- Draper (Boston, MA)
- …efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of ... expertise in a wide array of technologies and skills such as embedded systems, compiler theory, threat intelligence, fuzzing, binary analysis, and vulnerability… more