- CACI International (Sterling, VA)
- …embedded systems to identify functional behavior.** **Conduct code review and vulnerability analysis on software/firmware to identify potential weaknesses or access ... using tools like IDA Pro, Ghidra, x64Dbd, GDB, and Sysinternals to research the behavior of binaries.** **Perform pattern analysis to identify critical… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... investigations on varied operating systems such as (but not limited to) Windows, Linux , UNIX, and Mac OSX. + Preserving evidence (collect, process, preserve, and… more
- Amazon (Arlington, VA)
- …- Security reviews for hardware including servers and devices. - Penetration testing & vulnerability research - Threat modeling. A day in the life We partner ... - Knowledge of distributed applications/enterprise applications - Knowledge of UNIX/ Linux operating system - Experience analyzing and troubleshooting RESTful web… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... + Strong proficiency in administering operating systems such as Windows Server, Linux , or Unix. + Experience with virtualization technologies, including VMware or… more
- Parsons Corporation (Centreville, VA)
- …+ Rapidly prototype new technologies to exploit target systems + Perform vulnerability research on hardened systems **What Required Skills You'll Bring:** ... Are proficient with one or more low-level programming languages + Understand Unix/ Linux operating systems + Love solving puzzles and have experience persevering… more
- CACI International (Sterling, VA)
- …configurations - Work on systems that support our Nation's warfighters - Research and evaluate technologies and standards **Qualifications** : **Required skills:** + ... Previous experience employing risk management methodologies, NIST/ ICD-503 + Vulnerability assessment scanning tools + Strong Cyber, Cyber Risk, or QA technical… more
- ASM Research, An Accenture Federal Services Company (Richmond, VA)
- …and provide recommendations for mitigation. + Conducts and coordinates vulnerability assessments of software application under development. + Identifies additional ... + Must have solid working experience and knowledge of Unix/ Linux operating system. + Experience with one or more...is a plus. **Compensation Ranges** Compensation ranges for ASM Research positions vary depending on multiple factors; including but… more
- KMS Solutions, LLC (VA)
- …Technical Information Guide (STIG) compliance audits. + Monitor network vulnerability /risk and implement remedies/mitigations. + Review proposed designs to ensure ... RMF process, system analysis, system audits, CISCO iOS, MS Window/Server, LINUX , network, DISA STIGS, SolarWinds, Assured Compliance Assessment Solution/Nessus, and… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Angular, BitBucket, GITHub, Junit, RedHat, Ansible Tower, C/C++, Gradle, Linux , SecDevOps, API, CloudWatch, Hibernete, Maven, SpringMVCC, Artifactory, CSS, HTML,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... with relational databases (ex - Oracle / Postgres) Experience with interacting in a Linux environment (ex - Bash scripting, VI) Ability to work well with others as… more