- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- Parsons Corporation (Annapolis Junction, MD)
- …Are you looking to make great use of your reverse engineering ( **RE** ), vulnerability research ( **VR** ), and embedded development skills for ** mobile ... from / collaborate with our existing embedded development / vulnerability research / reverse engineering subject matter...Masters) + Experience with development on or analysis of mobile devices + Expertise with the C programming language… more
- Zoom (Washington, DC)
- …About the Team: You will join a dynamic team dedicated to managing vulnerability and compliance for Zoom for Government. Our team fosters collaboration, creativity, ... empowered to maximize their potential. Responsibilities: * Validate and drive vulnerability remediation for discovered vulnerabilities. * Build the bridges between… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... following desired skills Understanding of OS Internals (ie Windo) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
- Percival Engineering (Columbia, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports (SIGINT) and ... open-source intelligence (OSINT) to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
- Bank of America (Washington, DC)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- Chenega Corporation (Washington, DC)
- …API Top Ten (or alternate criteria as specified). + Perform network mapping, vulnerability scanning, and support phishing simulations, as well as report findings and ... to start **Knowledge, Skills, and Abilities:** + Experience assessing mobile devices (IOS, Android, Windows) such as iPhone, iPad,...feel prepared and confident. To help you with your research , we suggest you review the following links: Chenega… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Palo Alto Networks (Washington, DC)
- …Impact** + Assist in the development of internal infrastructure design for research , development, and testing focused on offensive security + Conducts periodic scans ... engineering support for the sustainment of information technology systems. ( mobile application testing, penetration testing, application, security, and hardware… more
- Washington Suburban Sanitary Commission (WSSC) (Laurel, MD)
- …with enterprise-wide cyber defense staff to validate network alerts + Conduct research , analysis, and define correlations across a wide variety of source datasets ... (indications and warnings) + Assist in vulnerability assessments, security audits, and the implementation of security controls through report generation, analysis,… more
- Amentum (Fort Meade, MD)
- …support for incident response activities, intrusion events, and malware analysis * Research , design, deploy, and lead training events. * Evaluate emerging forensic ... Intelligence Briefings; CI or HUMINT Policy Analysis; Threat and Vulnerability Assessments; and Analytical Information Reports. **javelin** Amentum's health and… more