- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- CACI International (Aberdeen Proving Ground, MD)
- Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- Guidehouse (Arlington, VA)
- …to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be employed ... to 25% **Clearance Required** **:** None Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- Idaho National Laboratory is hiring a Lead Professional Mobile and Desktop Services to work in our Information Technology department. Our team works a 9x80 schedule ... team. Advise senior management on significant issues related to INL IT Mobile and Desktop Operations. *Responsibilities Include:* * Coordinate and direct activities… more
- Palo Alto Networks (San Francisco, CA)
- …teams or as a security analyst + Experience contributing to public vulnerability research , submitting CVEs or creating proof-of-concept exploits **The Team** ... Learning team on AI focused projects focused on scalability and quality. We conduct vulnerability research on both known and emerging exploits, ensuring we stay… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- L3Harris (Herndon, VA)
- …capabilities development, integration, and testing in multiple disciplines including vulnerability research , embedded systems reverse engineering, CNO/CNE ... science, Cybersecurity, or related technical field, with a minimum 10-year Vulnerability Research /Reverse Engineering, or Cyber Software Development experience +… more
- University of Michigan (Ann Arbor, MI)
- RESEARCH FELLOW Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the first page of your resume. ... a team player. The individuals will be responsible for leading collaborative research projects focused on translation from patient-derived organoid models to guided… more
- Federal Reserve Bank (Cleveland, OH)
- …web based attacks and mitigations, cyber risk assessment and strategic analysis, vulnerability detection and assessment, mobile device management, and digital ... reported cybersecurity incidents at financial institutions. + Prepares in written form research , analysis, and assessments for key internal stakeholders as needed or… more
- LinkedIn (Mountain View, CA)
- …new products and technologies, including potential acquisitions. Respond to external vulnerability researcher inquiries and vulnerability reports. Educate ... on high impact engineering projects that detect security risks. Responsibilities: Research threats and attack vectors that impact LinkedIn's applications and… more
- Leidos (Ashburn, VA)
- …(ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current ... networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC… more
- Cowbell Cyber (IN)
- …designing and implementing application security solutions for web and or mobile applications + Experience developing and reporting vulnerability metrics ... teams to enhance and evangelize security in applications (& infrastructure). Research emerging technologies and maintain awareness of current security risks in… more
- Comcast (Philadelphia, PA)
- …for conducting a variety of security assessments, including web application, network, mobile , and cloud penetration testing, as well as participating in red team ... and CVE databases.** **Practical experience with web application, network, mobile , and cloud penetration testing.** **Strong network and application penetration… more
- Medtronic (Los Angeles, CA)
- …Cybersecurity strategies based on changing best practices. Perform emerging threat and vulnerability research . Identify and evaluate new areas for research ... teams on, and facilitate threat modeling, security risk evaluations, and vulnerability assessments to identify and mitigate potential security risks throughout the… more
- Meta (Bellevue, WA)
- …Security Engineer Intern Responsibilities: 1. Perform security assessments consisting of vulnerability research and exploitation against both the unique systems ... source code review, fuzzing and/or analysis, reverse engineering, exploit development and/or vulnerability research . 10. Familiarity of the attack lifecycle, and… more