• Vulnerability Researcher

    JPMorgan Chase (Wilmington, DE)
    …seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In ... As an Vulnerability Researcher - Assessments & Exercises...groups that share threat intelligence analytics + Conduct in-depth vulnerability research and exploit development across a… more
    JPMorgan Chase (10/16/25)
    - Related Jobs
  • Android Vulnerability Researcher

    BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
    Android Vulnerability Researcher Key Role: D eliver production-grade offensive capabilities that directly enable strategic intelligence collection and cyber ... development. Basic Qualifications: + 3+ years of experience with conducting vulnerability research , reverse engineering, or exploit development + Experience… more
    BOOZ, ALLEN & HAMILTON, INC. (12/21/25)
    - Related Jobs
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/17/25)
    - Related Jobs
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/17/25)
    - Related Jobs
  • Senior Mobile Software Engineer with Poly

    BigBear.ai (Annapolis Junction, MD)
    …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated solutions… more
    BigBear.ai (11/15/25)
    - Related Jobs
  • Senior Security Researcher

    Microsoft Corporation (Redmond, WA)
    …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR Bachelor's Degree ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR equivalent… more
    Microsoft Corporation (12/24/25)
    - Related Jobs
  • Cybersecurity Vulnerability Analyst

    Node.Digital (Arlington, VA)
    Cybersecurity Vulnerability Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node is supporting a US Government customer to provide ... cybersecurity vulnerability analysis support to reduce the prevalence and impact...and application security threats and vulnerabilities (eg, buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions,… more
    Node.Digital (01/01/26)
    - Related Jobs
  • Group 05-59 | SRP Intern | Cyber System…

    MIT Lincoln Laboratory (Lexington, MA)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/31/25)
    - Related Jobs
  • Systems Admin - Vulnerability Management…

    ASM Research, An Accenture Federal Services Company (Chesapeake, VA)
    …deployments, task sequences, and reporting. + Support Microsoft Intune for mobile device and modern endpoint management. + Develop and maintain automation ... with hybrid endpoint management (SCCM + Intune). + Familiarity with vulnerability management tools (eg, Tenable, Qualys) and integration with patching workflows.… more
    ASM Research, An Accenture Federal Services Company (12/19/25)
    - Related Jobs
  • Android Mobile Reverse Engineer / Dev

    Nightwing (Palm Bay, FL)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
    Nightwing (11/25/25)
    - Related Jobs