cover photo
user avatar

BTS Software Solutions

Employer Profile

About BTS Software Solutions

BTS Software Solutions is a privately held company that solves modern security and defense challenges through cutting edge technology and highly-skilled teams. From research labs in Maryland to combat zones across the globe, BTS develops innovative solutions and services that reinvent the battlespace. We are a values-driven partner with extensive experience developing and implementing technology-based solutions.


Get Job Alerts for BTS Software Solutions
Network Employers
Company Benefits

Retirement

Fitness

Meals

Vacation

Maternity

Healthcare

Dental

Vision

Parking

Casual

Childcare

Coffee Bar

Education

Hours

Telework

Recent Activity
  • An Employer added a new network connection
    Today3:42 AM
  • An Employer sent a broadcast message
    Yesterday7:08 PM
  • An Employer added a new network connection
    Nov 15, 20255:32 PM
  • An Employer added a new network connection
    Nov 15, 20255:32 PM
  • An Employer added a new network connection
    Nov 14, 20256:43 PM
  • An Employer added a new network connection
    Nov 04, 20253:34 PM
  • All
  • Status Update
  • Hiring Needs
  • Events
  • Groups Joined
  • Groups Messages
Group Message Yesterday at 7:08 PM
Cleared Navy

Actively Hiring! Junior Cyber Systems Analyst Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) chris.manning@unleashbts.com

0
Group Message Yesterday at 7:08 PM
Cleared Air Force

Actively Hiring! Junior Cyber Systems Analyst Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) chris.manning@unleashbts.com

0
Group Message Yesterday at 7:08 PM
Transitioning Military Members

Actively Hiring! Junior Cyber Systems Analyst Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) chris.manning@unleashbts.com

0
Group Message Yesterday at 7:08 PM
Cleared Marines

Actively Hiring! Junior Cyber Systems Analyst Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) chris.manning@unleashbts.com

0
Group Message Yesterday at 7:08 PM
Cleared Army

Actively Hiring! Junior Cyber Systems Analyst Assess the cybersecurity posture of a USMC defense program, ensuring the program is evolving with the best cybersecurity practices, prioritizing cyber threats based on factual cyber analysis. Analyze foreign capabilities to detect, disrupt, and deny USMC emissions and signals throughout the cyber kill chain, to include, but not limited to emissions from targeting, communications, and intelligence, surveillance, and reconnaissance (ISR) assets, reversible and non-reversible attacks. Identify, monitor, and assess advancements in emerging and commercial technologies that could be employed by state and non-state actors to detect, disrupt, and deny USMC acquisition programs’ network infrastructure. Identify significant risk characteristics of the environment such as classification of network, baseline activity, architecture, operating system, services, connectivity and bandwidth. Identify the limits of the network to be collected against. Establish limits of the supporting or connected networks that may need to be collected against. Evaluate existing databases and identify intelligence gaps. Use open source to gather Publicly Available Information (PAI). Explore the physical battlespace; how could the environment affect tactical operations. Define the battlespace effects. Analyze the battlespace environment for information, services and networks, such as confidentiality, integrity, availability; and protect, detect, respond, restore and conduct reviews. Analyze other characteristics of the battlespace such as security, auditing procedures, and backup systems. Evaluate the adversary on physical location of all assets, architecture and automation skills, security and policies, baseline activity, peculiarities and vulnerabilities, capabilities, and conclusions that address: Rules of Engagement (ROE) for Information Assurance (IA), Computer Network Defense (CND) and Computer Network Attack (CNA) chris.manning@unleashbts.com

0