- Draper (Boston, MA)
- …or related field is required. Additional Job Description: Program Analysis, Reverse Engineering, and Vulnerability Research : + Proficiency with modern ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals to...from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of… more
- RTX Corporation (Cambridge, MA)
- …for a ** Senior Principal Cyber Engineer** that is a recognized researcher and has experience in Cybersecurity, Computer Engineering or Science, RF Signal ... in relevant programming languages and development tools to support the research 's software/hardware requirements. + Experience with reverse engineering, binary… more
- Huntington Ingalls Industries (Concord, MA)
- …Utilize encryption technologies, conduct penetration and vulnerability tests, and explore various security research avenues. + Reporting: + Prepare detailed ... Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $111,812.00 - $170,000.00 Security Clearance: Secret Level of Experience: Senior This… more
- Draper (Boston, MA)
- Job Description Summary: Draper is actively seeking a Senior Cyber Software Engineer to support current and future cybersecurity, machine learning, and cyber tool ... from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of...and innovate for the greater good of our Nation's security . As a part of the Draper Cyber Software… more
- Wellington (Boston, MA)
- …in more than 60 countries, draw on a robust body of proprietary research and a collaborative culture that encourages independent thought and healthy debate. As ... with our Guideline Monitoring application to design and enhance features. + Reverse engineering a vendor application to modify its behaviour for our business… more
- Draper (Boston, MA)
- Job Description Summary: Draper's Offensive Cyber Security Group is looking for a CNO Software Engineer to develop tailored solutions to meet our DoD and IC Sponsor ... opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of devices and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …and drive projects to completion. + Experience with embedded systems development and security + Familiarity with binary reverse engineering and exploitation At ... in the convergence of cybersecurity and the physical world in an interdisciplinary research and development environment. We conduct research to understand and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …Protection Division and focuses on assisting the Departments of Defense and Homeland Security in securing the nation from energy-related threats. Our group works on ... energy systems that can operate independently from the bulk electric grid, cyber security of control systems that interface with energy systems, and development of… more