• Cyber System Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …to the success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
    MIT Lincoln Laboratory (11/11/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop ... cyber operations, from the reverse engineering and exploitation of software and hardware systems to...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
    MIT Lincoln Laboratory (10/08/24)
    - Save Job - Related Jobs - Block Source
  • Sr. Exploitation Vulnerability SME

    Parsons Corporation (Fort George G Meade, MD)
    …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
    Parsons Corporation (08/27/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Developer

    Parsons Corporation (Fort George G Meade, MD)
    …candidate will have extensive hands-on experience in reverse engineering, vulnerability research , exploit development, and offensive cyber operations. This role ... and mentorship to junior team members. Share knowledge and expertise on exploitation techniques, development practices, and offensive cyber strategies + Work… more
    Parsons Corporation (08/27/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    Deloitte (Baltimore, MD)
    Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
    Deloitte (10/02/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst 1-4…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
    Amentum (09/28/24)
    - Save Job - Related Jobs - Block Source
  • Target Analyst/ Cyber Security Engineer

    Percival Engineering (Columbia, MD)
    Ready to dive into and learn the latest cyber strategies and techniques? Are you all about tackling the toughest puzzles? Ready to bring your A-game? Well, buckle up ... team does it all. If you are a Target Analyst/ Cyber Security Engineer with a passion for innovation and...reports and status to internal and external stakeholders. + Research and analysis of data from OSINT, SIGINT, IMINT,… more
    Percival Engineering (11/02/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Operator/Developer/Analyst

    Belay Technologies (Columbia, MD)
    …intel team. CODAs shall provide technical and engineering support in the exploitation of commercial network infrastructure and computer systems . The ... systems . CODAs shall provide technical and analytical support in the exploitation of commercial network infrastructure and computer systems . This analyst… more
    Belay Technologies (10/16/24)
    - Save Job - Related Jobs - Block Source
  • Assessments & Exercises Director - Strategy Lead

    JPMorgan Chase (Washington, DC)
    …fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems , system and software vulnerabilities and exploitation techniques, and web ... shaping the future of cybersecurity. As an Assessments & Exercises Director in the Cyber and Tech Controls line of business, you will lead key efforts to enhance… more
    JPMorgan Chase (10/17/24)
    - Save Job - Related Jobs - Block Source
  • Software Engineer, Senior

    Parsons Corporation (Annapolis Junction, MD)
    …This exciting program includes performing software engineering, reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations) ... (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We need our developers to be… more
    Parsons Corporation (10/16/24)
    - Save Job - Related Jobs - Block Source
  • Technical Director, CNO R&D

    Leidos (Columbia, MD)
    …landscape requires the development of innovative technical solutions to support operational cyber missions through research , engineering, and development. The ... architect, design, and lead a dynamic environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, software… more
    Leidos (10/01/24)
    - Save Job - Related Jobs - Block Source
  • Principal Software Engineer (Engineer Software 5)

    Huntington Ingalls Industries (Hanover, MD)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... towers to processors, we design, develop, integrate and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and… more
    Huntington Ingalls Industries (09/25/24)
    - Save Job - Related Jobs - Block Source
  • Threat Investigator, Youth Safety Team

    Meta (Washington, DC)
    …from a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking a security analyst - threat ... our understanding and mitigation of child sexual abuse and exploitation on our family of apps. In addition to...an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our… more
    Meta (09/06/24)
    - Save Job - Related Jobs - Block Source
  • Cyberspace Exercise Planner

    Huntington Ingalls Industries (Annapolis Junction, MD)
    …Level of Experience: Mid Job Description Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber , EW and ... changing, multi-domain global security threats, and anticipate emerging threats. Our cyber professionals are on the cutting edge of cyberspace operations, delivering… more
    Huntington Ingalls Industries (09/30/24)
    - Save Job - Related Jobs - Block Source
  • Assessments & Exercises Vice President - Red Team…

    JPMorgan Chase (Washington, DC)
    …fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems , system and software vulnerabilities and exploitation techniques, and web ... Team members who conduct advanced adversary emulation operations to replicate relevant cyber security threats targeting the firm. Your track record in leading… more
    JPMorgan Chase (10/11/24)
    - Save Job - Related Jobs - Block Source
  • Red Team Operator - Senior Level

    Zurich NA (Washington, DC)
    …that emulate the tools, tactics, and procedures (TTPs) of threat actors. Lead research with the goal of developing new TTPs improving attack efficacy and assist ... on target access and operational issues. + Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. +… more
    Zurich NA (10/22/24)
    - Save Job - Related Jobs - Block Source
  • Software Test Engineer, Associate (Engineer…

    Huntington Ingalls Industries (Hanover, MD)
    …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... towers to processors, we design, develop, integrate and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and… more
    Huntington Ingalls Industries (10/19/24)
    - Save Job - Related Jobs - Block Source
  • Cyberspace Defensive Analyst

    Huntington Ingalls Industries (Fort Meade, MD)
    …Experience: Entry Level Job Description Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber , EW and ... changing, multi-domain global security threats, and anticipate emerging threats. Our cyber professionals are on the cutting edge of cyberspace operations, delivering… more
    Huntington Ingalls Industries (10/03/24)
    - Save Job - Related Jobs - Block Source
  • Security Engineer, Investigations - i3E

    Meta (Washington, DC)
    …a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking security engineers to investigate ... or derogatory language, and other potential objectionable material, ie child exploitation , graphic violence, self-injury, animal abuse, and other content which may… more
    Meta (11/07/24)
    - Save Job - Related Jobs - Block Source
  • Target Digital Network Analyst (Tdna)

    Parsons Corporation (Annapolis Junction, MD)
    cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source intelligence ... Ready to be part of a cutting edge growing Cyber Security project that is making a huge impact...of a large team researching vulnerabilities of large scale systems and developing assessments which are briefed to high… more
    Parsons Corporation (09/10/24)
    - Save Job - Related Jobs - Block Source