- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- ARSIEM (Annapolis Junction, MD)
- …is looking for a Mobile Vulnerability Researcher to perform Mobile Vulnerability Research . The positions will support one of our Government ... in Annapolis Junction, MD . Responsibilities + Work on a team performing vulnerability research against mobile technologies. + Document research with… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Leidos (Columbia, MD)
- …below. **5G Core Experience:** + Operating a multi-site 5G system and supporting Vulnerability Research and Operations + Experience setting up, configuring, and ... Analytics Business Area (CABA) is seeking an enthusiastic Cyber Researcher & Developer to join a diverse team of...and firewalls * Researching 5G network slicing implementation and vulnerability research * Utilization of RF Testing,… more
- Parsons Corporation (Chantilly, VA)
- …Network Operations arena. Our mission is to provide critical vulnerability research and exploitation development on Android mobile device platforms. Our team ... development and has an understanding of Android development. Relevant experience with vulnerability research and working with existing toolchains and weaponizing… more
- L3Harris (Herndon, VA)
- …capabilities development, integration, and testing in multiple disciplines including vulnerability research , embedded systems reverse engineering, CNO/CNE ... science, Cybersecurity, or related technical field, with a minimum 10-year Vulnerability Research /Reverse Engineering, or Cyber Software Development experience +… more
- Amazon (Herndon, VA)
- … Vulnerability Identification and Tracking * Offensive security testing & vulnerability research * Emergent threat testing * Creating/maintaining automated ... Produce high quality red team reports * Projects and research work as needed * Security training and outreach...- 5 + years of experience with red teaming, vulnerability testing, and/or auditing techniques - 5 + years… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... determining scope, urgency, and potential impact - Identifying the specific vulnerability and make recommendations that enable expeditious remediation - Assisting… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... national security strategies (NCISS). - Supporting teams conducting threat and vulnerability management to recognize and categorize types of vulnerabilities, threat… more
- Bank of America (Washington, DC)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- Koniag Government Services (Washington, DC)
- …on quick wins as part of a longer-term enterprise roadmap. + Support Mobile Application MFA Proof of Concept (PoC) solutions. + Develop enhanced Multi-Factor ... + Review current system security measures, conduct system security and vulnerability analyses and risk assessments; recommend and support the implementation of… more
- Parsons Corporation (Annapolis Junction, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
- Lentech, Inc (Fort Meade, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...hashing Forensic analysis of Windows systems, Linux systems or mobile devices Commercial / GOTS tools for Intrusion detection… more
- Chenega Corporation (Washington, DC)
- …API Top Ten (or alternate criteria as specified) + Perform network mapping, vulnerability scanning, and support phishing simulations as well as report findings and ... certification + Background check **Knowledge, Skills, and Abilities:** + Experience assessing mobile devices (IOS, Android, Windows) such as iPhone, iPad, and other … more
- Battelle Memorial Institute (Chantilly, VA)
- Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and manufacture products and deliver critical services ... for a position located in **Chantilly, Virginia** , supporting the configuration of mobile and fixed site cyber assessment toolkits. These toolkits have a variety of… more
- CACI International (Chantilly, VA)
- …a wide of range knowledge and skills, such as computer forensics/ mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies, ... intelligence analysis, and vulnerability assessments. This is an exciting opportunity to work...training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... system and application security threats and vulnerabilities (eg, buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert… more
- CACI International (Chantilly, VA)
- …a wide of range knowledge and skills, such as computer forensics/ mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies, ... intelligence analysis, and vulnerability assessments. This is an exciting opportunity to work...training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses… more
- Leidos (Suitland, MD)
- …the Division. + Monitors available blue signature data to ensure the vulnerability assessments are utilizing the most current and accurate signatures. + Ensures ... covers the full frequency regime monitored by all foreign acoustic systems, both mobile and fixed. + Performs analysis of acoustic modeling software to ensure the… more