- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- Android Vulnerability Researcher Key Role: D eliver production-grade offensive capabilities that directly enable strategic intelligence collection and cyber ... development. Basic Qualifications: + 3+ years of experience with conducting vulnerability research , reverse engineering, or exploit development + Experience… more
- BOOZ, ALLEN & HAMILTON, INC. (Annapolis Junction, MD)
- … Key Role: Deliver production-grade offensive capabilities as an expert in Android vulnerability research and exploit development. Discover, weapon ... strategic intelligence collection and cyber effects missions. Perform advanced vulnerability research across Windows kernel, user-mode components, Hyper-V,… more
- SAIC (Fort Meade, MD)
- …Binary Ninja Desired Qualifications: + Understanding of OS Internals (ie Windows, Linux, Android ) + Experience with Vulnerability Research + Experience ... develop exploits. The ideal candidate will be able to perform vulnerability research , create code, build custom tools and scripts, document findings, and… more
- SAIC (Fort Meade, MD)
- …experience Desired Qualifications: + Understanding of OS Internals (ie Windows, Linux, Android ). + Experience with Vulnerability Research . + Experience ... reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, etc.) + Experience developing embedded systems and building and using tools to find, exploit, and productize vulnerabilities in complex software systems. + Understanding of network protocols… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- L3Harris (Washington, DC)
- …Essential Functions: + Collaborate with security researchers to adopt working research output into commercial products. + Transform vulnerability writeups ... the best security researchers and product engineers from across the security research and intelligence communities. You will be engaged on the most challenging… more
- Artera Technologies (Annapolis Junction, MD)
- …TS/SCI with Appropriate Agency Polygraph Artera Technologies, LLC's performs extensive vulnerability research and security risk assessment of our clients' ... applications using make files or comparable build environments. + Cisco, Juniper, Android , Apple iOS. + Developing network related programs (eg, packet level). +… more
- BigBear.ai (Annapolis Junction, MD)
- …query device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). ... + Knowledge of end-to-end SIGINT collection and analysis systems. + Experience with production CNO capabilities and operations. + Experience with additional programming languages (C/C++). About BigBear.ai BigBear.ai is a leading provider of AI-powered decision… more
- CGI Technologies and Solutions, Inc. (Bethesda, MD)
- …variety of digital storage devices. . Conduct reverse engineering, failure analysis, vulnerability analysis, and other research techniques to understand complex ... Assembly language, etc. . Experience with Operating Systems: Windows, Linux, iOS, Android , Embedded Linux, RTOS, etc. . Knowledge of communication protocols (eg,… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... at least one of the following environments: + BSD/Linux/Unix + Windows + macOS + Android + RISC assembly + Minimum of three (3) years of experience developing and… more