• Mobile Vulnerability

    GliaCell Technologies (Annapolis Junction, MD)
    Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
    GliaCell Technologies (01/01/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Mobile Security Researcher 4

    ARSIEM (Annapolis Junction, MD)
    research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
    ARSIEM (10/29/24)
    - Save Job - Related Jobs - Block Source
  • Threat Researcher

    CACI International (Aberdeen Proving Ground, MD)
    Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
    CACI International (11/23/24)
    - Save Job - Related Jobs - Block Source
  • Group 59--Summer Research Program (Cyber…

    MIT Lincoln Laboratory (Lexington, MA)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (11/12/24)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Management Specialist…

    Guidehouse (Arlington, VA)
    …to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be employed ... to 25% **Clearance Required** **:** None Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the… more
    Guidehouse (11/27/24)
    - Save Job - Related Jobs - Block Source
  • Lead Professional Mobile and Desktop…

    Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
    Idaho National Laboratory is hiring a Lead Professional Mobile and Desktop Services to work in our Information Technology department. Our team works a 9x80 schedule ... team. Advise senior management on significant issues related to INL IT Mobile and Desktop Operations. *Responsibilities Include:* * Coordinate and direct activities… more
    Battelle Energy Alliance dba Idaho National Laboratory (12/18/24)
    - Save Job - Related Jobs - Block Source
  • Principal Cyber Research Engineer

    Palo Alto Networks (San Francisco, CA)
    …teams or as a security analyst + Experience contributing to public vulnerability research , submitting CVEs or creating proof-of-concept exploits **The Team** ... Learning team on AI focused projects focused on scalability and quality. We conduct vulnerability research on both known and emerging exploits, ensuring we stay… more
    Palo Alto Networks (10/29/24)
    - Save Job - Related Jobs - Block Source
  • Group 51--Summer Research Program Intern…

    MIT Lincoln Laboratory (Lexington, MA)
    …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
    MIT Lincoln Laboratory (12/17/24)
    - Save Job - Related Jobs - Block Source
  • Scientist, Security Research Engineer…

    L3Harris (Herndon, VA)
    …capabilities development, integration, and testing in multiple disciplines including vulnerability research , embedded systems reverse engineering, CNO/CNE ... science, Cybersecurity, or related technical field, with a minimum 10-year Vulnerability Research /Reverse Engineering, or Cyber Software Development experience +… more
    L3Harris (11/06/24)
    - Save Job - Related Jobs - Block Source
  • Research Fellow

    University of Michigan (Ann Arbor, MI)
    RESEARCH FELLOW Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the first page of your resume. ... a team player. The individuals will be responsible for leading collaborative research projects focused on translation from patient-derived organoid models to guided… more
    University of Michigan (01/03/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Analyst III / Senior

    Federal Reserve Bank (Cleveland, OH)
    …web based attacks and mitigations, cyber risk assessment and strategic analysis, vulnerability detection and assessment, mobile device management, and digital ... reported cybersecurity incidents at financial institutions. + Prepares in written form research , analysis, and assessments for key internal stakeholders as needed or… more
    Federal Reserve Bank (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Staff Engineer, Product Security

    LinkedIn (Mountain View, CA)
    …new products and technologies, including potential acquisitions. Respond to external vulnerability researcher inquiries and vulnerability reports. Educate ... on high impact engineering projects that detect security risks. Responsibilities: Research threats and attack vectors that impact LinkedIn's applications and… more
    LinkedIn (11/06/24)
    - Save Job - Related Jobs - Block Source
  • ​​Tier 1 VAT Analyst ​

    Leidos (Ashburn, VA)
    …(ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current ... networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC… more
    Leidos (12/13/24)
    - Save Job - Related Jobs - Block Source
  • Sr. Developer, Application Security

    Cowbell Cyber (IN)
    …designing and implementing application security solutions for web and or mobile applications + Experience developing and reporting vulnerability metrics ... teams to enhance and evangelize security in applications (& infrastructure). Research emerging technologies and maintain awareness of current security risks in… more
    Cowbell Cyber (01/02/25)
    - Save Job - Related Jobs - Block Source
  • Comcast Cybersecurity: Penetration Tester 4

    Comcast (Philadelphia, PA)
    …for conducting a variety of security assessments, including web application, network, mobile , and cloud penetration testing, as well as participating in red team ... and CVE databases.** **Practical experience with web application, network, mobile , and cloud penetration testing.** **Strong network and application penetration… more
    Comcast (11/16/24)
    - Save Job - Related Jobs - Block Source
  • Principal Product Security Engineer (Northridge,…

    Medtronic (Los Angeles, CA)
    …Cybersecurity strategies based on changing best practices. Perform emerging threat and vulnerability research . Identify and evaluate new areas for research ... teams on, and facilitate threat modeling, security risk evaluations, and vulnerability assessments to identify and mitigate potential security risks throughout the… more
    Medtronic (12/12/24)
    - Save Job - Related Jobs - Block Source
  • Offensive Security Engineer Intern

    Meta (Bellevue, WA)
    …Security Engineer Intern Responsibilities: 1. Perform security assessments consisting of vulnerability research and exploitation against both the unique systems ... source code review, fuzzing and/or analysis, reverse engineering, exploit development and/or vulnerability research . 10. Familiarity of the attack lifecycle, and… more
    Meta (10/30/24)
    - Save Job - Related Jobs - Block Source