- Nightwing (San Antonio, TX)
- …cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, ... mitigations such as DEP and ASLR + Experience using reverse engineering tools such as Ghidra, IDA Pro, HexRays,...building and using tools to find, exploit, and productize vulnerabilities in complex software systems + Utilizing full system… more
- SAIC (Fort Meade, MD)
- …where you can** **grow your career in a dynamic and supportive environment!** The CNO Reverse Engineer analyzes software and systems to understand how they work, ... identify vulnerabilities , and occasionally develop exploits. The ideal candidate will...networking protocols and have experience with software and hardware reverse engineering tools. The CNO Reverse… more
- Nightwing (San Antonio, TX)
- …cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, ... + Understanding of exploit mitigations such as DEP and ASLR + Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.… more
- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- …collection and cyber effects missions. Discover and operationalize previously unknown vulnerabilities across the Android ecosystem, conducting advanced research ... CNO implants and infrastructure. Hold responsibilities for large-scale reverse engineering of closed-source binaries, bypassing modern mitigation. Author… more
- SAIC (Fort Meade, MD)
- …capabilities for both offensive and defensive network operations. They will engage in reverse engineering to identify vulnerabilities and will develop tools for ... of OS Internals (ie Windows, Linux, Android). + Experience with Vulnerability Research . + Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS,… more
- Nightwing (Indialantic, FL)
- …/ Reverse Engineer Our team covers the full life cycle from emulation, reverse engineering, vulnerability research , and CNO /CNE tool development for ... code for to find vulnerabilities . In addition, general vulnerability research , reverse engineering, development, testing, maintenance, and modification of… more
- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- …exploit implementation. Basic Qualifications: + 3+ years of experience in vulnerability research , reverse engineering, or exploit development + Experience using ... Windows Vulnerability Researcher Key Role: Deliver production-grade offensive capabilities as an expert in Android vulnerability research and exploit… more
- Percival Engineering (Columbia, MD)
- …Qualifications: + Preferred skills include experience in static and dynamic reverse engineering, vulnerability research , binary analysis of executables, exposure ... our nation's most critical assets. From digging deep into vulnerabilities and cracking codes to developing cutting-edge software, our...team does it all. If you are a Cyber ( CNO ) Software Developer with a passion for innovation and… more
- Nightwing (Palm Bay, FL)
- …/ Reverse Engineer Our team covers the full life cycle from emulation, reverse engineering, vulnerability research , and CNO /CNE tool development for ... code for to find vulnerabilities . In addition, general vulnerability research , reverse engineering, development, testing, maintenance, and modification of… more
- Nightwing (Pensacola, FL)
- …conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer ensures ... Cross Domain Solutions + Computer Network Exploitation (CNE) + Computer Network Operations ( CNO ) + Malware Analysis + Reverse Software Engineering + Security… more
- SAIC (Colorado Springs, CO)
- …a unique blend of specialized software development, process automation, and in-depth research into software and hardware vulnerabilities and exploit development ... documentation, and deployment, following Agile methodologies. + Conduct vulnerability research and exploit development to support specific operational requirements.… more