- Microsoft Corporation (Redmond, WA)
- …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR Bachelor's Degree ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR equivalent… more
- Google (Kirkland, WA)
- …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... security, artificial intelligence, natural language processing, UI design and mobile ; the list goes on and is growing every...creating new automation that will directly impact the Chrome vulnerability life-cycle and ensure that we are able to… more
- Amazon (Seattle, WA)
- …utilized throughout Amazon and AWS. Beyond direct technical work on exploits, vulnerability research , and threat intelligence, the Cyber Threat Exploitation ... drive effective technical countermeasures. Key job responsibilities * Identify, research , and analyze novel vulnerabilities discovered in threat intelligence data,… more
- Bank of America (Seattle, WA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- Bank of America (Seattle, WA)
- …and emerging threats. Key responsibilities include leading and performing research , understanding the bank's security policies, working with appropriate partners ... assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code. Key Responsibilities in order of… more
- Meta (Olympia, WA)
- …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software… more