- Lockheed Martin (Colorado Springs, CO)
- …solution problem solving as part of Release development and delivery\. Lead the exploitation of Opportunities and the mitigation of Risks\. Responsible for the cost, ... schedule and technical performance and delivery of program contract commitments\. Closely coordinate with Contracts, Finance, Engineering Program Manager and functionally directs all phases of program from inception through completion\. Lead TBMCS Development… more
- Node.Digital (Arlington, VA)
- …scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation , covering tracks, etc.) * Knowledge of VM scanning, Web ... Application scanning, and red team processes * Experience recognizing and categorizing types of vulnerabilities and associated attacks * Knowledge of Computer Network Defense policies, procedures, and regulations * Knowledge of different operational threat… more
- NVIDIA (Santa Clara, CA)
- …reverse engineering and automation (IDA, Ghidra), fuzzing (AFL, WinAFL, Syzcaller) and exploitation (ROP, memory corruption) are important to success; as well as ... understanding of modern embedded cryptography and common security issues. + Experience with ARM / X86/RISCV assembly (include shellcode development) and low-level C programming paired with understanding and experience with micro-architectural attacks (side… more
- Executive Office for US Attorneys and the Office of the US… (Muskogee, OK)
- …matters involving organized crime, terrorism, international narcotics, child exploitation /child pornography, human trafficking, health care fraud, complex securities ... and fraud cases, and public corruption. The District also prosecutes violent crime cases which occur in Indian Country including homicide, sexual assault, assault, firearms and controlled substance offenses, and white collar offenses. Prior federal criminal… more
- Michigan State University (East Lansing, MI)
- …identity harassment, sexual harassment, sexual misconduct (sexual assault, sexual exploitation , dating violence, domestic violence, stalking, etc.), and retaliation. ... All applicants will be asked to sign an authorization and release, which authorizes the University to contact the candidate's current and former employers, for a period of 7 years prior to the date of application, related to any pending investigations,… more
- Michigan State University (East Lansing, MI)
- …identity harassment, sexual harassment, sexual misconduct (sexual assault, sexual exploitation , dating violence, domestic violence, stalking, etc.), and retaliation. ... All applicants will be asked to sign an authorization and release, which authorizes the University to contact the candidate's current and former employers, for a period of 7 years prior to the date of application, related to any pending investigations,… more
- CACI International (Fort Bragg, NC)
- …with your expertise applying efficient and effective AI/ML models; meaningful exploitation and analysis; and rapidly integrate and leverage new sources, methods ... and technology that account for non- technical end users in support of informed resource allocation and optimization, actionable insight, and meaningful anticipation and influence. Your expertise with advanced tools and computational analytics will be critical… more
- CACI International (Fort Bragg, NC)
- …desired. + Should possess an expert working knowledge of the discovery, analysis and exploitation of geospatial systems. - ** ** **What You Can Expect:** **A culture ... of integrity.** At CACI, we place character and innovation at the center of everything we do. As a valued team member, you'll be part of a high-performing group dedicated to our customer's missions and driven by a higher purpose - to ensure the safety of our… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …attacks, etc.) * Have published research regarding cybersecurity, software exploitation , or reverse engineering Physical Requirements Adequate visual acuity and ... manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission… more
- UCLA Fielding School of Public Health (Los Angeles, CA)
- …free of violence, harassment, bullying and other demeaning behavior, discrimination, exploitation , or intimidation. With this commitment as well as a commitment ... to addressing all forms of academic misconduct, UCLA conducts targeted employment reference checks for finalists to whom departments or other hiring units would like to extend formal offers of appointment into Academic Senate faculty positions. The targeted… more