- Carnegie Mellon University (Pittsburgh, PA)
- …systems and how attackers adapt their tradecraft to exploit those vulnerabilities. + Reverse engineer malicious code in support of high-impact customers, design ... + You have practical experience with applying cybersecurity knowledge toward vulnerability research , analysis, disclosure, or mitigation. + You have… more
- ManTech (Annapolis Junction, MD)
- …configuring, and troubleshooting Linux. + Experience in embedded systems. + Experience in reverse engineering and vulnerability research of hardware and ... reviews to ensure the quality, security, and performance of developed software. + Reverse engineer complex hardware and software systems to understand their… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …review applications during this time. *Responsibilities Include:* * Analyze ( reverse engineer ) anomalous/malicious software and hardware firmware/binaries. * ... to verify and validate patch effectiveness. * Conduct penetration testing and vulnerability assessments. Perform advanced analysis and/or reverse engineering of… more
- Cambridge International Systems Inc (Norfolk, VA)
- …planning or exploitation analysis Te chnical Expertise: + Demonstrated ability to reverse engineer , exploit, or emulate real-world cyber threats across networked ... assessment tools (eg, Metasploit, Cobalt Strike). + Hands on experience performing vulnerability research or developing proof-of-concept exploits. + Knowledge of… more
- MIT Lincoln Laboratory (Lexington, MA)
- …research and development in Radio Frequency (RF) signal analysis + Reverse - engineer hardware and/or software systems and develop proof-of-concept capabilities ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Draper (Boston, MA)
- …and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a wide range of ... systems, compiler theory, threat intelligence, fuzzing, binary analysis, and vulnerability research . Job Description: Duties/Responsibilities * Assess hardware… more
- Belay Technologies (Annapolis Junction, MD)
- …Net Developer for our intel team. You will act as a general-purpose CNO reverse engineer for network-based devices for up-and-coming projects where you will ... developing CNO specific software in Linux/Windows/Embedded applications. + Experience with Vulnerability Research and Exploit development. + Knowledge of… more
- UL, LLC (Northbrook, IL)
- …in customer offices or UL premises to analyze the evaluated product. + Once the vulnerability analysis is done the engineer defines the test plan with the ... tools development, new attack development, analysis tools. + Security activities requires engineer to be at the-state-of-the-art. + Research , development and the… more
- Palo Alto Networks (Santa Clara, CA)
- …Go, C++). + Strong experience in reverse engineering, system security, threat research , malware/code analysis or vulnerability research is a big plus ... precision that drives great outcomes. **Your Career** We are seeking a security research engineer to join our pioneering security team. This role is for a… more