- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- CACI International (Florham Park, NJ)
- …technologies and products (eg IP/MPLS, 4G/5G wireless, Optical Transport, etc.). + Vulnerability research to identify and evaluate security strengths and ... various technologies. + Perform reverse engineering tasks on Windows, Linux, mobile device and other embedded platforms. **Qualifications:** _Required:_ + Software… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply ... perform discovery and target technology analysis of digital network and mobile communications. Digital Network Exploitation Analysts are hired into positions… more
- TIAA (Charlotte, NC)
- …objectives and client outcomes + **Collaborate on strategic presentations and research projects,** contributing to PowerPoint and Excel deliverables and analytical ... to ensure seamless information flow across teams + **Drive independent research initiatives** to gather market intelligence, competitive analysis, and supporting… more
- Two95 International Inc. (San Jose, CA)
- …identifying and fixing vulnerabilities in software and applications. + Perform vulnerability research , assessment and management, serve as technical ... best practices regarding security in software development, IoT platform, mobile application, user interface design frameworks, high performance messaging solutions,… more
- Two95 International Inc. (San Jose, CA)
- …and identifying and fixing vulnerabilities in software and applications. *Perform vulnerability research , assessment and management, serve as technical ... best practices regarding security in software development, IoT platform, mobile application, user interface design frameworks, high performance messaging solutions,… more
- Google (Kirkland, WA)
- …security metrics and risk mitigation. + Experience with large-scale vulnerability life-cycle management. + Experience building scalable software systems. **About ... and data storage, security, artificial intelligence, natural language processing, UI design and mobile ; the list goes on and is growing every day. As a software… more
- EMCOR Group (Columbus, OH)
- …network security asestablishedby EMCOR policy. + Computer, software, printer, & mobile device inventory, setup, andmaintenance + Antivirus and patch management and ... + Coordinate investigations to resolve information system issues + Conducts research to understand, explain and resolve technology issues + Communicatesupdates to… more
- JPMorgan Chase (Plano, TX)
- …that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best ... of the following: Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security… more
- Stony Brook University (Stony Brook, NY)
- …justice. We intentionally and relentlessly pursue excellence through introspection, vulnerability , empathy, compassion, learning, and courage. We value our internal ... mobility. + Awarded multiple distinctions including philanthropic awards and research grants in experiential learning and career development, voter engagement,… more