- Silvus Technologies (Los Angeles, CA)
- …those who keep us safe. We do so by delivering the most advanced Mobile Ad-hoc Network (MANET) radios powered by our custom and ever-evolving Mobile -Networked ... Silvus' rapid growth is fueled by a focus on research and innovation and a team of the most...for Windows and Linus-based servers and VMs. + Support vulnerability and patch management processes, ensuring all Linux vulnerabilities… more
- altafiber (Honolulu, HI)
- …the needs of both a technical and non-technical audience. + Perform vulnerability scans and penetration tests of customer environments and controls. Using expertise ... by attackers. Assessment types will include social engineering and phishing, wireless, mobile device, and physical security, and web application penetration tests. +… more
- JPMorgan Chase (Wilmington, DE)
- …seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In ... As an Vulnerability Researcher - Assessments & Exercises...groups that share threat intelligence analytics + Conduct in-depth vulnerability research and exploit development across a… more
- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- Android Vulnerability Researcher Key Role: D elivers production-grade offensive capabilities that directly enable strategic intelligence collection and cyber ... is required. Basic Qualifications + 3+ years of experience conducting vulnerability research , reverse engineering, or exploit development + Experience… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- BigBear.ai (Annapolis Junction, MD)
- …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated solutions… more
- Sandia National Laboratories (Albuquerque, NM)
- …+ Professional experience in either weapon system design, embedded system design, mobile device security, vulnerability analysis, or embedded hardware security. ... worldwide + Extraordinary co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and enrichment opportunities +… more
- Sandia National Laboratories (Albuquerque, NM)
- …Expertise: + Experience with vulnerability research , system vulnerability assessments (high consequence/high trust systems, mobile systems, embedded ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...engage in work across the technology spectrum including embedded, mobile , desktop, enterprise, and cloud systems, as well as… more
- Palo Alto Networks (Santa Clara, CA)
- …Nmap, Burp Suite, Wireshark, etc. + Experience contributing to public vulnerability research , submitting CVEs or creating proof-of-concept exploits. **Nice ... team is expanding, and we're looking for a Staff Researcher Analyst to join our team. At Cortex, we...vulnerabilities using the XSIAM platform. **Your Impact** + Conduct vulnerability assessment research and testing, enhance automation… more
- Node.Digital (Arlington, VA)
- Cybersecurity Vulnerability Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node is supporting a US Government customer to provide ... cybersecurity vulnerability analysis support to reduce the prevalence and impact...and application security threats and vulnerabilities (eg, buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **CODEX Culture** Our organization… more
- University of Michigan (Ann Arbor, MI)
- Research Area Specialist Assoc **Early Site Maintenance** We are performing updates and maintenance to our applicant experience. As a result, the site will be ... programming languages (eg Stata, SAS, Matlab, ArcGIS) Your prior experience as a research assistant, in the private sector, and/or with independent research … more
- University of Michigan (Ann Arbor, MI)
- Research Fellow - Michigan Psychoneuroimmunology Lab **Early Site Maintenance** We are performing updates and maintenance to our applicant experience. As a result, ... the University of Michigan invites applications for a postdoctoral research fellow in the Michigan Psychoneuroimmunology Lab (https://sites.lsa.umich.edu/pni/) (PI:… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Noblis (Bethesda, MD)
- …to tackle offensive and defensive cyber challenges. They'll dive deep into vulnerability research , reverse engineering threats, and craft advanced tools and ... and develop any solution tailored to the area of need. + Conduct vulnerability research and analysis of identified platforms, reversing engineering threats to… more
- Toyota (San Juan, PR)
- …Management** + Identify and track system and application vulnerabilities. + Perform research and analysis of complex vulnerability incidents until resolved to ... including on-premises/cloud network, servers/ workstations, operating systems, applications, and mobile computers and devices are securely configured and issued. +… more
- Nightwing (Washington, DC)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- MUFG (Tampa, FL)
- …skills needed to be proficient + Scope and perform penetration testing and vulnerability research of complex proprietary software and hardware for client ... application development teams at MUFG to advocate for and support effective vulnerability risk reduction across the portfolio + Support maturation and modernization… more
Related Job Searches:
Mobile,
Mobile Vulnerability Researcher 4,
Researcher,
Vulnerability,
Vulnerability Researcher