- GliaCell Technologies (Fort Meade, MD)
- Are you a Senior Embedded Developer who is ready for a new challenge that will launch your career to the next level? + Tired of being treated like a company drone? + ... our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent… more
- Belay Technologies (Annapolis Junction, MD)
- …C, C++), vulnerability assessment, reverse engineering. Experience Level: Entry-level to Senior CNO Reverse Engineer (Levels 1 to 3) Overview: The ... CNO Reverse Engineer will deconstruct and analyze malicious software and network... reverse engineering techniques. Experience Level: Junior to Senior Database Engineer Overview: Database Engineers will… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …review applications during this time. *Responsibilities Include:* * Analyze ( reverse engineer ) anomalous/malicious software and hardware firmware/binaries. * ... to verify and validate patch effectiveness. * Conduct penetration testing and vulnerability assessments. Perform advanced analysis and/or reverse engineering of… more
- Cambridge International Systems Inc (Norfolk, VA)
- …planning or exploitation analysis Te chnical Expertise: + Demonstrated ability to reverse engineer , exploit, or emulate real-world cyber threats across networked ... + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial assessments. + Support the Cyber Survivability Test Planning… more
- MIT Lincoln Laboratory (Lexington, MA)
- …research and development in Radio Frequency (RF) signal analysis + Reverse - engineer hardware and/or software systems and develop proof-of-concept capabilities ... advanced and novel sensors, digital processing, side-channel analysis, AI/ML, reverse engineering, system exploitation, and RF communications. Position Description… more
- MUFG (Tampa, FL)
- …emulation, lateral movement, privilege escalation, and persistence operations + Reverse engineer proof-of-concept exploits and assess their applicability ... to plan and execute Red Team operations. You will collaborate with senior operators, threat intelligence, and detection engineering teams to emulate real-world… more