• Tier 3 Cyber Security Analyst…

    DXC Technology (Baton Rouge, LA)
    **Job Description:** **Job Description:** The Tier 3 Cyber Security Analyst/Incident Response position is a part of the Cyber Defense Center team. The ... CDC provides cyber security monitoring, reporting, and response for numerous external clients....maintenance and improvement of processes and/or playbooks. + Conduct research regarding the latest methods, tools, and trends in… more
    DXC Technology (03/17/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Security Engineer…

    Lockheed Martin (Fort Worth, TX)
    …play a critical role in safeguarding our platforms by ensuring that cyber security requirements are effectively defined, decomposed, allocated, implemented, and ... and providing security expertise to ensure that cyber security is considered throughout the product...Plans of Actions and Milestones \(POAMs\) to mitigate open cyber risks\. **What's In It For You: 3 more
    Lockheed Martin (03/04/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Operations Specialist

    RBR-Technologies (Columbia, MD)
    security , or other InfoSec disciplines + BS in Computer Science, Cyber Security , or STEM discipline + IAT Level 3 certification required (CASP+CE, CCNP, ... activities. + Provide technical assessments of applications and infrastructure, security design reviews and risk assessments. This is a...attacks. + Work in a team environment to conduct research / analysis of current and emerging Cyber more
    RBR-Technologies (03/10/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Exploitation…

    MIT Lincoln Laboratory (Lexington, MA)
    … System Exploitation Researcher , you'll be leading the development of cyber security tools and techniques. You'll be reverse engineering and exploiting ... essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join...the defense of our nation. Your main areas of research will include cyber tool prototyping and… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Penetration Test Engineer, AWS Security

    Amazon (VA)
    …your duties. Key job responsibilities 1. Vulnerability Identification and Tracking 2. Offensive security testing & vulnerability research 3 . Emergent threat ... Produce high quality red team reports 7. Projects and research work as needed 8. Security training...GCED (GIAC Certified Enterprise Defender) or GICSP (Global Industrial Cyber Security Professional) or PenTest- 3 more
    Amazon (01/30/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation…

    MIT Lincoln Laboratory (Fort Meade, MD)
    …System Exploitation Researcher , you'll be contributing to the development of cyber security tools and techniques. You'll be reverse engineering and ... the defense of our nation. Your main areas of research will include cyber tool prototyping and...Science, Computer Engineering or related discipline or BS and 3 + years of directly related experience + Selected candidate… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation…

    MIT Lincoln Laboratory (Fort Meade, MD)
    …technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive ... The Cyber System Assessments Group performs software and hardware...Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Offensive Cyber Vulnerabilities…

    Lockheed Martin (Hanover, MD)
    …Experienced Professional **Business Unit:** RMS **Relocation Available:** Possible **Career Area:** Cyber Security **Type:** Task Order/IDIQ **Shift:** First ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...empowers its clients to stay ahead in an ever\-evolving security landscape, ensuring mission resilience and operational excellence\. **Why… more
    Lockheed Martin (01/15/25)
    - Save Job - Related Jobs - Block Source
  • Mid Level Network Security

    Battelle Memorial Institute (Chantilly, VA)
    …Battelle's Cyber team is seeking an experienced **mid-level** **Network Security Researcher ** to analyze, identify, and address potential vulnerabilities in ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...based on program or customer needs. A **mid-level Network Security Researche** r at Battelle is knowledgeable on infrastructure… more
    Battelle Memorial Institute (12/22/24)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity implications ... of solving unconventional problems. As a Reverse Engineer and Vulnerability Researcher , you will develop novel capabilities against cyber -physical systems.… more
    MIT Lincoln Laboratory (01/17/25)
    - Save Job - Related Jobs - Block Source
  • Senior Reverse Engineer/Vulnerability…

    Nightwing (Huntsville, AL)
    …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Android Vulnerability Researcher

    Nightwing (Sterling, VA)
    …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Ability to obtain Top Secret clearance + At least 3 years of experience performing Vulnerability Research ...of prior related experience or an advanced degree with 3 years of experience. ** Security Clearance** Ability… more
    Nightwing (03/12/25)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Researcher

    Nightwing (Annapolis Junction, MD)
    …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission...required, as only US citizens are eligible for a security clearance. 3 or more of the… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Researcher / CNO Developer II…

    Nightwing (San Antonio, TX)
    …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission...the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams with… more
    Nightwing (03/06/25)
    - Save Job - Related Jobs - Block Source
  • Professor of Practice in Cyber

    Iowa State University (Ames, IA)
    Position Title:Professor of Practice in Cyber Security and Outreach Appointment Type:Faculty Job Description: Summary of Duties and Responsibilities: We are ... join our faculty as a Professor of Practice in Cyber Security and Outreach in the Department...compensation and benefits. The initial appointments will be for 3 years with the potential for renewal. The Departments… more
    Iowa State University (03/12/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Threat Hunter Expert

    Huntington National Bank (Columbus, OH)
    …States on a full-time basis. HYBRID ROLE 3 days in office Summary: The Cyber Security Threat Hunter Expert reviews security events to identify and ... visas: F-1 student, H-1B worker, O-1 worker, TN worker, E- 3 worker. Applicants must be currently authorized to work...of security risks to the enterprise. The Cyber Security Operations Analyst Expert will recommend… more
    Huntington National Bank (02/15/25)
    - Save Job - Related Jobs - Block Source
  • RF Cyber Senior Research Engineer

    RTX Corporation (Columbia, MD)
    …Role Type:** Onsite RTX BBN Technologies (BBN) is seeking a passionate and skilled RF Cyber Research Engineer to contribute to the research and development ... to software integration for mission-critical systems. As an RF Cyber Research Engineer, you will work at...**Qualifications you Must Have** + Ability to obtain a security clearance. + Ph.D., MS plus 3 more
    RTX Corporation (02/19/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Analyst 2

    US Tech Solutions (Birmingham, AL)
    …performance of emerging technologies in this arena. + The position is focused on cyber -physical security research for Transmission and Distribution. + The ... of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform… more
    US Tech Solutions (01/17/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Engineer

    Applied Research Solutions (Dayton, OH)
    **Description** Applied Research Solutions is seeking a full-time Cyber Security Engineer, located at Wright-Patterson AFB, OH support the ISR Crosscutter ... equipment manufacturer documentation and system interface specifications, to support the cyber analysis, identification, selection, and tailoring of security and… more
    Applied Research Solutions (03/12/25)
    - Save Job - Related Jobs - Block Source
  • Classified Cyber Security Manager…

    Lockheed Martin (Marietta, GA)
    …their missions\. We are looking for an individual to act as the Classified Cyber Security Manager and Information Systems Security Manager \(ISSM\) to ... leader will provide management and oversight direction of a team of Cyber security professionals supporting complex and challenging activities\. Participate in… more
    Lockheed Martin (03/05/25)
    - Save Job - Related Jobs - Block Source