- Noblis (Chantilly, VA)
- …and software reverse engineering + Exploit development and sophisticated vulnerability research + Advanced network analysis and protocol manipulation for ... engineering of cyber actor tools and techniques to advance defenses + Conduct vulnerability research against host endpoints and service targets + Implement… more
- Cambridge International Systems Inc (Norfolk, VA)
- …assessment tools (eg, Metasploit, Cobalt Strike). + Hands on experience performing vulnerability research or developing proof-of-concept exploits. + Knowledge of ... + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial assessments. + Support the Cyber Survivability Test Planning… more
- CACI International (Florham Park, NJ)
- …* An active SCI clearance is highly desired. * Experience in cybersecurity research , vulnerability discovery, or exploit development in embedded or telecom ... Continental US * * * **The Opportunity:** We are seeking a Senior Embedded Software Engineer with deep expertise in embedded systems, telecommunications protocols,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena ... convergence of cybersecurity and the physical world in an interdisciplinary research and development environment. We focus on cyber-physical sensing, cyber-physical… more
- Leidos (Reston, VA)
- …candidate shall perform the following as part of a larger team:** * Vulnerability research and analysis, reversing engineering threats to determine methods of ... software through application security architecture software evaluations, web application vulnerability assessment penetration testing and fuzzing, malware research… more
- Robert Half Technology (Austin, TX)
- …identify an Information Security Engineer (contract). In this role, you will research and discover the latest threats on product, cloud infrastructure, workloads, ... scope, contain, and eradicate threats; perform root-cause analysis, forensics, reverse engineering, and postmortems. + Develop and refine security processes,… more
- Huntington Ingalls Industries (Usaf Academy, CO)
- …Salary Range: $119,574.00 - $170,000.00 Security Clearance: Secret Level of Experience: Senior This opportunity resides with Warfare Systems (WS), a business group ... anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We ... will work with a team of experts to conduct research and development related to compromise detection for Internet...this co-op. Requirements Candidates must be a junior or senior undergraduate, or a graduate, degree candidate in Computer… more
- Lockheed Martin (Denver, CO)
- …You will be the **Cyber Test Exploitation Engineer** for the research and development team, responsible for designing, executing, and automating exploitation‑focused ... for novel cyber‑engineering technologies\. + Conducting hands‑on penetration testing, vulnerability analysis, and proof‑of‑concept exploits against prototypes and operational… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We ... success of their missions. Requirements Candidates must be a junior or senior undergraduate, or a graduate, degree candidate in Computer Science, Computer… more