• Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Mobile Security Researcher 4

    ARSIEM (Annapolis Junction, MD)
    research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
    ARSIEM (01/28/25)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Security Researcher

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
    Nightwing (02/22/25)
    - Save Job - Related Jobs - Block Source
  • Baseband-Savvy CNO Developer

    Parsons Corporation (Annapolis Junction, MD)
    …Are you looking to make great use of your reverse engineering ( **RE** ), vulnerability research ( **VR** ), and embedded development skills for ** mobile ... from / collaborate with our existing embedded development / vulnerability research / reverse engineering subject matter...Masters) + Experience with development on or analysis of mobile devices + Expertise with the C programming language​… more
    Parsons Corporation (02/06/25)
    - Save Job - Related Jobs - Block Source
  • Technical Compliance Analyst

    Zoom (Washington, DC)
    …About the Team: You will join a dynamic team dedicated to managing vulnerability and compliance for Zoom for Government. Our team fosters collaboration, creativity, ... empowered to maximize their potential. Responsibilities: * Validate and drive vulnerability remediation for discovered vulnerabilities. * Build the bridges between… more
    Zoom (03/13/25)
    - Save Job - Related Jobs - Block Source
  • Systems Administrator 2

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
    Nightwing (01/14/25)
    - Save Job - Related Jobs - Block Source
  • Subject Matter Expert CNO Developer (Cap3)

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... following desired skills Understanding of OS Internals (ie Windo) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Target Digital Network Analyst (Tdna)

    Percival Engineering (Columbia, MD)
    …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports (SIGINT) and ... open-source intelligence (OSINT) to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
    Percival Engineering (12/20/24)
    - Save Job - Related Jobs - Block Source
  • Manual Ethical Hacker

    Bank of America (Washington, DC)
    …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
    Bank of America (03/12/25)
    - Save Job - Related Jobs - Block Source
  • Intermediate Penetration Tester

    Chenega Corporation (Washington, DC)
    …API Top Ten (or alternate criteria as specified). + Perform network mapping, vulnerability scanning, and support phishing simulations, as well as report findings and ... to start **Knowledge, Skills, and Abilities:** + Experience assessing mobile devices (IOS, Android, Windows) such as iPhone, iPad,...feel prepared and confident. To help you with your research , we suggest you review the following links: Chenega… more
    Chenega Corporation (03/13/25)
    - Save Job - Related Jobs - Block Source
  • Systems Administrator 3

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Principal Consultant, Offensive Security,…

    Palo Alto Networks (Washington, DC)
    …Impact** + Assist in the development of internal infrastructure design for research , development, and testing focused on offensive security + Conducts periodic scans ... engineering support for the sustainment of information technology systems. ( mobile application testing, penetration testing, application, security, and hardware… more
    Palo Alto Networks (02/20/25)
    - Save Job - Related Jobs - Block Source
  • Jr. Cyber Security IT Analyst (entry-level)

    Washington Suburban Sanitary Commission (WSSC) (Laurel, MD)
    …with enterprise-wide cyber defense staff to validate network alerts + Conduct research , analysis, and define correlations across a wide variety of source datasets ... (indications and warnings) + Assist in vulnerability assessments, security audits, and the implementation of security controls through report generation, analysis,… more
    Washington Suburban Sanitary Commission (WSSC) (03/04/25)
    - Save Job - Related Jobs - Block Source
  • Digital Media Forensics Analyst - Expert

    Amentum (Fort Meade, MD)
    …support for incident response activities, intrusion events, and malware analysis * Research , design, deploy, and lead training events. * Evaluate emerging forensic ... Intelligence Briefings; CI or HUMINT Policy Analysis; Threat and Vulnerability Assessments; and Analytical Information Reports. **javelin** Amentum's health and… more
    Amentum (02/14/25)
    - Save Job - Related Jobs - Block Source