- Microsoft Corporation (Redmond, WA)
- …by default are architected into everything we do. Additionally, we perform proactive vulnerability research and analysis at scale to highlight high risk attack ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection + OR Master's Degree… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- Summary NSA's Mathematics Research Group conducts world-class mathematical research with the objective of developing new and innovative techniques and ... We are actively seeking mathematicians to join our Mathematics Research Group. For more information, please visit: https://apply.intelligencecareers.gov/job-description/1252528 Responsibilities… more
- University of Michigan (Ann Arbor, MI)
- Research Fellow in Environmental Justice Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the ... to (can be added as citations) + Optional: Link(s) to academic presentations or research -related interviews that you've engaged in Note: This position will be a one… more
- University of Michigan (Ann Arbor, MI)
- Research Area Specialist Assoc Apply Now **How to Apply** To be considered for the position, you will need to provide all elements of the following as a single ... programming languages (eg Stata, SAS, Matlab, ArcGIS) Your prior experience as a research assistant, in the private sector, and/or with independent research … more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …addition, relevant experience may also include engineering hardware and/or software , programming, computer/network security, vulnerability analysis, penetration ... Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply… more
- CACI International (Florham Park, NJ)
- …* An active SCI clearance is highly desired. * Experience in cybersecurity research , vulnerability discovery, or exploit development in embedded or telecom ... Cyber Embedded Software Engineer Job Category: Engineering Time Type: Full...stacks-including signaling, control plane, and data plane components-to support vulnerability discovery. * Perform firmware extraction, binary diffing, static… more
- Truist (Atlanta, GA)
- …Solutions on public/private cloud. 6. Maintains a broad knowledge of operating systems, software , databases, and hardware. 7. Research new developments in system ... cloud-based applications and help maintain stable SAP applications via vulnerability management, on-call support, and collaboration on major infrastructure changes.… more
- University of Utah (Salt Lake City, UT)
- …**Open Date** 01/02/2026 **Requisition Number** PRN43931B **Job Title** Clinical Research Coordinators (Non-R.N.) **Working Title** Clinical Research Coordinator ... Date (Note - Posting may close at any time)** **Job Summary** **Clinical Research Coordinator (Non-R.N.)** The University of Utah College of Health and Department of… more
- University of Southern California (Los Angeles, CA)
- …whole through the cultivation and enrichment of the human mind and spirit." The Brain Research on Anxiety Vulnerability and Emotion (BRAVE) Lab is seeking a ... or procedures to others. + Broad knowledge of relevant research computer software . + Competency in project management. + Demonstrates strong interpersonal… more
- Texas A&M University System (College Station, TX)
- …by developing and delivering talks, tutorials, workshops, and short courses. Develop software packages to implement lab research results and provide consultation ... Job Title Postdoctoral Research Associate, SPARTA Agency Texas A&M University Department...+ Working knowledge of OT/ICS/IIoT security, intrusion detection, and vulnerability assessment for critical infrastructures. + Proficiency in system… more