• Senior Threat Researcher (Unit 42) - Clearance…

    Palo Alto Networks (Washington, DC)
    …passive DNS, etc) to track malicious cyber actors, their infrastructure and campaigns + Reverse engineer malware via static/dynamic methods as well as ... be working closely with a globally distributed team of vulnerability researchers, reverse engineers, and threat intelligence analysts. You will be embedded into a… more
    Palo Alto Networks (08/12/24)
    - Save Job - Related Jobs - Block Source
  • Software Reverse Engineer :…

    Cipher Tech Solutions (Vienna, VA)
    …specifications. Regardless of whether you are applying to a software developer or reverse engineer position, if your application is approved, we will test ... support of one of two missions: digital forensics and malware reverse engineering. Digital forensics is the...oftentimes extremely advanced, malicious code. The goal of a reverse engineer is to understand how the… more
    Cipher Tech Solutions (06/27/24)
    - Save Job - Related Jobs - Block Source
  • Linux Administrator/Network Engineer (Mid…

    Cipher Tech Solutions (Vienna, VA)
    …production tools in direct support of one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and ... support federal and military law enforcement, counterintelligence, and counter-terrorist activities. Malware reverse engineering is the practice of analyzing,… more
    Cipher Tech Solutions (08/08/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Systems Engineer

    Leidos (Arlington, VA)
    …experience as Threat Researcher and/or Intelligence Analyst. * Experience with dynamic malware analysis, and reverse engineering. * Experience in cryptography or ... **Description** Are you a motivated cyber engineer with technical hands-on knowledge of mission focused...of exciting R&D programs. As a Senior Cyber Systems Engineer , your will be expected to "think like an… more
    Leidos (06/21/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Applied Research Engineer R&D

    Lockheed Martin (Arlington, VA)
    …Kernel\-level development, relish crafting OS/Network/Application designs, specialize in vulnerability and malware analysis, or excel in Reverse Engineering, IO, ... Implementation \- IDS and PSP Design and Implementation \- Static and dynamic reverse engineering on x86/x86\_64, MIPS, ARM, or PowerPC \- Vulnerability Analysis of… more
    Lockheed Martin (08/16/24)
    - Save Job - Related Jobs - Block Source
  • Experienced Full Stack Developer: Junior, Mid,…

    Cipher Tech Solutions (Vienna, VA)
    …debugging, and value-added development expertise to a digital forensic lab and malware reverse engineering section. Additionally, you will maintain existing ... directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the...analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the… more
    Cipher Tech Solutions (07/10/24)
    - Save Job - Related Jobs - Block Source
  • Kernel Developer - Senior Level (Secret Clearance…

    Cipher Tech Solutions (Vienna, VA)
    …or NT Kernel. Regardless of whether you are applying to a software developer or reverse engineer position, if your application is approved, we will test you on ... support of one of two missions: digital forensics and malware reverse engineering. Digital forensics is the...oftentimes extremely advanced, malicious code. The goal of a reverse engineer is to understand how the… more
    Cipher Tech Solutions (08/17/24)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Researcher - Future Need

    Cipher Tech Solutions (Vienna, VA)
    …production tools in direct support of one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and ... support federal and military law enforcement, counterintelligence, and counter-terrorist activities. Malware reverse engineering is the practice of analyzing,… more
    Cipher Tech Solutions (08/04/24)
    - Save Job - Related Jobs - Block Source
  • Full Stack Software/Web Developer: Mid or Senior…

    Cipher Tech Solutions (Vienna, VA)
    …production tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting ... military law enforcement, counter intelligence, and counter terrorist activities. Malware reverse engineering is the practice of...analyzing extremely advanced malicious code. The goal of a reverse engineer is to understand how the… more
    Cipher Tech Solutions (07/17/24)
    - Save Job - Related Jobs - Block Source
  • American Sign Language (ASL) Interpreter…

    Cipher Tech Solutions (Vienna, VA)
    …production tools in direct support of one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and ... support federal and military law enforcement, counterintelligence, and counter-terrorist activities. Malware reverse engineering is the practice of analyzing,… more
    Cipher Tech Solutions (07/13/24)
    - Save Job - Related Jobs - Block Source
  • American Sign Language (ASL) Interpreter…

    Cipher Tech Solutions (Vienna, VA)
    …production tools in direct support of one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and ... support federal and military law enforcement, counterintelligence, and counter-terrorist activities. Malware reverse engineering is the practice of analyzing,… more
    Cipher Tech Solutions (07/06/24)
    - Save Job - Related Jobs - Block Source
  • Black Lotus Labs Threat Intelligence Analyst

    Lumen (Washington, DC)
    …This position will work alongside advanced security researchers, data engineers, and malware reverse engineers, and data scientists to tackle evolving threats ... Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen's unique visibility to hunt...AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots. This is… more
    Lumen (08/15/24)
    - Save Job - Related Jobs - Block Source