- UL, LLC (Northbrook, IL)
- …advanced hardware penetration tests, hacking to identify issues in embedded products and software . + Perform code review in customer offices or UL premises to ... analyze the evaluated product. + Once the vulnerability analysis is done the engineer defines the test...the test plan with the project leader. + Perform software penetration testing for evaluation with regards to reverse… more
- Northrop Grumman (San Antonio, TX)
- …actions. + **Emerging Technology and Process Improvement** + Conduct investigations, software and hardware research , and inspections of emerging technologies. ... global security environments, Northrop Grumman brings informed insights and software -secure technology to enable strategic planning. We're looking for innovators,… more
- Themis Insight (Linthicum Heights, MD)
- …change based on central MD client's needs. Required: TS/SCI with a Polygraph Designs software tools and subsystems to support software reuse and domain analyses ... and manages their implementation. Manages software development and support using formal specifications, data flow...gap analysis and at the direction of the Government, research and evaluate commercial products capable of eliminating the… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Northrop Grumman (Fairfax, VA)
- …security certification test, security documentation, as well as investigations, software research , hardware introduction and release, emerging technology ... global security environments, Northrop Grumman brings informed insights and software -secure technology to enable strategic planning. We're looking for innovators… more
- University of Pennsylvania (Philadelphia, PA)
- …private employer in Philadelphia, is a world-renowned leader in education, research , and innovation. This historic, Ivy League school consistently ranks among ... toolsets fo r both on-premise and public-cloud resources; active monitoring of vulnerability scans; assist in working with peers and/or security vendors in defining… more
- Amazon (Arlington, VA)
- …utilized throughout Amazon and AWS. Beyond direct technical work on exploits, vulnerability research , and threat intelligence, the Cyber Threat Exploitation ... the life The Amazon Cyber Threat Intelligence (ACTI) - Vulnerability & Exploitation team is responsible for developing actionable...or MS degree - 5+ years experience Threat Intelligence research and analysis related to software exploits… more
- Northrop Grumman (Bethpage, NY)
- …coordination, system assessment, security documentation, as well as investigations, software research , hardware introduction and release, emerging technology ... evaluations such as compliance audits and active evaluations such as vulnerability assessments. + Establish strict program control processes to ensure mitigation… more
- Adecco US, Inc. (Knoxville, TN)
- …security solutions, including firewalls, intrusion detection systems, encryption, and vulnerability management tools. + Implement and manage security measures for ... policies, data loss prevention (DLP), and advanced threat protection (ATP). + Research , prototype, and recommend new security tools, processes, or capabilities that… more
- Bandwidth (Raleigh, NC)
- …Are: Bandwidth, a prior "Best of EC" award winner, is a global software company that helps enterprises deliver exceptional experiences through voice, messaging, and ... expertise to integrate security, automation, and observability across Bandwidth's software development and infrastructure environments. This role focuses on… more