We interpreted District Of Columbia County, DC as District Of Columbia County, DC.
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- Guidehouse (Arlington, VA)
- …to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be employed ... **:** Ability to Obtain Public Trust Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the establishment… more
- Amazon (Arlington, VA)
- …technical areas. Key job responsibilities * Perform security risk assessments * Perform vulnerability analysis * Drive large scale and high impact remediation * Work ... scalable solution to manage third-party software security risks * Project and research work as needed. * Security training and outreach to internal development… more
- Parsons Corporation (Annapolis Junction, MD)
- …Are you looking to make great use of your reverse engineering ( **RE** ), vulnerability research ( **VR** ), and embedded development skills for ** mobile ... from / collaborate with our existing embedded development / vulnerability research / reverse engineering subject matter...Masters) + Experience with development on or analysis of mobile devices + Expertise with the C programming language… more
- Leidos (Ashburn, VA)
- …networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC ... to determine nature of activity occurring on customer networks, systems, servers, and mobile devices. + Conduct log analysis from multiple avenues and tools to… more
- Zoom (Washington, DC)
- …About the Team: You will join a dynamic team dedicated to managing vulnerability and compliance for Zoom for Government. Our team fosters collaboration, creativity, ... empowered to maximize their potential. Responsibilities: * Validate and drive vulnerability remediation for discovered vulnerabilities. * Build the bridges between… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Arlington, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …expertise pursuant to WiFi exploitation. 1+ years' demonstrated experience with vulnerability research , exploitation, and nday weaponization against wireless and ... analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research , or software exploit development +… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …pursuant to cyberenabling close access operations. + Demonstrated experience with vulnerability research , exploitation, and n-day weaponization against wireless ... analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research , or software exploit development. +… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... following desired skills Understanding of OS Internals (ie Windo) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
- Bank of America (Washington, DC)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- Chenega Corporation (Washington, DC)
- …API Top Ten (or alternate criteria as specified). + Perform network mapping, vulnerability scanning, and support phishing simulations, as well as report findings and ... to start **Knowledge, Skills, and Abilities:** + Experience assessing mobile devices (IOS, Android, Windows) such as iPhone, iPad,...feel prepared and confident. To help you with your research , we suggest you review the following links: Chenega… more