- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- Lockheed Martin (Eglin AFB, FL)
- …exercises at the National Cyber Range Complex in Eglin AFB FL\. As the Cyber Test Exploitation , you will play a critical role in ensuring the quality and ... **Description:** **WHAT WE'RE DOING** Lockheed Martin, Cyber & Intelligence invites you to step up...following: *Penetration Testing of modern Windows and Linux operating systems and IP based networks\. * Exploit and malware… more
- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out at Aberdeen ... **Overview** Darkblade Systems , an Intrepid Solutions company, is a trusted...other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
- Parsons Corporation (Fort George G Meade, MD)
- …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
- Deloitte (Baltimore, MD)
- Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- CACI International (Fort Bragg, NC)
- …Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation ... Analyst; Digital Network Exploitation Analyst; Cyberspace Operator; Expeditionary Cyber Operator; Cyber Capability Developer; Analytic Support Officer - **… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
- Cisco (Fulton, MD)
- …services that impact the lives of many people. Our experts conduct in-depth research into vulnerabilities and exploitation trends to help us accurately assess ... This Senior Researcher position with Cisco Talos Vulnerability Discovery and Research Team is available to remote workers based in the United States. Security… more
- CACI International (Chantilly, VA)
- Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular ... department with an expanding range of programs focusing on Cyber Operations, where you get to grow on and...training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses… more
- MIT Lincoln Laboratory (Lexington, MA)
- …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems...essential to the success of their missions. Position Description: Cyber System Exploitation Intern When you join… more
- Lockheed Martin (Grand Prairie, TX)
- …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- General Dynamics Information Technology (Tampa, FL)
- …**Public Trust/Other Required:** None **Job Family:** Intelligence **Skills:** Cybersecurity, Cyber Threat Intelligence,Open Source Research **Certifications:** ... ideal candidate will demonstrate strong analytical and communication skills, proficiency in cyber environments and open-source research , and a deep understanding… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber Physical Systems Group tackles key problems in the convergence of cybersecurity and the physical world in an interdisciplinary research and ... Laboratory is seeking an experienced Offensive Cyber Operations Expert to join our Cyber Physical Systems group within the Cyber Security and Information… more
- Applied Research Solutions (Dayton, OH)
- **Description** Applied Research Solutions is seeking a full-time Cyber Security Engineer, located at Wright-Patterson AFB, OH support the ISR Crosscutter ... systems and critical networks against malicious and non-malicious exploitation throughout the full acquisition lifecycle of portfolio programs. The Contractor… more