• Mobile Vulnerability

    GliaCell Technologies (Annapolis Junction, MD)
    Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
    GliaCell Technologies (01/01/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/14/24)
    - Save Job - Related Jobs - Block Source
  • Mobile Security Researcher 4

    ARSIEM (Annapolis Junction, MD)
    research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
    ARSIEM (10/29/24)
    - Save Job - Related Jobs - Block Source
  • Threat Researcher

    CACI International (Aberdeen Proving Ground, MD)
    Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
    CACI International (11/23/24)
    - Save Job - Related Jobs - Block Source
  • Subject Matter Expert CNO Developer (Cap3)

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... following desired skills Understanding of OS Internals (ie Windo) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Senior Principal Cyber Engineer

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Target Digital Network Analyst (Tdna):

    Percival Engineering (Columbia, MD)
    …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports (SIGINT) and ... open-source intelligence (OSINT) to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
    Percival Engineering (12/20/24)
    - Save Job - Related Jobs - Block Source
  • Target Digital Network Analyst (Tdna)

    Lentech, Inc (Fort Meade, MD)
    …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...hashing Forensic analysis of Windows systems, Linux systems or mobile devices Commercial / GOTS tools for Intrusion detection… more
    Lentech, Inc (10/17/24)
    - Save Job - Related Jobs - Block Source
  • Systems Administrator 3

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Exploitation Specialist

    Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
    …and testing on a variety of commercial off the shelf devices such as mobile devices, UAS, and other emerging technologies. + Areas of technical interest include ... cyber vulnerability assessment, hardware and software reverse engineering, and threat...firmware review). + The ability to perform independent open-source research . + Solid background in micro-electronics and/or software development.… more
    Intrepid Solutions and Services (11/28/24)
    - Save Job - Related Jobs - Block Source