- New York University (Brooklyn, NY)
- …challenges. It covers techniques and methods to reverse x86_64 assembly, exploitation strategies for compiled binaries, and common vulnerabilities in web ... applications and cryptographic implementations. Upon completion of this course, students should be able to: + Assess the logic of compiled code via binary reverse engineering and solve programming challenges based on the functionality of the binary + Employ… more
- MUFG (Jersey City, NJ)
- …and improving reporting capabilities. + Stay updated on the latest exploitation techniques, security research, and industry best practices. **Qualifications:** + : ... + Bachelor's degree in Computer Science, Cybersecurity, or related field (or equivalent experience). + Relevant security certifications (eg, OSCP, OSWE, GWAPT, CEH) are highly desirable. + 5+ years of experience in Application Security, Secure Development,… more
- General Dynamics Information Technology (Macdill AFB, FL)
- …fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting-edge program supporting ... DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war… more
- Service Source (Herndon, VA)
- …protocols and plans. Report any allegations of abuse, neglect, and exploitation according to ServiceSource policies and procedures. Additional Responsibilities + ... Provide support in areas of program design, development and implementation. + Assure that programs are operated according to CARF, Licensing, Medicaid Waiver and other regulatory standards. + Ensure that the needs of the individual served are being met and… more
- JCTM LLC (NC)
- …Surveillance & Reconnaissance (C5ISR); Artificial Intelligence (AI)-enabled Processing, Exploitation & Dissemination (PED); Enterprise IT; Cybersecurity Location: ... Remote (priority geos: DC/MD/VA/NCR and Huntsville/Redstone) Travel: 40-60% (with quarter-end travel possibly higher) Clearance: Secret required; Top Secret / Sensitive Compartmented Information (TS/SCI) eligible preferred Reports to: Chief Executive Officer… more
- L3Harris (Nashville, TN)
- …and evaluate techniques for UAS discrimination, radar-video fusion, and micro-Doppler exploitation . + Lead experimentation involving radar, RF, and EO/IR sensors for ... CUxS mission scenarios. + Collaborate with systems and electronic warfare engineers to integrate CUxS solutions into operational architectures. + Support technology transition to fielded platforms through prototype demonstrations, TRL maturation, and customer… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …attacks, etc.) * Have published research regarding cybersecurity, software exploitation , or reverse engineering Physical Requirements Adequate visual acuity and ... manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission… more
- NVIDIA (Durham, NC)
- …threats such as XSS, JS Injection, SQL Injection, Token/Session exploitation + Excellent programming and problem-solving capabilities. With competitive salaries ... and a generous benefits package (www.nvidiabenefits.com ), we are widely considered to be one of the technology world's most desirable employers. We have some of the most forward-thinking and hardworking people in the world working for us and, due to… more
- Leidos (Alexandria, VA)
- …threats (internal and external), attacks, attack vectors and methods of exploitation with an understanding of intrusion set TTPs + Motivated self-starter ... with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings + Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework + Prior… more
- SAIC (Camp Smith, HI)
- …as precision targeting, unconventional warfare, and sensitive site exploitation -into Joint exercises across USINDOPACOM. Facilitate JELC Combined Joint ... All Domain Operations (CJADO) Working Groups coordination with CJADO FTX events to ensure seamless integration and execution. Understand SOCPAC priorities within the INDOPACOM AOR and provide recommendations on how to better synchronize them within USINDOPACOM… more