- Nightwing (San Antonio, TX)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... and deliver exceptional results for our clients. Job Summary Vulnerability Researchers at NightWing CODEX analyze systems to understand...of C++ code. Role Type This position is an onsite role Required Skills + TS/SCI Clearance Required +… more
- Nightwing (San Antonio, TX)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... solve complex problems, and deliver exceptional results for our clients. Vulnerability Researchers at NightWing CODEX analyze systems to understand how they… more
- Lockheed Martin (Grand Prairie, TX)
- …cyber offensive, defense, and full spectrum cyber operations * Conducting vulnerability research , reverse engineering, penetration testing \(red/blue teams\) * ... 800\-161\) * Experience with embedded systems, including design, development, and vulnerability scanning * Experience developing and automating secure systems to… more
- Nightwing (San Antonio, TX)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Our capabilities include cyberspace operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Lockheed Martin (Grand Prairie, TX)
- …cyber offensive, defense and full spectrum cyber operations * Conducting vulnerability research , reverse engineering, penetration testing \(red/blue teams\) * ... tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit… more
- CACI International (Austin, TX)
- …Navy customer. You will be instrumental in the engineering and advanced research and development associated with designing of products during design, development, ... multiple enclave support + Support cyber security scans, lockdowns, and vulnerability analysis + Provide and maintain configuration-controlled build containers +… more