- System One (Annapolis Junction, MD)
- We have a Direct Hire position open for a SME Mobile Vulnerability Researcher . Clearance Level: Top Secret/SCI with Full Scope Polygraph Onsite - Annapolis ... Position Overview: The candidate will be working on a team performing vulnerability research against mobile technologies. The candidate must be familiar with… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- CACI International (Aberdeen Proving Ground, MD)
- Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
- Amazon (Seattle, WA)
- …challenges. The role can be located in Seattle, WA Key job responsibilities Research and interpret vulnerability disclosures and intelligence Own and coordinate ... Amazon is seeking a Security Engineer to join the AVM (AWS Vulnerability Management) organization. Our organization is accountable for the end-to-end software … more
- Google (Sunnyvale, CA)
- …in analyzing systems and identifying security problems, threat modeling, vulnerability management, and remediation. + Experience in designing and implementing ... and data storage, security, artificial intelligence, natural language processing, UI design and mobile ; the list goes on and is growing every day. As a software… more
- Amazon (Austin, TX)
- …technical areas. Key job responsibilities * Perform security risk assessments * Perform vulnerability analysis * Drive large scale and high impact remediation * Work ... scalable solution to manage third-party software security risks * Project and research work as needed. * Security training and outreach to internal development… more
- Citigroup (Fort Lauderdale, FL)
- …all sorts of technologies on enterprise-scale, so hunger for knowledge and research is greatly appreciated and rewarded. + Background is enterprise software ... JavaScript Frameworks (NodeJS, AngularJS), Web Applications, REST/SOAP APIs/Web Services, Mobile Applications, Thick Clients, Microservices Architecture based applications running… more