- Nightwing (Pensacola, FL)
- …technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and ... Professional (CCSP) or similar certification + Certifications supporting exploitation and reverse engineering techniques. **Required Education** + Ten (10) or more… more
- Huntington Ingalls Industries (Huntsville, AL)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... us to support sensitive missions for the US military and federal agency partners. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission… more
- Huntington Ingalls Industries (Huntsville, AL)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... us to support sensitive missions for the US military and federal agency partners. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission… more
- Huntington Ingalls Industries (Wright Patterson AFB, OH)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... us to support sensitive missions for the US military and federal agency partners. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission… more
- Oracle (Seattle, WA)
- …driving change/ improvement through data driven decisions. You will work alongside software development teams to ensure service and feature parity for government ... - Methodical approaches to troubleshooting and solving complex technical problems, reverse engineering existing applications - Producing documentation in support of… more
- Northrop Grumman (Chantilly, VA)
- …global security environments, Northrop Grumman brings informed insights and software -secure technology to enable strategic planning. We're looking for innovators ... PhD. + Experience in the design and development of microelectronics, reverse engineering, an overall understanding of custom electrical engineering techniques used… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable ... us to support sensitive missions for the US military and federal agency partners. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …periodically review applications during this time. *Responsibilities Include:* * Analyze ( reverse engineer ) anomalous/malicious software and hardware ... penetration testing and vulnerability assessments. Perform advanced analysis and/or reverse engineering of suspect source code, including compiled executables. *… more
- Insight Global (Carol Stream, IL)
- …Responsibilities * Design and implement new features based on requirements. * Reverse engineer existing legacy applications with and eye towards moving ... Job Description The Software Developer will design, develop and implement applications...Design and implement new features based on requirements. * Reverse engineer existing legacy applications with and… more
- CACI International (Chantilly, VA)
- …**teaming and penetration** **testing of the client's** **global network** **You will reverse engineer network layouts using data collected from the network ... software , firmware and hardware using a variety of reverse engineering techniques to understand possible security vulnerabilities and potential… more