• Senior Information Assurance Engineer

    GovCIO (San Antonio, TX)
    …traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security ... research . Prepares security reports for government agencies. + Performs...Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security. + Provides business continuity… more
    GovCIO (11/14/25)
    - Related Jobs
  • Associate Director, Cyber Defense - OIT

    Emory Healthcare/Emory University (Atlanta, GA)
    **Discover Your Career at Emory University** Emory University is a leading research university that fosters excellence and attracts world-class talent to innovate ... overseeing cybersecurity detection engineering, managing threat intelligence and Emory's vulnerability management program, and coordinating incident response efforts across… more
    Emory Healthcare/Emory University (10/16/25)
    - Related Jobs
  • Red Team Operator

    Amentum (Norfolk, VA)
    …and documentation for DCAT authorization established in DoDI 8585.01. + Research , review, prioritize, and submit operational requirements for acquisition of ... execution of TTPs for penetration testing or Red Teaming. + Research adversary cyber actors' TTPs, organizational structures, capabilities, personas, and… more
    Amentum (11/12/25)
    - Related Jobs
  • Senior Security Researchers

    Microsoft Corporation (Redmond, WA)
    …everyone can thrive at work and beyond._ **Responsibilities** As a Senior Security Researcher , you will: + Research emerging attack vectors and techniques. + ... of AI workflows or generative AI/LLM frameworks. + Experience in vulnerability analysis and exploit development. **\#MSFTSecurity** Security Research IC3… more
    Microsoft Corporation (11/26/25)
    - Related Jobs
  • Cybersecurity Test Engineer, Penetration Tester

    COLSA Corporation (Shalimar, FL)
    …other penetration test tools. Additional experience can include vulnerability analysis, network/security engineering, network protocol structures, interpreted and ... Certified Professional (OSCP); GIAC Penetration Tester (GPEN); GIAC Exploit Researcher and Advanced Penetration Tester (GXPN); Certified Ethical Hacker (CEH);… more
    COLSA Corporation (12/24/25)
    - Related Jobs
  • Senior EASM Engineer - External Attack Surface…

    Vanguard (Malvern, PA)
    …common validation tasks. + Support VDP oversight: Provide governance for researcher communications, proof-of-fix validation, and SLA adherence. What You'll Bring + ... 7+ years in vulnerability engineering or external attack surface security, with proven...across the enterprise. + Growth pathways into offensive security, vulnerability management, security architecture, or program ownership. Special Factors… more
    Vanguard (12/09/25)
    - Related Jobs
  • Red Cell Analyst-1

    Amentum (Fort Belvoir, VA)
    …programs. Responsibilities/Tasks The Analyst shall: + Characterize the adversary. Research the structure, ideology, intentions, tactics, and capabilities of ... and collection plans, identify information sources, and develop and conduct research of publicly available information (PAI) in order to determine adversary… more
    Amentum (11/06/25)
    - Related Jobs
  • Software Engineer III, Chrome Product Security,…

    Google (Kirkland, WA)
    …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... creating new automation that will directly impact the Chrome vulnerability life-cycle and ensure that we are able to...you will gain knowledge of our security bug triage, vulnerability management, security fix release, and Vulnerability more
    Google (12/12/25)
    - Related Jobs
  • Information Systems Security Engineers (Multiple…

    Noblis (Philadelphia, PA)
    …Surface Warfare Center (NSWCPD) and their missions' to enable research , development, test and evaluation, acquisition, engineering, systems integration, in-service ... + Update eMass Artifacts including Lab Portfolio, Testing Evidence, and Vulnerability POA&M + Execute USN Cybersecurity Pre-Installation Checkout (PICO) Procedure on… more
    Noblis (12/06/25)
    - Related Jobs
  • Information Assurance - Cybersecurity

    Noblis (Bethesda, MD)
    …to tackle offensive and defensive cyber challenges. They'll dive deep into vulnerability research , reverse engineering threats, and craft advanced tools and ... any solution tailored to the area of need. + Conduct vulnerability research and analysis of identified platforms, reversing engineering threats to determine… more
    Noblis (12/18/25)
    - Related Jobs