- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- CACI International (Aberdeen Proving Ground, MD)
- Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
- Parsons Corporation (Annapolis Junction, MD)
- …Are you looking to make great use of your reverse engineering ( **RE** ), vulnerability research ( **VR** ), and embedded development skills for ** mobile ... from / collaborate with our existing embedded development / vulnerability research / reverse engineering subject matter...Masters) + Experience with development on or analysis of mobile devices + Expertise with the C programming language… more
- Zoom (Annapolis, MD)
- …About the Team: You will join a dynamic team dedicated to managing vulnerability and compliance for Zoom for Government. Our team fosters collaboration, creativity, ... empowered to maximize their potential. Responsibilities: * Validate and drive vulnerability remediation for discovered vulnerabilities. * Build the bridges between… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... following desired skills Understanding of OS Internals (ie Windo) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
- Percival Engineering (Columbia, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports (SIGINT) and ... open-source intelligence (OSINT) to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Palo Alto Networks (Baltimore, MD)
- …Impact** + Assist in the development of internal infrastructure design for research , development, and testing focused on offensive security + Conducts periodic scans ... engineering support for the sustainment of information technology systems ( mobile application testing, penetration testing, application, security, and hardware… more
- Washington Suburban Sanitary Commission (WSSC) (Laurel, MD)
- …with enterprise-wide cyber defense staff to validate network alerts + Conduct research , analysis, and define correlations across a wide variety of source datasets ... (indications and warnings) + Assist in vulnerability assessments, security audits, and the implementation of security controls through report generation, analysis,… more
- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …and testing on a variety of commercial off the shelf devices such as mobile devices, UAS, and other emerging technologies. + Areas of technical interest include ... cyber vulnerability assessment, hardware and software reverse engineering, and threat...firmware review). + The ability to perform independent open-source research . + Solid background in micro-electronics and/or software development.… more
- Amentum (Fort Meade, MD)
- …support for incident response activities, intrusion events, and malware analysis * Research , design, deploy, and lead training events. * Evaluate emerging forensic ... Intelligence Briefings; CI or HUMINT Policy Analysis; Threat and Vulnerability Assessments; and Analytical Information Reports. **javelin** Amentum's health and… more