- CACI International (Chantilly, VA)
- …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
- Parsons Corporation (West Melbourne, FL)
- …/Reverse Engineer** to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero ... Days). **What You'll Be Doing:** + Reverse engineering systems and software executables using tools like Ghidra, Binary Ninja, or IDA Pro + Identifying potential… more
- Draper (Boston, MA)
- …organizational needs, our technical efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals...exploit development on a wide range of devices and systems . Job Description: + Assess hardware and software for… more
- Deloitte (Baltimore, MD)
- …Do As a Project Delivery Manager on the project, as a Digital Network Exploitation Analyst you will: + Apply data and technical expertise to perform file signature ... and report intelligence-derived significant network events and intrusions + Conduct research and analysis at the operational or strategic level + Communicate… more
- MIT Lincoln Laboratory (Lexington, MA)
- …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
- Lockheed Martin (Grand Prairie, TX)
- …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- Lockheed Martin (Denver, CO)
- **Description:** You will be the ** Cyber Test Exploitation Engineer** for the research and development team, responsible for designing, executing, and ... technologies and ensure mission‑critical resilience\. **What You Will Be Doing** As the Cyber Test Exploitation Engineer, you will develop and run sophisticated… more
- Leidos (Bluemont, VA)
- …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to FEMA networks and its regions through monitoring, intrusion… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems...essential to the success of their missions. Position Description Cyber System Exploitation Intern When you join… more
- Leidos (Ashburn, VA)
- …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more