- Microsoft Corporation (Redmond, WA)
- …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR Bachelor's Degree ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR equivalent… more
- BigBear.ai (Annapolis Junction, MD)
- …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated...experience, plus a BS in a technical discipline or 4 additional yrs. in place of BS + Clearance:… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ASM Research, An Accenture Federal Services Company (Germantown, MD)
- …+ Collaborate with contractors and vendors to integrate updates and enhancements. ** 4 . Vulnerability Management & Mitigation** + Conduct vulnerability ... provides targeted expertise in monitoring, compliance, incident response, and vulnerability management. This role ensures that cybersecurity tools, processes, and… more
- Bank of America (Boston, MA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Auburn University (Auburn, AL)
- …IT professional with a passion for finding creative solutions that support cutting-edge research with real-world impact? Do you have a driving sense of curiosity, ... collaborative IT team where you can personally contribute to life-changing research implementing and supporting a complex client and server network made… more
- Sandia National Laboratories (Albuquerque, NM)
- …could consist of: + Manual and automated failure analysis and vulnerability assessment + Intrusion prevention/detection and response, penetration testing, and ... and resiliency + Authentication and authorization + Cryptography + Mobile devices and smart technologies + And many more...and smart technologies + And many more areas of research ! We are also looking for candidates with expertise… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Ability to think critically and adapt to dynamic or unpredictable environments. + 4 + years of experience in cyber operations, technical operations, or a related… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply ... perform discovery and target technology analysis of digital network and mobile communications. Digital Network Exploitation Analysts are hired into positions… more
Related Job Searches:
Mobile,
Mobile Vulnerability Researcher,
Researcher,
Vulnerability,
Vulnerability Researcher