- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- Lockheed Martin (Fort Worth, TX)
- …equipment with business area administrators * Leading and conducting white hat exploitation and penetration testing, research , and development to support the ... experience \(Python, Perl, Ruby, Bash, Grep/Sed/Awk, etc\) including work on offensive cyber tools * of Operating System knowledge and practical experience in… more
- Deloitte (Honolulu, HI)
- Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
- BlueHalo, LLC (Annapolis Junction, MD)
- …career. You'd like to do this + Conduct in-depth target analysis and research + Develop innovative tradecraft, exploitation techniques, and concepts of operation ... make this impact now. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As...is required You could also have this: + Open-source research background + Experience using learning management systems… more
- CACI International (Chantilly, VA)
- …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
- Meta (Menlo Park, CA)
- …from a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking a security analyst - threat ... will have an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our platforms.The ideal candidate… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... Amentum is seeking multiple Digital Network Exploitation Analyst (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to… more
- Pacific Northwest National Laboratory (Richland, WA)
- …to sophisticated technologies and materials, the threats grow more dynamic and complex-from cyber and nuclear to chemical and biological weapons of mass effect and ... algorithms, and tools-are enabling stronger, more resilient technologies and systems to safeguard national security. Coupled with decades of...Do you want to create a legacy of meaningful research for the greater good? Do you want to… more
- Lockheed Martin (Grand Prairie, TX)
- …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- Leidos (Arlington, VA)
- …skilled and innovative individuals and a variety of exciting R&D programs. As a Senior Cyber Systems Engineer, your will be expected to "think like an adversary" ... will be leading a team of engineers to perform data analysis, investigative analysis, research on existing and emerging cyber threats, and develop tools to… more
- Wells Fargo (Minneapolis, MN)
- …role has no Visa sponsorship or transfer. Wells Fargo is seeking a Lead Cyber Security Research Consultant will perform tactical cyber -attack evaluation, ... defenders to resolve identified capability gaps. Each day you will conduct technical research and identifying methods to detect emerging cyber threats, emulating… more
- Lamar University (Beaumont, TX)
- Position Information Posting Number 20112927 Position Title Cyber Research Assistant FTE 1 Position Type Staff Department Sponsored Program Administration ... Summary/Basic Function About the Role: The position of the research scientist is responsible for conducting research ...project are fulfilled. This includes developing effective cybersecurity and Cyber -Physical Systems ( CPS ) solutions for… more
- Leidos (Ashburn, VA)
- …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- CACI International (Fort Meade, MD)
- …a bridging infrastructure between SIGINT/ CYBER and SOCOM entities, merging SIGINT/ CYBER systems capabilities and the integration of new systems ... Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation… more
- Leidos (Ashburn, VA)
- …a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective ... security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial...analysis and threat findings to appropriate stakeholders + Lead cyber threat hunt missions with minimal supervision or guidance… more
- Leidos (Ashburn, VA)
- …(Certified Professional) + OSCE (Certified Expert) + OSWP (Wireless Professional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- Leidos (Ashburn, VA)
- …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber -Physical Systems Group tackles challenges at the convergence of cybersecurity and the physical world. We operate in an interdisciplinary research ... and development environment and our focus is on developing new cyber -physical capabilities for the DoD, intelligence community, and federal agencies. Our key… more