• Vulnerability Researcher

    JPMorgan Chase (Wilmington, DE)
    …seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In ... As an Vulnerability Researcher - Assessments & Exercises...groups that share threat intelligence analytics + Conduct in-depth vulnerability research and exploit development across a… more
    JPMorgan Chase (10/16/25)
    - Save Job - Related Jobs - Block Source
  • Android Vulnerability Researcher

    BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
    Android Vulnerability Researcher Key Role: D eliver production-grade offensive capabilities that directly enable strategic intelligence collection and cyber ... development. Basic Qualifications: + 3+ years of experience with conducting vulnerability research , reverse engineering, or exploit development + Experience… more
    BOOZ, ALLEN & HAMILTON, INC. (12/21/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/17/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/17/25)
    - Save Job - Related Jobs - Block Source
  • Senior Mobile Software Engineer with Poly

    BigBear.ai (Annapolis Junction, MD)
    …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated solutions… more
    BigBear.ai (11/15/25)
    - Save Job - Related Jobs - Block Source
  • Senior Security Researcher

    Microsoft Corporation (Redmond, WA)
    …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR Bachelor's Degree ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR equivalent… more
    Microsoft Corporation (12/24/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Vulnerability Analyst

    Node.Digital (Arlington, VA)
    Cybersecurity Vulnerability Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node is supporting a US Government customer to provide ... cybersecurity vulnerability analysis support to reduce the prevalence and impact...and application security threats and vulnerabilities (eg, buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions,… more
    Node.Digital (01/01/26)
    - Save Job - Related Jobs - Block Source
  • Group 05-59 | SRP Intern | Cyber System…

    MIT Lincoln Laboratory (Lexington, MA)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/31/25)
    - Save Job - Related Jobs - Block Source
  • Systems Admin - Vulnerability Management…

    ASM Research, An Accenture Federal Services Company (Chesapeake, VA)
    …deployments, task sequences, and reporting. + Support Microsoft Intune for mobile device and modern endpoint management. + Develop and maintain automation ... with hybrid endpoint management (SCCM + Intune). + Familiarity with vulnerability management tools (eg, Tenable, Qualys) and integration with patching workflows.… more
    ASM Research, An Accenture Federal Services Company (12/19/25)
    - Save Job - Related Jobs - Block Source
  • Android Mobile Reverse Engineer / Dev

    Nightwing (Palm Bay, FL)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
    Nightwing (11/25/25)
    - Save Job - Related Jobs - Block Source
  • Sr. Penetration Tester, Web/ Mobile Apps…

    TP-Link North America, Inc. (Irvine, CA)
    …platforms and applications. + Lead incident response activities and perform in-depth vulnerability research , oversee and manage the entire incident response ... TP-Link Systems Inc. is seeking a skilled and proactive Sr. Penetration Tester, Web/ Mobile Apps and Cloud Services to lead security initiatives for our cloud service… more
    TP-Link North America, Inc. (12/18/25)
    - Save Job - Related Jobs - Block Source
  • Android Mobile Reverse Engineer

    Nightwing (Palm Bay, FL)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **CODEX Culture** Our organization… more
    Nightwing (11/25/25)
    - Save Job - Related Jobs - Block Source
  • Engineer/Developer - Software/Hardware…

    National Security Agency/Central Security Service (Fort Meade, MD)
    …RE/interactive debugging tools (eg, Ghidra, OllyDbg, gdb); Software application vulnerability analysis and exploitation; Operating system internals; Mobile ... develop new capabilities, design new approaches, help solve complex problems, and research new solutions to propel our mission. As a Capabilities Development… more
    National Security Agency/Central Security Service (01/06/26)
    - Save Job - Related Jobs - Block Source
  • Research Fellow in Environmental Justice

    University of Michigan (Ann Arbor, MI)
    Research Fellow in Environmental Justice Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the ... to (can be added as citations) + Optional: Link(s) to academic presentations or research -related interviews that you've engaged in Note: This position will be a one… more
    University of Michigan (12/27/25)
    - Save Job - Related Jobs - Block Source
  • Research Area Specialist Assoc

    University of Michigan (Ann Arbor, MI)
    Research Area Specialist Assoc Apply Now **How to Apply** To be considered for the position, you will need to provide all elements of the following as a single ... programming languages (eg Stata, SAS, Matlab, ArcGIS) Your prior experience as a research assistant, in the private sector, and/or with independent research more
    University of Michigan (11/06/25)
    - Save Job - Related Jobs - Block Source
  • Research Fellow - Michigan…

    University of Michigan (Ann Arbor, MI)
    Research Fellow - Michigan Psychoneuroimmunology Lab Apply Now **How to Apply** The Department of Psychology at the University of Michigan invites applications for a ... postdoctoral research fellow in the Michigan Psychoneuroimmunology Lab (https://sites.lsa.umich.edu/pni/) (PI:...the neurobiological and behavioral mechanisms that underlie resilience and vulnerability to disease. The lab utilizes a range of… more
    University of Michigan (11/05/25)
    - Save Job - Related Jobs - Block Source
  • Group 05-51 | SRP Intern | Cyber-Physical Systems…

    MIT Lincoln Laboratory (Lexington, MA)
    …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
    MIT Lincoln Laboratory (12/16/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Analyst

    Southern Company (Birmingham, AL)
    …techniques and breach and attack simulation platforms. + Strong understanding of vulnerability research , exploit chains, and post-exploitation tactics. + Deep ... **SCS Cybersecurity** ** Vulnerability Exploitation Analyst** **Job Description** At Southern Company, our core objective is to ensure safe and reliable computing… more
    Southern Company (01/03/26)
    - Save Job - Related Jobs - Block Source
  • Software Engineer III, Chrome Product Security,…

    Google (Kirkland, WA)
    …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... security, artificial intelligence, natural language processing, UI design and mobile ; the list goes on and is growing every...creating new automation that will directly impact the Chrome vulnerability life-cycle and ensure that we are able to… more
    Google (12/12/25)
    - Save Job - Related Jobs - Block Source
  • Information Assurance - Cybersecurity

    Noblis (Bethesda, MD)
    …to tackle offensive and defensive cyber challenges. They'll dive deep into vulnerability research , reverse engineering threats, and craft advanced tools and ... and develop any solution tailored to the area of need. + Conduct vulnerability research and analysis of identified platforms, reversing engineering threats to… more
    Noblis (12/18/25)
    - Save Job - Related Jobs - Block Source