• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be contributing to the… more
    MIT Lincoln Laboratory (09/24/25)
    - Related Jobs
  • Operational Cyber Researcher

    BOOZ, ALLEN & HAMILTON, INC. (Chantilly, VA)
    Operational Cyber Researcher and Capabilities Engineer, Senior Key Role: Conducts testing and analysis to identify vulnerabilities and potential threat vectors ... building, and testing operational prototypes + Experience applying vulnerability research methods across code, binary analysis, and systems...with performing network analysis and design + Knowledge of cyber threat actor TTPs and how they map to… more
    BOOZ, ALLEN & HAMILTON, INC. (09/22/25)
    - Related Jobs
  • Exploitation Analyst - Top Secret Clearance…

    Cambridge International Systems Inc (Norfolk, VA)
    …Expertise: + Demonstrated ability to reverse engineer, exploit, or emulate real-world cyber threats across networked and embedded systems . + Familiarity with ... Exploitation Analyst - Top Secret Clearance | Norfolk, VA Cambridge International Systems , Inc. Join a dynamic global team united by shared values: commitment,… more
    Cambridge International Systems Inc (09/04/25)
    - Related Jobs
  • Digital Network Exploitation Analyst 1-4…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
    Amentum (07/15/25)
    - Related Jobs
  • Early Career Vulnerability Researcher

    Battelle Memorial Institute (Columbus, OH)
    …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
    Battelle Memorial Institute (07/27/25)
    - Related Jobs
  • Senior Vulnerability Researcher & Reverse…

    Parsons Corporation (West Melbourne, FL)
    …/Reverse Engineer** to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero ... Days). **What You'll Be Doing:** + Reverse engineering systems and software executables using tools like Ghidra, Binary Ninja, or IDA Pro + Identifying potential… more
    Parsons Corporation (09/05/25)
    - Related Jobs
  • Digital Network Exploitation Analyst

    CACI International (Chantilly, VA)
    …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
    CACI International (07/31/25)
    - Related Jobs
  • Digital Network Exploitation Analyst…

    Deloitte (Baltimore, MD)
    …Do As a Project Delivery Manager on the project, as a Digital Network Exploitation Analyst you will: + Apply data and technical expertise to perform file signature ... and report intelligence-derived significant network events and intrusions + Conduct research and analysis at the operational or strategic level + Communicate… more
    Deloitte (09/12/25)
    - Related Jobs
  • Group 05-51 | SRP Intern | Cyber -Physical…

    MIT Lincoln Laboratory (Lexington, MA)
    …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
    MIT Lincoln Laboratory (09/17/25)
    - Related Jobs
  • Cyber Software Engineer Sr (Embedded)

    Lockheed Martin (Grand Prairie, TX)
    …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
    Lockheed Martin (08/13/25)
    - Related Jobs