- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …processes + Working knowledge of Computer Network vulnerability /compliance analysis software **COMPANY INFORMATION:** Applied Research Associates, Inc. is an ... **Description** The Mission Concepts and Capabilities (MCC) Division of Applied Research Associates, Inc (ARA) has an immediate opening to support a team conducting… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …processes + Working knowledge of Computer Network vulnerability /compliance analysis software **COMPANY INFORMATION:** Applied Research Associates, Inc. is an ... **Description** The Mission Concepts and Capabilities (MCC) Division of Applied Research Associates, Inc. (ARA) has teams conducting cyber assessments of… more
- The Walt Disney Company (Orlando, FL)
- …cybersecurity concepts, including firewalls, intrusion detection/prevention systems, anti-malware software , data encryption, VPNs, vulnerability scanners, server ... capabilities to enhance operational efficiency. **Team Description:** The Security Research and Testing (SRT) team specializes in simulating real-world cyberattacks… more
- Applied Research Solutions (Bedford, MA)
- …contingency plans and disaster recovery procedures. + Experience with compliance and vulnerability and software scanning tools (STIGs, Nessus, ACAS, SCC/ SCAP, ... Systems Security Engineer (ISSE) candidate located at Hanscom, AFB. Applied Research Solutions (ARS) is respected as a world-class provider of technically… more
- Cipher Tech Solutions (Vienna, VA)
- …maintaining strong proficiency in software development, reverse engineering, and vulnerability research . You will apply your foundational knowledge of RE, ... Vienna, VA, USA | Software Development | Hourly | 62.00-125.00 per hour...proficiency in reverse engineering with an aptitude for performing vulnerability research . + Must be possess strong… more
- Microsoft Corporation (Redmond, WA)
- … development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection. + OR Master's Degree ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection. + OR Bachelor's… more
- MUFG (Jersey City, NJ)
- …Summary:** This role focuses on comprehensive application security testing and vulnerability management across the software development lifecycle. It involves ... leverage deep expertise in application security testing, secure coding, and vulnerability management to enhance the security posture of enterprise applications. The… more
- CACI International (Sterling, VA)
- …to work 100% on-site. You will help perform important reverse engineering and vulnerability research to help our exploitation mission. You will work, both ... to enhance the nation's cybersecurity posture. **Responsibilities:** + Conduct vulnerability analysis on software /firmware to identify potential weaknesses… more
- Google (Mountain View, CA)
- …would be an advantage: + Experience with adversarial research , red-teaming, or vulnerability research , particularly in complex software or AI/ML systems. ... About Us As part of the Security & Privacy Research Team at Google DeepMind, you will play a...You We are looking for a creative and rigorous researcher who is passionate about tackling the foundational safety… more
- Google (Seattle, WA)
- …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... Software Engineer III, Chrome Product Security, Core _corporate_fare_...creating new automation that will directly impact the Chrome vulnerability life-cycle and ensure that we are able to… more