- Microsoft Corporation (Redmond, WA)
- …development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR Bachelor's Degree ... development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research , and/or anomaly detection OR equivalent… more
- BigBear.ai (Annapolis Junction, MD)
- …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated...experience, plus a BS in a technical discipline or 4 additional yrs. in place of BS + Clearance:… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …RE/interactive debugging tools (eg, Ghidra, OllyDbg, gdb); Software application vulnerability analysis and exploitation; Operating system internals; Mobile ... develop new capabilities, design new approaches, help solve complex problems, and research new solutions to propel our mission. As a Capabilities Development… more
- Sandia National Laboratories (Albuquerque, NM)
- …+ Professional experience in either weapon system design, embedded system design, mobile device security, vulnerability analysis, or embedded hardware security. ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...every two weeks, with every other Friday off) and 4 /10 (work 4 ten-hour days each week)… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ASM Research, An Accenture Federal Services Company (Germantown, MD)
- …+ Collaborate with contractors and vendors to integrate updates and enhancements. ** 4 . Vulnerability Management & Mitigation** + Conduct vulnerability ... provides targeted expertise in monitoring, compliance, incident response, and vulnerability management. This role ensures that cybersecurity tools, processes, and… more
- L3Harris (Washington, DC)
- …Essential Functions: + Collaborate with security researchers to adopt working research output into commercial products. + Transform vulnerability writeups ... in the interest of national security. Job Title: Senior Specialist, Senior Mobile Security Specialist Job Code: 32457 Job Location: Washington DC (Hybrid) Job… more
- Parsons Corporation (Linthicum, MD)
- …skills to gather, distill, and provide critical insights into cybersecurity vulnerability assessments of mission-critical government systems, we have the ideal role ... all-source analysis to lead the team's focus in performing both cybersecurity vulnerability assessments and strategic cyber report analysis to help assess and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Bank of America (Boston, MA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- Auburn University (Auburn, AL)
- …IT professional with a passion for finding creative solutions that support cutting-edge research with real-world impact? Do you have a driving sense of curiosity, ... collaborative IT team where you can personally contribute to life-changing research implementing and supporting a complex client and server network made… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Ability to think critically and adapt to dynamic or unpredictable environments. + 4 + years of experience in cyber operations, technical operations, or a related… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply ... perform discovery and target technology analysis of digital network and mobile communications. Digital Network Exploitation Analysts are hired into positions… more
- Chenega Corporation (Arlington, VA)
- …Bachelor's or master's in computer science, Engineering, or related field. + 4 + years of software and application development experience, including 2+ years working ... changes to enhance system and application security. + Strong knowledge of vulnerability management, system STIGing, RMF, and ATO lifecycle best practices. +… more
- Medtronic (Minneapolis, MN)
- …mindset, we pursue continuous innovation to breach new frontiers of Biomedical research . As the world is getting more connected, complexity and security challenges ... design to deployment. + Risk Assessment - Conduct threat modeling and vulnerability assessments to identify and mitigate security risks throughout the product… more
- Meta (Salt Lake City, UT)
- …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4 . BS or MS in Computer Science or a related field, or… more
Related Job Searches:
Mobile,
Mobile Vulnerability Researcher,
Researcher,
Vulnerability,
Vulnerability Researcher