• Vulnerability Researcher

    ARSIEM (Fort Meade, MD)
    Vulnerability Researcher Responsibilities + Provide engineering and vulnerability research results related to hardware components, software applications, ... Vulnerability Researcher Responsibilities + Provide engineering and vulnerability research results related to hardware components, software applications,… more
    ARSIEM (01/15/25)
    - Save Job - Related Jobs - Block Source
  • Android Vulnerability Researcher

    Nightwing (Arlington, VA)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... a motivated individual with a passion for advanced reverse engineering and vulnerability research . This role offers a unique chance to work on groundbreaking… more
    Nightwing (03/12/25)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Researcher

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... below Desired Skills: Understanding of OS Internals (any major OS) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
    Nightwing (12/24/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Security Researcher

    Nightwing (Annapolis Junction, MD)
    …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
    Nightwing (02/22/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Software Application Researcher

    BigBear.ai (Columbia, MD)
    …architecture design. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices, ... Overview BigBear.ai is seeking a Software Researcher to identify flaws in software and software...What you will do Demonstrate the latest techniques in vulnerability research and demonstrate their ability to… more
    BigBear.ai (02/14/25)
    - Save Job - Related Jobs - Block Source
  • Windows Security Researcher

    BigBear.ai (Columbia, MD)
    Researcher . The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. What ... you will do Familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Write codes in C, Python, and… more
    BigBear.ai (02/14/25)
    - Save Job - Related Jobs - Block Source
  • Mobile Security Researcher 4

    ARSIEM (Annapolis Junction, MD)
    research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... with. ARSIEM is currently looking for a Mobile Security Researcher . The position will support one of our...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
    ARSIEM (01/28/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive cyber… more
    MIT Lincoln Laboratory (03/15/25)
    - Save Job - Related Jobs - Block Source
  • Manager: Threat & Vulnerability Management

    OneMain Financial (Baltimore, MD)
    …includes providing vulnerability detection and remediation oversight, vulnerability research , secure baseline compliance, web application security, ... The Threat & Vulnerability Team Manager will be leading critical support...of concepts and ultimately implement better mitigating controls. + Research current and emerging information security exploits, threats, and… more
    OneMain Financial (02/06/25)
    - Save Job - Related Jobs - Block Source
  • Security Engineer, Vulnerability Management

    Meta (Washington, DC)
    …Security Engineer to help us mature Meta's security posture through our vulnerability management program. Our team strives to go beyond identifying vulnerabilities ... classes of vulnerabilities.Do you have experience analyzing vulnerabilities and building vulnerability management programs? Can you identify when a vulnerability more
    Meta (01/17/25)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Management Specialist…

    Guidehouse (Arlington, VA)
    …VM program to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be ... **:** Ability to Obtain Public Trust Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the establishment… more
    Guidehouse (01/09/25)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Assessment Analyst (SOC II)

    Eliassen Group (Washington, DC)
    …strategies. **Experience Requirements:** + Advanced skills in cyber threat intelligence and vulnerability assessment. + Strong analytical and research skills to ... ** Vulnerability Assessment Analyst (SOC II)** **Washington, DC** **Type:**...cybersecurity team, focusing on advanced cyber threat intelligence and vulnerability assessment. This role is responsible for identifying and… more
    Eliassen Group (03/05/25)
    - Save Job - Related Jobs - Block Source
  • Senior Security Engineer, AWS Vulnerability

    Amazon (Arlington, VA)
    …mentorship to less experienced team members in day to day operations - Research and interpret vulnerability disclosures and intelligence. - Author risk ... passionate and innovative Sr. Security Engineer for the AWS Vulnerability Management team. At AWS, security is job zero....team. At AWS, security is job zero. The AWS Vulnerability Management team continuously raises the bar for security… more
    Amazon (03/06/25)
    - Save Job - Related Jobs - Block Source
  • Cryptographic Vulnerability Analyst

    ManTech (Linthicum Heights, MD)
    ManTech seeks a motivated, career and customer-oriented Cryptographic Vulnerability Analyst to join our team in Linthicum Heights, MD. This is a full time position ... while creating and maintaining documentation on technical information and document research processes, analyses and/or the results. + Identify vulnerabilities to… more
    ManTech (03/04/25)
    - Save Job - Related Jobs - Block Source
  • Sr. Exploitation Vulnerability SME

    Parsons Corporation (Fort George G Meade, MD)
    …a TS/SCI with Polygraph and a deep technical expertise in vulnerability exploitation, advanced persistent threats (APT), and hands-on experience with offensive ... in cybersecurity threats and offensive capabilities and contribute to internal research and development efforts. + Mentor junior team members and develop… more
    Parsons Corporation (03/04/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Solutions Developer - Top Secret (Fort…

    Lockheed Martin (Fort Meade, MD)
    …organization's portfolio and suite of capabilities\. You will serve as a vulnerability researcher , hardware and/or software developer, and provide expertise to ... coordinate, and execute the development of multiple projects *Serve as a vulnerability researcher and hardware and/or software developer *Develop, customize, and… more
    Lockheed Martin (03/04/25)
    - Save Job - Related Jobs - Block Source
  • Darpa AI/ML Research Scientist

    Amentum (Arlington, VA)
    Amentum is seeking a highly experienced and accomplished AI/ML Research Scientist to play a critical role in supporting DARPA programs. In this position, you will ... technical assessments and feasibility analyses of cutting-edge technologies and proposed research directions. + Contribute to the development of program plans,… more
    Amentum (12/20/24)
    - Save Job - Related Jobs - Block Source
  • Intelligence Research Support Specialist I

    Advantage SCI (Washington, DC)
    Job Descriptions: Position Title: Intelligence Research Support Specialist I Reports To: The Customer and Project Manager Clearance Type: Top Secret Work Location: ... federal agency security program. This position will focus on the review, research , assessment, and summary of intelligence materials. This position is considered to… more
    Advantage SCI (02/21/25)
    - Save Job - Related Jobs - Block Source
  • Research and Technology Protection Analyst

    KBR (Chevy Chase, MD)
    Title: Research and Technology Protection Analyst Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced ... based upon contract award KBR is seeking a highly motivated and career-oriented Research and Technology Protection Analyst to join our team supporting a government… more
    KBR (02/15/25)
    - Save Job - Related Jobs - Block Source