- Citigroup (Tampa, FL)
- …sorts of technologies on an enterprise-scale, so hunger for knowledge and research is greatly appreciated and rewarded. Technology is constantly evolving, and Citi ... of Citi owned or 3rd party SaaS applications (Web, Mobile , Thick Client, and APIs) leveraging a wide array...writing and presentation skills to report and articulate the vulnerability assessment results to any audience. + Contribute to… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Parsons Corporation (Annapolis Junction, MD)
- …reverse engineering on complex binaries and firmware (x86, ARM, MIPS). + Conduct vulnerability research and analysis across mobile , embedded, and traditional ... engineers. This role involves deep technical work across reverse engineering, vulnerability assessments, and mobile and embedded systems development. Successful… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **CODEX Culture** Our organization… more
- University of Michigan (Ann Arbor, MI)
- Research Data Security Analyst Intermediate Apply Now **How to Apply** A cover letter and resume are important submissions for the hiring team to get a sense of your ... University of Michigan has an exciting opportunity for a Research Data Security Analyst Intermediate to join the IT...website: http://its.umich.edu/ Positions that are eligible for hybrid or mobile /remote work mode are at the discretion of the… more
- University of Michigan (Ann Arbor, MI)
- Research Area Specialist Assoc Apply Now **How to Apply** To be considered for the position, you will need to provide all elements of the following as a single ... programming languages (eg Stata, SAS, Matlab, ArcGIS) Your prior experience as a research assistant, in the private sector, and/or with independent research … more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Noblis (Bethesda, MD)
- …to tackle offensive and defensive cyber challenges. They'll dive deep into vulnerability research , reverse engineering threats, and craft advanced tools and ... and develop any solution tailored to the area of need. + Conduct vulnerability research and analysis of identified platforms, reversing engineering threats to… more
- Medtronic (Mounds View, MN)
- …requirement tracking. + Oversee security monitoring, incident response, vulnerability assessments, mitigation implementation, and product-level intrusion detection ... and information assurance. + Experience as an analyst, engineer, developer, researcher or architect with responsibility and/or demonstratable knowledge in two or… more
- Google (Seattle, WA)
- …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... security, artificial intelligence, natural language processing, UI design and mobile ; the list goes on and is growing every...creating new automation that will directly impact the Chrome vulnerability life-cycle and ensure that we are able to… more