- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Amazon (Arlington, VA)
- …utilized throughout Amazon and AWS. Beyond direct technical work on exploits, vulnerability research , and threat intelligence, the Cyber Threat Exploitation ... drive effective technical countermeasures. Key job responsibilities * Identify, research , and analyze novel vulnerabilities discovered in threat intelligence data,… more
- Lowe's (Mooresville, NC)
- …staff. + Maintain an awareness of information security news and trends and research current technologies to assist in the development of new capabilities. + ... in-memory execution frameworks, and covert initial access payloads across Windows, Linux , macOS, and cloud-native platforms. + Engineer advanced evasion techniques… more
- UIC Government Services and the Bowhead Family of Companies (Dahlgren, VA)
- …(EDOS-2026-24469): Bowhead seeks a Systems Administrator with Red Hat Enterprise Linux experience. The System Administrator will provide Information Technology (IT) ... non-standard propriety support of various test equipment used for Research , Development, Testing, and Evaluation (RDT&E) of proof of...to: + Able to manage a wide range of Linux based applications related to engineering and scientific tasking,… more
- Lockheed Martin (Denver, CO)
- **Description:** You will be an Embedded Cyber Software Engineer for a research and development team which is responsible for investigating and exploiting the newest ... the software development lifecycle \(threat modeling, hardening, code reviews, vulnerability assessments\)\. + Collaborating with customers throughout the development… more
- CGI Technologies and Solutions, Inc. (Bethesda, MD)
- …variety of digital storage devices. . Conduct reverse engineering, failure analysis, vulnerability analysis, and other research techniques to understand complex ... Assembly language, etc. . Experience with Operating Systems: Windows, Linux , iOS, Android, Embedded Linux , RTOS, etc....Operating Systems: Windows, Linux , iOS, Android, Embedded Linux , RTOS, etc. . Knowledge of communication protocols (eg,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... development and testing across multiple platforms, including Windows, macOS, Linux , mobile, and embedded environments. + Collaborate effectively with… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... development environment, and Cloud automation. The SysA demonstrates strong Linux /Windows administration experience, including package management, security hardening, kickstart,… more
- CAE USA INC (Arlington, TX)
- …The ISSE participates with software and hardware approvals assisting with research , providing analysis, assessing risk and making recommendations. The ISSE also ... Management: Firewalls, Data Protection Controls, + Patching, Encryption, Certificates, vulnerability scanning (ACAS/SCAP/E-STIG). + Continuous Monitoring . Patch/STIG .… more