- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... + Anti-debugging/Anti-instrumentation Techniques + Network and Host Security Products + Vulnerability Assessment Summer Research Program Overview The Summer … more
- IBM (Lowell, MA)
- …threat modeling, and code review of new features, as well as vulnerability management across our entire product portfolio. **Your role and responsibilities** We ... are looking for a Senior Product Security Engineer to help scale our product...help scale our product security function, partnering closely with Research & Development teams to ensure that security is… more
- IBM (Lowell, MA)
- …threat modeling, and code review of new features, as well as vulnerability management across our entire product portfolio. **Your role and responsibilities** We ... are looking for a Senior Product Security Engineer II to help scale our...help scale our product security function, partnering closely with Research & Development teams to ensure that security is… more
- MIT Lincoln Laboratory (Lexington, MA)
- …affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena ... convergence of cybersecurity and the physical world in an interdisciplinary research and development environment. We focus on cyber-physical sensing, cyber-physical… more
- Optiv (Boston, MA)
- …in industry groups, delivering talks, writing technical and industry-specific blogs, vulnerability research , industry PR interviews, and/or contributing to ... Technical Manager for Network and Edge Security is a senior technical leader responsible for driving the success of...**How You'll Make an Impact:** * Act as the senior technical leader on consulting engagements, ensuring technical excellence… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... will work with a team of experts to conduct research and development related to compromise detection for Internet...this co-op. Requirements Candidates must be a junior or senior undergraduate, or a graduate, degree candidate in Computer… more
- MIT Lincoln Laboratory (Lexington, MA)
- …works to understand air defense issues, in particular, air vehicle survivability, vulnerability of US Air Force (USAF) aircraft to weapons systems, electronic ... image processing, data analysis or artificial intelligence / machine learning. Summer Research Program Overview The Summer Research Program offers students the… more
- Applied Research Solutions (Bedford, MA)
- …CASP, CSSLP, CISSP-ISSEP, or CISSP-ISSAP preferred.** Why Work with us? Applied Research Solutions (ARS) is respected as a world-class provider of technically ... awards and recognition program, and personalized attention from ARS Senior Managers. **Responsibilities include:** + Supporting the system/application authorization… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Requirements Candidates must be a junior or senior undergraduate, or a graduate, degree candidate in Computer Science, Computer… more