- Parsons Corporation (Charlotte, NC)
- …engineers to join our team of subject matter experts in embedded development, vulnerability research , and reverse engineering. In this role, you'll support an ... innovative software for tools and capabilities related to computer security, vulnerability research , reverse engineering, and product development. + **Low-Level… more
- MIT Lincoln Laboratory (Lexington, MA)
- …empowered to solve complex security problems in close collaboration with Laboratory research teams and Government counterparts. Our people are our most important ... remote work arrangements. Who are we? MIT Lincoln Laboratory is a Federally Funded Research and Development Center (FFRDC) whose mission is research in support… more
- Amentum (Fort Belvoir, VA)
- …cyber architecture, and developing cyber emulative courses of action pertaining to vulnerability assessment. The Red Cell Cyber Analyst is responsible for providing ... Red Cell Cyber Analyst will deploy in direct support of specific vulnerability assessments to provide local SME advisory. **Responsibilities/Tasks** The Red Cell… more
- Noblis (Chantilly, VA)
- …and managing complex network environments; management of covert and virtualized systems; vulnerability research and analysis; and use of open-source penetration ... cyber actor tools and techniques to advance defenses + Conduct vulnerability research against host endpoints and service targets + Implement secure development… more
- Noble Supply & Logistics (New York, NY)
- …The position is responsible for conducting comprehensive threat and vulnerability assessments, ensuring compliance with federal and international standards, and ... and implementation of detection, decontamination, and response systems. * Support research , testing, and evaluation of CBRNE materials, sensors, and response… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Response (SIR): enrichment, correlation rules, and automated playbooks. + Vulnerability Response (VR): scanner integrations, remediation workflows, patch group… more
- WuXi AppTec (St. Paul, MN)
- …integrations. * Configures and maintains EDR/antivirus. * Configures and maintains vulnerability management platform, including areas such as vulnerability ... and source feeds, alerts and alarms * In depth knowledge in Qualys Vulnerability Management System, which includes configuring and maintaining * In depth knowledge… more
- NANA Regional Corporation (Alexandria, VA)
- …Collect relevant data from a variety of sources to perform incident and vulnerability analysis to recommend threat and vulnerability risk mitigation strategies. ... measures for the protection of computer networks and information + Analyze logs, research IT and OT technology, and communicate findings both verbally and written.… more
- BOOZ, ALLEN & HAMILTON, INC. (San Antonio, TX)
- …tools. You'll use your curiosity for technology and emerging trends to research and develop modern security solutions. Leveraging your experience with platforms such ... Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises.… more
- Amentum (Fort Meade, MD)
- …protocols and applications, and trending technologies. + Conducting target research from various sources, identifying vulnerabilities, indicators and warnings, ... systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems… more