• Software Reverse Engineer (TS/SCI)- Senior & Mid

    Vexterra Group (Bethesda, MD)
    …and analysis processes, approaches and concepts to enhance/improve technical exploitation efforts + Adequately explain, present, demonstrate [when applicable] and ... variants + Advanced or Expert knowledge of the types and techniques of cyber exploitation and attack, including virus, worm, Trojan horse, logic bomb, and sniffer to… more
    Vexterra Group (04/16/25)
    - Related Jobs
  • Cybersecurity Testing Engineer (In-Office/On-Site)

    Eurofins (Baltimore, MD)
    …are looking for: + Suite, Privilege escalation, firmware extraction, buffer Overflow Exploitation , Web, Hacking + Experience in cybersecurity consulting in an ICS ... in techniques such as privilege escalation, firmware extraction, buffer overflow exploitation , and web hacking. + Experience in cybersecurity consulting within… more
    Eurofins (04/11/25)
    - Related Jobs
  • Cyber Solutions Developer - Top Secret (Fort…

    Lockheed Martin (Fort Meade, MD)
    …Collaborate with customers to solve complex problems in computer network exploitation , reverse engineering, and signals intelligence \(SIGINT\) development * Provide ... tools, debugging tools \(Ghidra/Binary ninja\)\. Software vulnerability analysis and exploitation \. Understanding of intrusion detection systems, firewalls, VPN appliances,… more
    Lockheed Martin (04/10/25)
    - Related Jobs
  • User Support Specialist (Intelligence Data…

    Xcelerate Solutions (Bethesda, MD)
    …developing, deploying, and operating a DoD-wide Tasking, Collection, Processing, Exploitation , and Dissemination (TCPED) workflow management platform for Open-Source ... to provide cutting edge requirements management, task coordination, data exploitation , enrichment, triage, and analytics capabilities to Defense and Intelligence… more
    Xcelerate Solutions (03/13/25)
    - Related Jobs
  • Network Architect

    Imagine One Technology & Management (Lexington Park, MD)
    …Network Security Vulnerability Technician + NEC C26A AN/SSQ-137 Ship's Signal Exploitation Equipment (SSEE) Maintenance Technician + NEC C27A Submarine Carry-on ... Equipment Technician + NEC C28A Ship's Signal Exploitation Equipment Increment Foxtrot (SSEE INC F) Maintenance Technician + NEC H08A Advanced Network Analyst + NEC… more
    Imagine One Technology & Management (03/04/25)
    - Related Jobs
  • MI Systems Maintainer Integrator II - TS/SCI

    Global Dimensions (Fort Meade, MD)
    …TECHINT and OSINT + All Source Intelligence for tasking, collection, processing, exploitation , production and dissemination at all echelons from tactical to national ... (DCGS-A), software defined SIGINT collection platforms, biometrics collection, processing, exploitation and dissemination equipment + CI/HUMINT support systems, TROJAN… more
    Global Dimensions (03/04/25)
    - Related Jobs
  • Threat Researcher

    CACI International (Aberdeen Proving Ground, MD)
    …* * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving Grounds, Maryland. This role provides advanced penetration testing ... Experience performing vulnerability assessments + Experience with using Linux for exploitation + Experience with command-line interfaces + Experience with Mobile… more
    CACI International (02/21/25)
    - Related Jobs
  • Software Engineer 2

    Huntington Ingalls Industries (Fort Meade, MD)
    …attacks, etc.) * Have published research regarding cybersecurity, software exploitation , or reverse engineering Physical Requirements Adequate visual acuity and ... manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission… more
    Huntington Ingalls Industries (05/16/25)
    - Related Jobs
  • Software Engineer 4

    Huntington Ingalls Industries (Fort Meade, MD)
    …attacks, etc.) * Have published research regarding cybersecurity, software exploitation , or reverse engineering Physical Requirements Adequate visual acuity and ... manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission… more
    Huntington Ingalls Industries (05/16/25)
    - Related Jobs
  • Joint Cyberspace Operations Planner

    Huntington Ingalls Industries (Fort Meade, MD)
    …lifecycle of the network threats, attack vectors and methods of exploitation , the utilization, configuration, and implementation of industry capabilities including ... web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and… more
    Huntington Ingalls Industries (05/15/25)
    - Related Jobs