- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- ARSIEM (Annapolis Junction, MD)
- …is looking for a Mobile Vulnerability Researcher to perform Mobile Vulnerability Research . The positions will support one of our Government ... in Annapolis Junction, MD . Responsibilities + Work on a team performing vulnerability research against mobile technologies. + Document research with… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Leidos (Columbia, MD)
- …below. **5G Core Experience:** + Operating a multi-site 5G system and supporting Vulnerability Research and Operations + Experience setting up, configuring, and ... Analytics Business Area (CABA) is seeking an enthusiastic Cyber Researcher & Developer to join a diverse team of...and firewalls * Researching 5G network slicing implementation and vulnerability research * Utilization of RF Testing,… more
- Sandia National Laboratories (Albuquerque, NM)
- …and network protocols. + Experience with one or more of the following: + vulnerability research , + system vulnerability assessment high consequence high ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...engage in work across the technology spectrum including embedded, mobile , desktop, enterprise, and cloud systems, as well as… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- Orlando Utilities Commission (Orlando, FL)
- …Information & Event Management (SIEM), multi- factor authentication, cloud computing, mobile device security, etc.; + Vulnerability management; + Enterprise ... and improve the overall security posture; + Operate OUC's security tools; + Research documentation related to new and existing technology to support OUC's risk… more
- Parsons Corporation (Chantilly, VA)
- …Network Operations arena. Our mission is to provide critical vulnerability research and exploitation development on Android mobile device platforms. Our team ... development and has an understanding of Android development. Relevant experience with vulnerability research and working with existing toolchains and weaponizing… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- Idaho National Laboratory is hiring a Lead Professional Mobile and Desktop Services to work in our Information Technology department. Our team works a 9x80 schedule ... team. Advise senior management on significant issues related to INL IT Mobile and Desktop Operations. *Responsibilities Include:* * Coordinate and direct activities… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Moses/Weitzman Health System (Middletown, CT)
- …determinants of health like housing insecurity, food insecurity, and economic vulnerability . + Coordinate equipment transports with CHC Facilities department as ... poor and diverse populations, and is home to programs focusing on education, research , and process improvement support for safety net providers. The system delivers… more
- L3Harris (Herndon, VA)
- …capabilities development, integration, and testing in multiple disciplines including vulnerability research , embedded systems reverse engineering, CNO/CNE ... science, Cybersecurity, or related technical field, with a minimum 10-year Vulnerability Research /Reverse Engineering, or Cyber Software Development experience +… more
- University of Michigan (Ann Arbor, MI)
- RESEARCH FELLOW Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the first page of your resume. ... a team player. The individuals will be responsible for leading collaborative research projects focused on translation from patient-derived organoid models to guided… more
- UCLA Health (Los Angeles, CA)
- Description The Principal IT Risk Specialist for Academic & Research Programs at UCLA Health Sciences plays a central role in the risk assessment lifecycle for both ... a thorough understanding of the IT needs within the academic and research community. + building strong relationships and developing collaborative solutions that… more
- Intuit (Atlanta, GA)
- …Engineer with over 5 years of experience in penetration testing and vulnerability management. This role requires deep expertise in identifying, assessing, and ... posture by leading and enhancing our penetration testing and vulnerability management efforts. If you are passionate about cybersecurity...LDAP. + Strong understanding of OWASP Web, LLM and Mobile Top 10, SANS25, CVE, and MITRE ATT&CK frameworks.… more
- Microsoft Corporation (Redmond, WA)
- …Technical Program Manager to drive and evolve Microsoft's company-wide security research incentives and security data sharing partnerships. Your portfolio of ... to improve security for everyone. As the company accelerates our transformation in a mobile -first, cloud-first world, there has never been a more exciting time to be… more
- Amazon (Austin, TX)
- …Devices & Services organization and develop proof of concept exploits. * Lead vulnerability research using variety of custom tooling and technologies while ... responsible for reviewing these products, with focus on penetration testing, fuzzing, and vulnerability research . While the majority of our Security team are… more
- Amazon (Austin, TX)
- …Devices & Services organization and develop proof of concept exploits. * Lead vulnerability research using variety of custom tooling and technologies while ... responsible for reviewing these products, with focus on penetration testing, fuzzing, and vulnerability research . While the majority of our Security team are… more
- Motion Recruitment Partners (Plano, TX)
- …need to be skilled in performing thorough penetration tests on web APIs and mobile applications. Hybrid schedule, onsite 3 days a week. **Senior Red Team Penetration ... and multiple operating systems (eg Windows, Linux). Experience conducting manual API and Mobile PenTest using Burp Suite. + Proficient in at least one scripting… more