• Mid - level Vulnerability

    Battelle Memorial Institute (Columbus, OH)
    …you? If you answered yes to these questions, this is the job for you! As a ** Mid - level Vulnerability Researcher ** , you will work with disassemblers and ... apply. **Job Summary** Battelle is currently seeking an aspiring ** Mid - level ** ** Vulnerability Researcher **...using debugging tools + Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja) +… more
    Battelle Memorial Institute (10/02/25)
    - Related Jobs
  • Vulnerability Researcher

    Cipher Tech Solutions (Vienna, VA)
    …Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be ... familiar with the latest techniques in vulnerability research and demonstrate their ability to...hold a US government security clearance at the TS Level or higher at time of application + Must… more
    Cipher Tech Solutions (11/25/25)
    - Related Jobs
  • Security Consultant, Application…

    Google (New York, NY)
    …at Google (https://careers.google.com/benefits/) . **Responsibilities** + Conduct analysis to assess vulnerability impact and risk through industry research , and ... Security Consultant, Application and Vulnerability Management, Public Sector _corporate_fare_ Google _place_ New York, NY, USA ** Mid ** Experience driving… more
    Google (11/12/25)
    - Related Jobs
  • Mid - Level Capabilities Development…

    General Dynamics Information Technology (Hanover, MD)
    …needed. With your proficiency in grasping and applying new information quickly, the Mid - Level Capabilities Development Engineer will be proficient in C/C++, and ... **Req ID:** RQ207031 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret...time operating systems. you'll be involved in Protocol Analysis, Vulnerability Assessment, Security Research , Rapid Prototyping of… more
    General Dynamics Information Technology (09/10/25)
    - Related Jobs
  • Computer Sys Security Anlyst ( Mid

    Huntington Ingalls Industries (Concord, MA)
    …Time/Salaried/Exempt Anticipated Salary Range: $73,553.00 - $110,000.00 Security Clearance: Secret Level of Experience: Mid This opportunity resides with Warfare ... access controls. + Utilize encryption technologies, conduct penetration and vulnerability tests, and explore various security research ...+ Experience & Education: + For a Bachelor's Degree Level : A minimum of 2 years of relevant experience.… more
    Huntington Ingalls Industries (09/12/25)
    - Related Jobs
  • AI/ML Engineer with RE/VR proficiency and a TS…

    Cipher Tech Solutions (Vienna, VA)
    …while maintaining strong proficiency in software development, reverse engineering, and vulnerability research . You will apply your foundational knowledge of ... proficiency in reverse engineering with an aptitude for performing vulnerability research . + Must be possess strong...marijuana that may be deemed legal at the state level but is still considered illegal by the federal… more
    Cipher Tech Solutions (11/19/25)
    - Related Jobs
  • IT Infrastructure & Network Support Engineer…

    Nightwing (Sterling, VA)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking an IT Infrastructure… more
    Nightwing (10/29/25)
    - Related Jobs
  • Hardware Exploitation Engineer (TS/SCI)- Senior…

    Vexterra Group (Bethesda, MD)
    …Using knowledge gained through the application of reverse- engineering and other research techniques, engineer low- level C and assembly. Position Requirements: + ... digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify… more
    Vexterra Group (10/14/25)
    - Related Jobs
  • Red Team Operator

    Amentum (Norfolk, VA)
    …at each level of protocol models. + Skill in interpreting vulnerability scanner results to identify vulnerabilities. + Skill in processing collected data for ... and documentation for DCAT authorization established in DoDI 8585.01. + Research , review, prioritize, and submit operational requirements for acquisition of… more
    Amentum (11/12/25)
    - Related Jobs
  • SecOps Business Process / Technical Consultant

    Nightwing (Sterling, VA)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Response (SIR): enrichment, correlation rules, and automated playbooks. + Vulnerability Response (VR): scanner integrations, remediation workflows, patch group… more
    Nightwing (11/21/25)
    - Related Jobs