• Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/17/25)
    - Related Jobs
  • Group 05-59 | SRP Intern | Cyber System…

    MIT Lincoln Laboratory (Lexington, MA)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/31/25)
    - Related Jobs
  • Group 05-51 | SRP Intern | Cyber-Physical Systems…

    MIT Lincoln Laboratory (Lexington, MA)
    …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
    MIT Lincoln Laboratory (12/16/25)
    - Related Jobs
  • Principal Software and Security Compliance Audit…

    Medtronic (Boston, MA)
    …of Material (SBOM) development and maintenance for the purposes of vulnerability monitoring. + Possess an understanding of non-probabilistic scoring methodologies ... for security threats like common vulnerability scoring system (CVSS) and apply appropriately. + Document...frameworks and relevant global regulations + Strong capability to research and evaluate emerging technologies + A solid familiarity… more
    Medtronic (12/24/25)
    - Related Jobs
  • Manual Ethical Hacker

    Bank of America (Boston, MA)
    …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
    Bank of America (12/22/25)
    - Related Jobs
  • Senior Manual Ethical Hacker

    Bank of America (Boston, MA)
    …and emerging threats. Key responsibilities include leading and performing research , understanding the bank's security policies, working with appropriate partners ... assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code. Key Responsibilities in order of… more
    Bank of America (12/22/25)
    - Related Jobs
  • Product Security Engineer, AI

    Meta (Boston, MA)
    …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software… more
    Meta (12/20/25)
    - Related Jobs