- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be contributing to the… more
- Cambridge International Systems Inc (Norfolk, VA)
- …Expertise: + Demonstrated ability to reverse engineer, exploit, or emulate real-world cyber threats across networked and embedded systems . + Familiarity with ... Exploitation Analyst - Top Secret Clearance | Norfolk, VA Cambridge International Systems , Inc. Join a dynamic global team united by shared values: commitment,… more
- Deloitte (Baltimore, MD)
- …of professional experience in cybersecurity, with at least 3 years focused on cyber exploitation analysis, threat intelligence, or incident response. Must be ... Our Deloitte Cyber team understands the unique challenges and opportunities...manage to secure success. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- Deloitte (Baltimore, MD)
- …in cybersecurity, with at least 3+ years focused on the following + Cyber exploitation analysis, threat intelligence, or incident response. + Demonstrated ... Our Deloitte Cyber team understands the unique challenges and opportunities...manage to secure success. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …and networking in order to design and develop advanced tools, techniques, and systems . Digital Network Exploitation Analysts employ computer science skills to ... Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply… more
- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
- Parsons Corporation (West Melbourne, FL)
- … using reverse engineering, fuzzing, and other dynamic techniques + Reverse engineering cyber physical systems to understand how they work + Researching open ... Parsons is looking for an amazingly talented Junior Vulnerability Researcher (VR) to join our team! In this role...to work independently with a team doing advanced cybersecurity research and development for the US Government. **What You'll… more
- JPMorgan Chase (Wilmington, DE)
- …dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In this role, you ... As an Vulnerability Researcher - Assessments & Exercises at JPMorgan Chase...simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the… more