- Silvus Technologies (Los Angeles, CA)
- …those who keep us safe. We do so by delivering the most advanced Mobile Ad-hoc Network (MANET) radios powered by our custom and ever-evolving Mobile -Networked ... Silvus' rapid growth is fueled by a focus on research and innovation and a team of the most...Familiarity with Linux security tools like Auditd, Lynis, or vulnerability scanners. + **Security Clearance: Active US Government SECRET… more
- Bank of America (Denver, CO)
- …and emerging threats. Key responsibilities include leading and performing research , understanding the bank's security policies, working with appropriate partners ... assessments across a multitude of technologies including web UI, web APIs, mobile and cloud, including associated source code. Key Responsibilities in order of… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... summaries and in-depth technical reports - Provide expert support, analysis, and research with only broad direction into exceptionally complex problems and processes… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... UX Expert. In this role, responsibilities would include conducting user research , creating wireframes and prototypes, and advocating for user-centered design… more
- Auburn University (Auburn, AL)
- …IT professional with a passion for finding creative solutions that support cutting-edge research with real-world impact? Do you have a driving sense of curiosity, ... collaborative IT team where you can personally contribute to life-changing research implementing and supporting a complex client and server network made… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... and testing across multiple platforms, including Windows, macOS, Linux, mobile , and embedded environments. + Collaborate effectively with cross-functional teams… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Ally (Raleigh, NC)
- …testing against products and systems, including web applications, web services, and mobile devices. * Work closely with engineering to design, test, and maintain ... areas. * Participate in threat modeling exercises. * Effectively communicate vulnerability details, risks, and potential impacts to, application owners, developers,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... techniques, and reduce the chance of detection while conducting mobile operations. **Preferred Qualifications** + Experience with commercial telecommunications… more
- CACI International (Florham Park, NJ)
- …technologies and products (eg IP/MPLS, 4G/5G wireless, Optical Transport, etc.). + Vulnerability research to identify and evaluate security strengths and ... various technologies. + Perform reverse engineering tasks on Windows, Linux, mobile device and other embedded platforms. **Qualifications:** _Required:_ + Software… more