• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
    MIT Lincoln Laboratory (04/10/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Test Exploitation Sr

    Lockheed Martin (Fort Worth, TX)
    …equipment with business area administrators * Leading and conducting white hat exploitation and penetration testing, research , and development to support the ... experience \(Python, Perl, Ruby, Bash, Grep/Sed/Awk, etc\) including work on offensive cyber tools * of Operating System knowledge and practical experience in… more
    Lockheed Martin (06/29/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst L3 (TS/SCI w/Polygragh…

    Deloitte (Honolulu, HI)
    Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
    Deloitte (06/09/24)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    BlueHalo, LLC (Annapolis Junction, MD)
    …career. You'd like to do this + Conduct in-depth target analysis and research + Develop innovative tradecraft, exploitation techniques, and concepts of operation ... make this impact now. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As...is required You could also have this: + Open-source research background + Experience using learning management systems more
    BlueHalo, LLC (04/11/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    CACI International (Chantilly, VA)
    …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
    CACI International (05/25/24)
    - Save Job - Related Jobs - Block Source
  • Threat Investigator, Human Exploitation

    Meta (Menlo Park, CA)
    …from a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking a security analyst - threat ... will have an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our platforms.The ideal candidate… more
    Meta (06/07/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... Amentum is seeking multiple Digital Network Exploitation Analyst (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to… more
    Amentum (06/30/24)
    - Save Job - Related Jobs - Block Source
  • Senior Data Scientist 3 - AI-Enabled Signal…

    Pacific Northwest National Laboratory (Richland, WA)
    …to sophisticated technologies and materials, the threats grow more dynamic and complex-from cyber and nuclear to chemical and biological weapons of mass effect and ... algorithms, and tools-are enabling stronger, more resilient technologies and systems to safeguard national security. Coupled with decades of...Do you want to create a legacy of meaningful research for the greater good? Do you want to… more
    Pacific Northwest National Laboratory (06/26/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Software Engineer Sr (Embedded…

    Lockheed Martin (Grand Prairie, TX)
    …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
    Lockheed Martin (06/20/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Systems Engineer

    Leidos (Arlington, VA)
    …skilled and innovative individuals and a variety of exciting R&D programs. As a Senior Cyber Systems Engineer, your will be expected to "think like an adversary" ... will be leading a team of engineers to perform data analysis, investigative analysis, research on existing and emerging cyber threats, and develop tools to… more
    Leidos (06/21/24)
    - Save Job - Related Jobs - Block Source
  • Lead Cyber Security Research

    Wells Fargo (Minneapolis, MN)
    …role has no Visa sponsorship or transfer. Wells Fargo is seeking a Lead Cyber Security Research Consultant will perform tactical cyber -attack evaluation, ... defenders to resolve identified capability gaps. Each day you will conduct technical research and identifying methods to detect emerging cyber threats, emulating… more
    Wells Fargo (06/29/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Research Assistant

    Lamar University (Beaumont, TX)
    Position Information Posting Number 20112927 Position Title Cyber Research Assistant FTE 1 Position Type Staff Department Sponsored Program Administration ... Summary/Basic Function About the Role: The position of the research scientist is responsible for conducting research ...project are fulfilled. This includes developing effective cybersecurity and Cyber -Physical Systems ( CPS ) solutions for… more
    Lamar University (06/28/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Intel Analyst

    Leidos (Ashburn, VA)
    …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (06/05/24)
    - Save Job - Related Jobs - Block Source
  • Senior SIGINT & Cyber Analyst

    CACI International (Fort Meade, MD)
    …a bridging infrastructure between SIGINT/ CYBER and SOCOM entities, merging SIGINT/ CYBER systems capabilities and the integration of new systems ... Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation more
    CACI International (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Hunt Analyst

    Leidos (Ashburn, VA)
    …a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective ... security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial...analysis and threat findings to appropriate stakeholders + Lead cyber threat hunt missions with minimal supervision or guidance… more
    Leidos (05/31/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Detection Engineer

    Leidos (Ashburn, VA)
    …(Certified Professional) + OSCE (Certified Expert) + OSWP (Wireless Professional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (05/29/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Countermeasures Engineer

    Leidos (Ashburn, VA)
    …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (07/02/24)
    - Save Job - Related Jobs - Block Source
  • Cyber -Physical Systems Engineer

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber -Physical Systems Group tackles challenges at the convergence of cybersecurity and the physical world. We operate in an interdisciplinary research ... and development environment and our focus is on developing new cyber -physical capabilities for the DoD, intelligence community, and federal agencies. Our key… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source