- Draper (Boston, MA)
- …or related field is required. Additional Job Description: Program Analysis, Reverse Engineering, and Vulnerability Research : + Proficiency with modern ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals to...from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of… more
- Huntington Ingalls Industries (Concord, MA)
- …Utilize encryption technologies, conduct penetration and vulnerability tests, and explore various security research avenues. + Reporting: + Prepare detailed ... Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $111,812.00 - $170,000.00 Security Clearance: Secret Level of Experience: Senior This… more
- RTX Corporation (Cambridge, MA)
- …for a ** Senior Principal Cyber Engineer** that is a recognized researcher and has experience in Cybersecurity, Computer Engineering or Science, RF Signal ... in relevant programming languages and development tools to support the research 's software/hardware requirements. + Experience with reverse engineering, binary… more
- Draper (Boston, MA)
- Job Description Summary: Draper is actively seeking a Senior Cyber Software Engineer to support current and future cybersecurity, machine learning, and cyber tool ... from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of...and innovate for the greater good of our Nation's security . As a part of the Draper Cyber Software… more
- Wellington (Boston, MA)
- …in more than 60 countries, draw on a robust body of proprietary research and a collaborative culture that encourages independent thought and healthy debate. As ... with our Guideline Monitoring application to design and enhance features. + Reverse engineering a vendor application to modify its behaviour for our business… more
- Draper (Boston, MA)
- Job Description Summary: Draper's Offensive Cyber Security Group is looking for a CNO Software Engineer to develop tailored solutions to meet our DoD and IC Sponsor ... opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of devices and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …Group: The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. ... + Compiler Construction + Anti-debugging/Anti-instrumentation Techniques + Network and Host Security Products + Vulnerability Assessment Summer Research Program… more
- MIT Lincoln Laboratory (Lexington, MA)
- …affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena ... convergence of cybersecurity and the physical world in an interdisciplinary research and development environment. We focus on cyber-physical sensing, cyber-physical… more
- Lumen (Boston, MA)
- …hunting using behavioral IOCs, Jupyter Notebooks, and SIEM tools. + Contribute to research on emerging threats, malware behavior, and reverse engineering. + ... cybersecurity team focused on , threat hunting, and investigative research and digital forensics As a summer intern, you'll...analyzing threat data, and contributing to the development of security tools and processes. This intern will focus on… more
- MIT Lincoln Laboratory (Lexington, MA)
- …and drive projects to completion. + Experience with embedded systems development and security + Familiarity with binary reverse engineering and exploitation At ... in the convergence of cybersecurity and the physical world in an interdisciplinary research and development environment. We conduct research to understand and… more