- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- … security features. Develop reliable exploits targeting user applications, system services, kernel drivers, virtualization layers, and firm ware subsystems. ... Windows Vulnerability Researcher Key Role: Deliver production-grade offensive capabilities as...HS diploma or GED Additional Qualifications: + Experience publishing research or tools recognized within the offensive security… more
- Carnegie Mellon University (Pittsburgh, PA)
- …practices and serves as a national resource in software engineering, computer security , and process improvement. The SEI works closely with defense and government ... organizations, industry, and academia to continually improve software-intensive systems . Our core purpose is to help organizations improve...an applicant for the role of a Reverse Engineer Researcher for the Threat Analysis directorate. The SEI is… more
- Parsons Corporation (West Melbourne, FL)
- …/Reverse Engineer** to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero ... throughout all layers of the network stack + Software development for embedded/IOT systems ** Security Clearance Requirement:** An active Top Secret security … more
- Coinbase (Montgomery, AL)
- …build the emerging onchain platform - and with it, the future global financial system . To achieve our mission, we're seeking a very specific candidate. We want ... of crypto and blockchain technology to update the financial system . We want someone who is eager to leave...from emerging risks. As an Onchain Data Analyst & Researcher , you'll lead challenging investigations into illicit activity, proactively… more
- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- …polygraph + HS diploma or GED Additional Qualifications: + Experience with publishing research or tools in the offensive security community + Experience ... Android Vulnerability Researcher Key Role: D eliver production-grade offensive capabilities that directly enable strategic intelligence collection and cyber effects… more
- Nightwing (Annapolis Junction, MD)
- …intelligence community, defense, civil, and commercial markets. Job Description **Vulnerability Researcher :** Use advanced systems to find zero-day (O-day) ... Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers'… more
- JPMorgan Chase (New York, NY)
- …As an Applied AI ML Researcher Lead in the CIB Applied AI ML Research team, you will be a builder, a scientific pioneerand mentor who bridges the gap ... betweenleading edge theory and enterprise-grade,large-scale,deployable systems . **Job Responsibilities:** + Architect and develop GenAI and agentic solutions to… more
- Microsoft Corporation (Redmond, WA)
- …deep learning machine learning methods. **\#cybersecurity #machine-learning #ml #ai #llm #MSFTSECURITY** Security Research IC5 - The typical base pay range for ... and maintain client-side and cloud machine learning and automation systems that powers cybersecurity protection in our products and...language models or machine learning. + 1+ years leading security initiatives and publishing research . + 1+… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Space Systems Analysis and Test Group aims to solve our nation's most demanding space-related security challenges backed by validated analysis, prototyping, ... skilled scientists and engineers with deep and broad space systems experience, eager to be on the leading edge...Group aims to solve our nation's most demanding space-related security challenges backed by validated analysis, prototyping, and field… more
- Palo Alto Networks (Santa Clara, CA)
- …emerging attack vectors. + Build innovative projects on Linux and Windows systems to advance next-generation security technologies. **Your Experience** + Team ... making a direct impact on securing organizations worldwide. **Your Impact** + Research the root causes of publicly disclosed vulnerabilities and develop effective… more