• Cyber Test & Exploitation Engineer

    Lockheed Martin (Grand Prairie, TX)
    **Description:** You will be a Cyber Test & Exploitation Engineer in the Program Protection Organization\. Our organization oversees all aspects of Anti\-Tamper and ... You Will Be Doing** As the Cyber Test & Exploitation Engineer you will be responsible for conducting ...Exploitation Engineer you will be responsible for conducting exploitation testing to improve integrity and security of weapon… more
    Lockheed Martin (10/10/25)
    - Related Jobs
  • Exploitation Specialist - Chinese

    SOS International LLC (El Paso, TX)
    …is contingent upon award of contract SOS International LLC (SOSi) is seeking an Exploitation Specialist - Chinese to support a US Government Client to provide media ... support. + Experience in open source social media collection, analysis, and exploitation . + Proficiency with Microsoft Teams, Excel, and Word. + Excellent written… more
    SOS International LLC (11/09/25)
    - Related Jobs
  • Exploitation Specialist - Chinese

    SOS International LLC (El Paso, TX)
    …is contingent upon award of contract SOS International LLC (SOSi) is seeking an Exploitation Specialist - Chinese to support a US Government Client to provide media ... support. + Experience in open source social media collection, analysis, and exploitation . + Proficiency with Microsoft Teams, Excel, and Word. + Excellent written… more
    SOS International LLC (10/14/25)
    - Related Jobs
  • Cyber Test Exploitation Engineer Sr

    Lockheed Martin (Fort Worth, TX)
    …**Job Summary** : This position is for a cyber security penetration tester supporting the Lockheed Martin Aeronautics Cyber Range (TM) \(ACR\)\. The ACR is ... responsible for conducting cyber security assessments of Lockheed Martin Aeronautics platforms\. The candidate is responsible for performing a wide array of cyber security assessment methodologies that leverage technical knowledge and threat intelligence to… more
    Lockheed Martin (11/13/25)
    - Related Jobs
  • Assessments and Exercises Vice President-Purple…

    JPMorgan Chase (Plano, TX)
    …Red Team/Purple Team operations, application security assessments, and network exploitation operations. Candidate should have the ability to perform targeted, ... covert penetration tests with vulnerability identification, exploitation , and post- exploitation activities with no or minimal use of automated tools + Strong… more
    JPMorgan Chase (10/19/25)
    - Related Jobs
  • Product Cybersecurity Test Engineer

    Textron (Fort Worth, TX)
    …penetration or adversarial testing, cyber threat analysis, vulnerability detection / exploitation , adversarial attack development, and system exploitation on ... in developing new attack techniques, methods and implementing custom exploits and exploitation tools in support of penetration tests or cyber threat emulation… more
    Textron (11/19/25)
    - Related Jobs
  • Associate General Counsel, Investigations

    Meta (Austin, TX)
    …matters related to terrorism, threats of violence, child safety, human exploitation , and fraud/scams 2. Counsel integrity teams on investigations, crisis response, ... or derogatory language, and other potential objectionable material, ie child exploitation , graphic violence, self-injury, animal abuse, and other content which may… more
    Meta (11/05/25)
    - Related Jobs
  • Assessments & Exercises Vice President - Offensive…

    JPMorgan Chase (Plano, TX)
    …Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security tools for ... reconnaissance, scanning, exploitation , and post exploitation (eg Cobalt Strike, Metasploit, Burp Suite); networking fundamentals (all OSI layers, protocols);… more
    JPMorgan Chase (10/12/25)
    - Related Jobs
  • Child Care Assistant

    WestCare Foundation (San Antonio, TX)
    …district policies, and administrative regulations. + Report suspected abuse, neglect, and exploitation to DFPS as specified in the Texas Family Code + Maintains ... district policies, and administrative regulations. + Report suspected abuse, neglect, and exploitation to DFPS as specified in the Texas Family Code + Maintains… more
    WestCare Foundation (11/11/25)
    - Related Jobs
  • Sr. Security Consultant - Penetration Testing

    SHI (Austin, TX)
    …with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation , post- exploitation , lateral movement, and data exfiltration, ... along with strong operational security practices. - Intermediate + Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific… more
    SHI (09/09/25)
    - Related Jobs