- DXC Technology (Baton Rouge, LA)
- **Job Description:** **Job Description:** The Tier 3 Cyber Security Analyst/Incident Response position is a part of the Cyber Defense Center team. The ... CDC provides cyber security monitoring, reporting, and response for numerous external clients....maintenance and improvement of processes and/or playbooks. + Conduct research regarding the latest methods, tools, and trends in… more
- Lockheed Martin (Fort Worth, TX)
- …play a critical role in safeguarding our platforms by ensuring that cyber security requirements are effectively defined, decomposed, allocated, implemented, and ... and providing security expertise to ensure that cyber security is considered throughout the product...Plans of Actions and Milestones \(POAMs\) to mitigate open cyber risks\. **What's In It For You: 3… more
- RBR-Technologies (Columbia, MD)
- …security , or other InfoSec disciplines + BS in Computer Science, Cyber Security , or STEM discipline + IAT Level 3 certification required (CASP+CE, CCNP, ... activities. + Provide technical assessments of applications and infrastructure, security design reviews and risk assessments. This is a...attacks. + Work in a team environment to conduct research / analysis of current and emerging Cyber… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Exploitation Researcher , you'll be leading the development of cyber security tools and techniques. You'll be reverse engineering and exploiting ... essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join...the defense of our nation. Your main areas of research will include cyber tool prototyping and… more
- Amazon (VA)
- …your duties. Key job responsibilities 1. Vulnerability Identification and Tracking 2. Offensive security testing & vulnerability research 3 . Emergent threat ... Produce high quality red team reports 7. Projects and research work as needed 8. Security training...GCED (GIAC Certified Enterprise Defender) or GICSP (Global Industrial Cyber Security Professional) or PenTest- 3… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …System Exploitation Researcher , you'll be contributing to the development of cyber security tools and techniques. You'll be reverse engineering and ... the defense of our nation. Your main areas of research will include cyber tool prototyping and...Science, Computer Engineering or related discipline or BS and 3 + years of directly related experience + Selected candidate… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive ... The Cyber System Assessments Group performs software and hardware...Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and… more
- Lockheed Martin (Hanover, MD)
- …Experienced Professional **Business Unit:** RMS **Relocation Available:** Possible **Career Area:** Cyber Security **Type:** Task Order/IDIQ **Shift:** First ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...empowers its clients to stay ahead in an ever\-evolving security landscape, ensuring mission resilience and operational excellence\. **Why… more
- Battelle Memorial Institute (Chantilly, VA)
- …Battelle's Cyber team is seeking an experienced **mid-level** **Network Security Researcher ** to analyze, identify, and address potential vulnerabilities in ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...based on program or customer needs. A **mid-level Network Security Researche** r at Battelle is knowledgeable on infrastructure… more
- MIT Lincoln Laboratory (Lexington, MA)
- …thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity implications ... of solving unconventional problems. As a Reverse Engineer and Vulnerability Researcher , you will develop novel capabilities against cyber -physical systems.… more
- Nightwing (Huntsville, AL)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
- Nightwing (Sterling, VA)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Ability to obtain Top Secret clearance + At least 3 years of experience performing Vulnerability Research ...of prior related experience or an advanced degree with 3 years of experience. ** Security Clearance** Ability… more
- Nightwing (Annapolis Junction, MD)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission...required, as only US citizens are eligible for a security clearance. 3 or more of the… more
- Nightwing (San Antonio, TX)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission...the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams with… more
- Iowa State University (Ames, IA)
- Position Title:Professor of Practice in Cyber Security and Outreach Appointment Type:Faculty Job Description: Summary of Duties and Responsibilities: We are ... join our faculty as a Professor of Practice in Cyber Security and Outreach in the Department...compensation and benefits. The initial appointments will be for 3 years with the potential for renewal. The Departments… more
- Huntington National Bank (Columbus, OH)
- …States on a full-time basis. HYBRID ROLE 3 days in office Summary: The Cyber Security Threat Hunter Expert reviews security events to identify and ... visas: F-1 student, H-1B worker, O-1 worker, TN worker, E- 3 worker. Applicants must be currently authorized to work...of security risks to the enterprise. The Cyber Security Operations Analyst Expert will recommend… more
- RTX Corporation (Columbia, MD)
- …Role Type:** Onsite RTX BBN Technologies (BBN) is seeking a passionate and skilled RF Cyber Research Engineer to contribute to the research and development ... to software integration for mission-critical systems. As an RF Cyber Research Engineer, you will work at...**Qualifications you Must Have** + Ability to obtain a security clearance. + Ph.D., MS plus 3 … more
- US Tech Solutions (Birmingham, AL)
- …performance of emerging technologies in this arena. + The position is focused on cyber -physical security research for Transmission and Distribution. + The ... of focus include synchrophasor technology, next generation control center functionalities, cyber security testing, new visualization approaches, DERMS platform… more
- Applied Research Solutions (Dayton, OH)
- **Description** Applied Research Solutions is seeking a full-time Cyber Security Engineer, located at Wright-Patterson AFB, OH support the ISR Crosscutter ... equipment manufacturer documentation and system interface specifications, to support the cyber analysis, identification, selection, and tailoring of security and… more
- Lockheed Martin (Marietta, GA)
- …their missions\. We are looking for an individual to act as the Classified Cyber Security Manager and Information Systems Security Manager \(ISSM\) to ... leader will provide management and oversight direction of a team of Cyber security professionals supporting complex and challenging activities\. Participate in… more