- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out at Aberdeen ... **Overview** Darkblade Systems , an Intrepid Solutions company, is a trusted...other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …US Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation...team as a Cyber System Exploitation Researcher , you'll be… more
- MIT Lincoln Laboratory (Lexington, MA)
- …sponsors is considered essential to the success of their missions. Position Description As a Cyber System Exploitation Co-Op, you will work with a team of ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
- MIT Lincoln Laboratory (Lexington, MA)
- …our US Government sponsors is considered essential to the success of their missions. As a Cyber System Exploitation Co-Op, you will work with a team of ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop ... cyber operations, from the reverse engineering and exploitation of software and hardware systems to...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
- Parsons Corporation (Fort George G Meade, MD)
- …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
- Parsons Corporation (Fort George G Meade, MD)
- …candidate will have extensive hands-on experience in reverse engineering, vulnerability research , exploit development, and offensive cyber operations. This role ... and mentorship to junior team members. Share knowledge and expertise on exploitation techniques, development practices, and offensive cyber strategies + Work… more
- Lockheed Martin (Grand Prairie, TX)
- …in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... and the ability to work with Cyber Exploitation Engineers, Cyber System Security...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Position Description: Cyber System Exploitation Intern When you join our team ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation...as a Cyber System Exploitation Intern, you'll… more
- RTX Corporation (San Jose, CA)
- …Principal Reverse Engineer with specialization in cyber network operations and cyber network exploitation tools who strives for excellence and has a ... experience. + 8 years of experience developing cyber network operations and cyber network exploitation tools. + Reverse engineering technical skills in the… more
- CACI International (Fort Bragg, NC)
- …Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation ... Analyst; Digital Network Exploitation Analyst; Cyberspace Operator; Expeditionary Cyber Operator; Cyber Capability Developer; Analytic Support Officer -… more
- Air National Guard Units (Fort Meade, MD)
- …required TTPs used to secure computer systems and to protect them from cyber exploitation . Experienced in collaborating with the Cyber Tactics community ... assessed missions and systems . Defends missions and systems against adversary exploitation . Operates in-garrison and...included the discovery of advanced persistent threats in DOD cyber systems , replicated adversary cyber … more
- ENSCO, Inc. (Springfield, VA)
- …and vision in areas such as Systems Engineering and Integration, cyber exploitation and defense, research & development, experimentation, evaluation, ... + Strategic Pursuit & Capture: Lead for the Mission Systems Group (MSG) the identification, pursuit, and capture of...analysis, collaborative sensing exploitation , signal information exploitation , low Size Weight and Power (SWaP) system… more
- Leidos (Ashburn, VA)
- …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... **Description** Leidos is seeking an experienced Cyber Threat Hunt Analyst to join our team....findings in support of the protection of the customers' systems , networks, and assets. The US Department of Homeland… more
- MIT Lincoln Laboratory (Lexington, MA)
- …technology development thrusts include unconventional methods of system exploitation , testbed development and introspection, and gaining cyber intelligence ... common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work… more
- Deloitte (Baltimore, MD)
- Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- Koniag Government Services (Falls Church, VA)
- …any of the following disciplines: Human Intelligence, Counterintelligence, Signals Intelligence, Cyber Network Exploitation . + Previous experience in the ... practices. + Assist in assessing, defining, developing, and implementing Systems Security Engineering (SSE) requirements, including assessing security provisions in… more
- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
- CACI International (Chantilly, VA)
- Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular ... department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and...training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses… more