- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- **Description** The Mission Concepts and Capabilities (MCC) Division of Applied Research Associates, Inc (ARA) has an immediate opening to support a team conducting ... assessments of vulnerabilities of critical US and Allied systems , networks, infrastructures, and assets. Our team supports the...Assurance Department (MA) program. We are seeking a hands-on cyber analyst and team leader with an understanding of… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- **Description** The Mission Concepts and Capabilities (MCC) Division of Applied Research Associates, Inc. (ARA) has teams conducting cyber assessments of ... vulnerabilities of critical US and Allied systems , networks, infrastructures, and assets. Our team supports the...Mission Assurance Department (MA) program. We are seeking hands-on cyber analysts with and understanding of both the compliance… more
- COLSA Corporation (Shalimar, FL)
- …Framework (RMF) and compliance testing. + Knowledge of operational planning, the Cyber Tasking Order (CTO) cycle, and developing exploitation strategies. ... Description: The team is searching for a penetration tester to support the 48th Cyber Space Test Squadron, the United States Air Force, and the United States Space… more
- Battelle Memorial Institute (Beavercreek, OH)
- …management and traceability. + Develop and maintain digital twin libraries for analyzed systems , focusing on cyber architecture and risk mitigation. + Generate ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...apply. **Job Summary** As a Software/Hardware Engineer within Battelle's Cyber business area, you will support a program mission… more
- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
- Cambridge International Systems Inc (Norfolk, VA)
- …Expertise: + Demonstrated ability to reverse engineer, exploit, or emulate real-world cyber threats across networked and embedded systems . + Familiarity with ... Exploitation Analyst - Top Secret Clearance | Norfolk, VA Cambridge International Systems , Inc. Join a dynamic global team united by shared values: commitment,… more
- Amentum (Norfolk, VA)
- …or exploitation analysis + Proficiency in decomposing complex computer systems /networking configurations in support of system exploitation analysis + ... test requirements for each system under test and research and coordinate with other DoD organizations, academia, private...+ HQ Tasks: + Serve as a OPTEVFOR 01D Exploitation Analyst supporting cyber survivability policy and… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- JPMorgan Chase (Wilmington, DE)
- …dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In this role, you ... As an Vulnerability Researcher - Assessments & Exercises at JPMorgan Chase...simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the… more
- Parsons Corporation (West Melbourne, FL)
- …/Reverse Engineer** to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero ... Days). **What You'll Be Doing:** + Reverse engineering systems and software executables using tools like Ghidra, Binary Ninja, or IDA Pro + Identifying potential… more
- CACI International (Chantilly, VA)
- …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
- Draper (Boston, MA)
- …organizational needs, our technical efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals...exploit development on a wide range of devices and systems . Job Description: + Assess hardware and software for… more
- MIT Lincoln Laboratory (Lexington, MA)
- …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
- Lockheed Martin (Grand Prairie, TX)
- …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- Leidos (Ashburn, VA)
- …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems...essential to the success of their missions. Position Description Cyber System Exploitation Intern When you join… more
- Amentum (Fort Belvoir, VA)
- … exploitation for key telecommunications networks. + Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify ... The Red Cell Cyber Analyst shall: + Characterize the adversary's cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities… more
- Southern California Edison (Rosemead, CA)
- Join the Clean Energy Revolution Become a Senior Cyber Security Specialist, Threat Hunt at Southern California Edison (SCE) and build a better tomorrow. In this job, ... you'll be a part of the Cyber Threat Hunt and Intelligence team, a sub-team under...will be primarily responsible for not only conducting continuous research on emerging threats and threat actor activity but… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... our operational partners in the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems can be corrected,… more