop exploitation plans, work collaboratively with teams, and analyze data to provide insights to improve intelligence operations.
Information Technology • Cybersecurity
Support an information assurance program, manage security operations, evaluate security solutions, and maintain documentation for compliance and risk assessments.
Information Technology • Cybersecurity
The System Engineer will analyze requirements, lead design efforts, develop documentation, and ensure compliance with technical standards. They will oversee integration and provide technical leadership.






