- Lockheed Martin (Hanover, MD)
- …to support cyber offensive, defense and full spectrum cyber operations\. Conducts vulnerability research , reverse engineering, penetration testing \(red/blue ... of subject matter \(hardware, software, networks, cloud, etc\.\) to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit… more
- ManTech (Annapolis Junction, MD)
- …configuring, and troubleshooting Linux. + Experience in embedded systems. + Experience in reverse engineering and vulnerability research of hardware and ... reviews to ensure the quality, security, and performance of developed software. + Reverse engineer complex hardware and software systems to understand their… more
- MIT Lincoln Laboratory (Lexington, MA)
- …research and development in Radio Frequency (RF) signal analysis + Reverse - engineer hardware and/or software systems and develop proof-of-concept capabilities ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Cambridge International Systems Inc (Norfolk, VA)
- …planning or exploitation analysis Te chnical Expertise: + Demonstrated ability to reverse engineer , exploit, or emulate real-world cyber threats across networked ... assessment tools (eg, Metasploit, Cobalt Strike). + Hands on experience performing vulnerability research or developing proof-of-concept exploits. + Knowledge of… more
- Draper (Boston, MA)
- …and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of ... systems, compiler theory, threat intelligence, fuzzing, binary analysis, and vulnerability research . Job Description: Duties/Responsibilities * Assess hardware… more
- Belay Technologies (Annapolis Junction, MD)
- …Net Developer for our intel team. You will act as a general-purpose CNO reverse engineer for network-based devices for up-and-coming projects where you will ... developing CNO specific software in Linux/Windows/Embedded applications. + Experience with Vulnerability Research and Exploit development. + Knowledge of… more
- UL, LLC (Northbrook, IL)
- …in customer offices or UL premises to analyze the evaluated product. + Once the vulnerability analysis is done the engineer defines the test plan with the ... tools development, new attack development, analysis tools. + Security activities requires engineer to be at the-state-of-the-art. + Research , development and the… more