- Lockheed Martin (Fort Worth, TX)
- …play a critical role in safeguarding our platforms by ensuring that cyber security requirements are effectively defined, decomposed, allocated, implemented, and ... and providing security expertise to ensure that cyber security is considered throughout the product...Plans of Actions and Milestones \(POAMs\) to mitigate open cyber risks\. **What's In It For You: 3… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Exploitation Researcher , you'll be leading the development of cyber security tools and techniques. You'll be reverse engineering and exploiting ... essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join...the defense of our nation. Your main areas of research will include cyber tool prototyping and… more
- Capital One (Mclean, VA)
- Center 3 (19075), United States of America, McLean, Virginia Principal Associate, Cyber Threat Researcher , Cyber Intelligence The mission of Capital ... associates, infrastructure, and brand. We are looking for a Cyber Threat Researcher who is able to...School Diploma, GED or equivalent certification + At least 3 years of experience working in cybersecurity or information… more
- BMO Financial Group (CO)
- …processes to enhance overall security strategies **Qualifications:** + Experienced Cyber Threat Researcher with exceptional skills analyzing data based on ... A successful candidate will have a great mix of cyber threat research experience, technical capabilities, and... research of security threats and vulnerabilities + At least 5 years… more
- Leidos (Columbia, MD)
- …the Cyber & Analytics Business Area (CABA) is seeking an enthusiastic Cyber Researcher & Developer to join a diverse team of researchers contributing ... **Description** **The evolving Cyber landscape requires research and development...within an RF lab environment including lab safety and security processes + Experience setting up and maintaining RF… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive ... The Cyber System Assessments Group performs software and hardware...Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop and… more
- Huntington Ingalls Industries (Hurlburt Field, FL)
- …BAS in Cyber Security and 5 years of relevant cyber security experience + IAM Level 3 Certification; CISSP Certification is highly desired. + Minimum ... of 8 years of relevant DoD cyber security work experience + No less...highly preferred. + Keep abreast of current and new security technologies and threats. + Research and… more
- Battelle Memorial Institute (Chantilly, VA)
- …Battelle's Cyber team is seeking an experienced **mid-level** **Network Security Researcher ** to analyze, identify, and address potential vulnerabilities in ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...based on program or customer needs. A **mid-level Network Security Researche** r at Battelle is knowledgeable on infrastructure… more
- Microsoft Corporation (Redmond, WA)
- …Identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security , and anomaly detection. + 1+ years of ... years thereafter. **Preferred Qualifications:** + Public track record of relevant security research , especially around vulnerability discovery + Experience… more
- MIT Lincoln Laboratory (Lexington, MA)
- …thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity implications ... of solving unconventional problems. As a Reverse Engineer and Vulnerability Researcher , you will develop novel capabilities against cyber -physical systems.… more
- Intuit (Mountain View, CA)
- …actors. What you'll bring + 3 + years of experience as a Threats intelligence researcher on the darkweb, deep web and social media + 2+ years of experience in ... In this role, you'll leverage data, fraud intelligence, and research to identify potential ways that bad actors may...Financial Fraud, Cyber Crime, Military Intelligence or something similar that involved… more
- Nightwing (Palm Bay, FL)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... for interns interested in a career focused on offensive cyber practices as a Vulnerability Researcher . Nightwing's...the fence, both developing and defeating new and advanced security techniques. Projects are undertaken in small teams inclose… more
- Lockheed Martin (Hanover, MD)
- …Level:** Experienced Professional **Business Unit:** RMS **Relocation Available:** No **Career Area:** Cyber Security **Type:** Task Order/IDIQ **Shift:** First ... cyber warfare\. As a Reverse Engineer / Vulnerability Researcher professional at Lockheed Martin, you'll protect the networks...are interested in; 1\. Creating an ideal environment for research 2\. Automating RE tools and processes 3… more
- Huntington Ingalls Industries (Wright Patterson AFB, OH)
- …Type: Full Time/Salaried/Exempt Anticipated Salary Range: $106,801.00 - $165,000.00 Security Clearance: Top Secret Level of Experience: Senior This opportunity ... resides with Cyber & Electronic Warfare, a business group within HII's...data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities… more
- Nightwing (St. Petersburg, FL)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... must be US citizens and be able to obtain and maintain a government security clearance. **Required Skills** + Vulnerability research experience with one or more… more
- Nightwing (Austin, TX)
- …has been providing some of the world's most technically advanced full-spectrum cyber , data operations, systems integration and intelligence support services to the ... solve complex problems, and deliver exceptional results for our clients. Vulnerability Researcher Interns at Nightwing CODEX learn to analyze systems to understand… more
- Microsoft Corporation (Redmond, WA)
- …vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security , and anomaly detection. + 3 + years identifying ... years thereafter. **Preferred Qualifications** + Public track record of relevant security research , especially around vulnerability discovery + Experience… more
- Nightwing (Annapolis Junction, MD)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support… more
- Nightwing (Huntsville, AL)
- …and shape the future of our cybersecurity, intelligence, and services offerings. CODEX ( Cyber Offense and Defense Experts) division brings together an elite team of ... The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, system engineering,… more
- Pennsylvania State University (University Park, PA)
- …AND POSITION REQUIREMENTS: The Cloud Technology Advancement Department within the Cyber , Modeling and Simulation (CMS) Division of the Applied Research ... and strategic discussions that support Cloud Technology Advancement and Technology Adoption research for the DoD, 4th estate, and IC communities. Located onsite in… more
Related Job Searches:
Cyber,
Cyber Security,
Cyber Security Researcher,
Researcher,
Researcher 3,
Security,
Security Researcher