- MIT Lincoln Laboratory (Fort Meade, MD)
- …to the success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop ... cyber operations, from the reverse engineering and exploitation of software and hardware systems to...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
- Parsons Corporation (Fort George G Meade, MD)
- …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
- Parsons Corporation (Fort George G Meade, MD)
- …candidate will have extensive hands-on experience in reverse engineering, vulnerability research , exploit development, and offensive cyber operations. This role ... and mentorship to junior team members. Share knowledge and expertise on exploitation techniques, development practices, and offensive cyber strategies + Work… more
- Deloitte (Baltimore, MD)
- Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- Percival Engineering (Columbia, MD)
- Ready to dive into and learn the latest cyber strategies and techniques? Are you all about tackling the toughest puzzles? Ready to bring your A-game? Well, buckle up ... team does it all. If you are a Target Analyst/ Cyber Security Engineer with a passion for innovation and...reports and status to internal and external stakeholders. + Research and analysis of data from OSINT, SIGINT, IMINT,… more
- Belay Technologies (Columbia, MD)
- …intel team. CODAs shall provide technical and engineering support in the exploitation of commercial network infrastructure and computer systems . The ... systems . CODAs shall provide technical and analytical support in the exploitation of commercial network infrastructure and computer systems . This analyst… more
- JPMorgan Chase (Washington, DC)
- …fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems , system and software vulnerabilities and exploitation techniques, and web ... shaping the future of cybersecurity. As an Assessments & Exercises Director in the Cyber and Tech Controls line of business, you will lead key efforts to enhance… more
- Parsons Corporation (Annapolis Junction, MD)
- …This exciting program includes performing software engineering, reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations) ... (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We need our developers to be… more
- Leidos (Columbia, MD)
- …landscape requires the development of innovative technical solutions to support operational cyber missions through research , engineering, and development. The ... architect, design, and lead a dynamic environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, software… more
- Huntington Ingalls Industries (Hanover, MD)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... towers to processors, we design, develop, integrate and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and… more
- Meta (Washington, DC)
- …from a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking a security analyst - threat ... our understanding and mitigation of child sexual abuse and exploitation on our family of apps. In addition to...an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our… more
- Huntington Ingalls Industries (Annapolis Junction, MD)
- …Level of Experience: Mid Job Description Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber , EW and ... changing, multi-domain global security threats, and anticipate emerging threats. Our cyber professionals are on the cutting edge of cyberspace operations, delivering… more
- JPMorgan Chase (Washington, DC)
- …fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems , system and software vulnerabilities and exploitation techniques, and web ... Team members who conduct advanced adversary emulation operations to replicate relevant cyber security threats targeting the firm. Your track record in leading… more
- Zurich NA (Washington, DC)
- …that emulate the tools, tactics, and procedures (TTPs) of threat actors. Lead research with the goal of developing new TTPs improving attack efficacy and assist ... on target access and operational issues. + Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. +… more
- Huntington Ingalls Industries (Hanover, MD)
- …HI This opportunity resides with Command, Control, Communications, Computers, Cyber , Intelligence, Surveillance and Reconnaissance (C5ISR), a business group within ... towers to processors, we design, develop, integrate and manage the sensors, systems and other assets necessary to support integrated intelligence, surveillance and… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Experience: Entry Level Job Description Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber , EW and ... changing, multi-domain global security threats, and anticipate emerging threats. Our cyber professionals are on the cutting edge of cyberspace operations, delivering… more
- Meta (Washington, DC)
- …a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking security engineers to investigate ... or derogatory language, and other potential objectionable material, ie child exploitation , graphic violence, self-injury, animal abuse, and other content which may… more
- Parsons Corporation (Annapolis Junction, MD)
- … cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source intelligence ... Ready to be part of a cutting edge growing Cyber Security project that is making a huge impact...of a large team researching vulnerabilities of large scale systems and developing assessments which are briefed to high… more