- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ManTech (Fort Meade, MD)
- …low-level internals in one or more technology areas (eg, Windows, Unix, Mobile , Network devices). + Proficiency with networking (TCP/IP) and socket level ... programming. + 7 years of relevant experience to software development. **Preferred Qualifications:** + CNO capability development experience. Software Analysis/Reverse Engineering experience. + Understanding of assembly programming concepts. + Unit Test… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Leidos (Columbia, MD)
- …below. **5G Core Experience:** + Operating a multi-site 5G system and supporting Vulnerability Research and Operations + Experience setting up, configuring, and ... Analytics Business Area (CABA) is seeking an enthusiastic Cyber Researcher & Developer to join a diverse team of...and firewalls * Researching 5G network slicing implementation and vulnerability research * Utilization of RF Testing,… more
- CACI International (Aberdeen Proving Ground, MD)
- Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- Guidehouse (Arlington, VA)
- …to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be employed ... to 25% **Clearance Required** **:** None Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the… more
- Palo Alto Networks (San Francisco, CA)
- …teams or as a security analyst + Experience contributing to public vulnerability research , submitting CVEs or creating proof-of-concept exploits **The Team** ... Learning team on AI focused projects focused on scalability and quality. We conduct vulnerability research on both known and emerging exploits, ensuring we stay… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Moses/Weitzman Health System (Middletown, CT)
- …determinants of health like housing insecurity, food insecurity, and economic vulnerability . + Coordinate equipment transports with CHC Facilities department as ... poor and diverse populations, and is home to programs focusing on education, research , and process improvement support for safety net providers. The system delivers… more
- L3Harris (Herndon, VA)
- …capabilities development, integration, and testing in multiple disciplines including vulnerability research , embedded systems reverse engineering, CNO/CNE ... science, Cybersecurity, or related technical field, with a minimum 10-year Vulnerability Research /Reverse Engineering, or Cyber Software Development experience +… more
- University of Michigan (Ann Arbor, MI)
- Research Area Specialist Assoc Apply Now **How to Apply** To be considered for the position, you will need to provide all elements of the following as a single ... programming languages (eg Stata, SAS, Matlab, ArcGIS) Your prior experience as a research assistant, in the private sector, and/or with independent research … more
- University of Michigan (Ann Arbor, MI)
- RESEARCH FELLOW Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the first page of your resume. ... a team player. The individuals will be responsible for leading collaborative research projects focused on translation from patient-derived organoid models to guided… more
- LinkedIn (Mountain View, CA)
- …new products and technologies, including potential acquisitions. Respond to external vulnerability researcher inquiries and vulnerability reports. Educate ... on high impact engineering projects that detect security risks. Responsibilities: Research threats and attack vectors that impact LinkedIn's applications and… more
- General Dynamics Information Technology (Fairfax, VA)
- …to join our CDC team. The successful candidate will perform vulnerability assessments and penetration testing following the customers prescribed scope statement ... for protecting the company from dynamic and evolving threats. Monitors and research emerging and advanced information security threats, as well as investigating… more
- Cowbell Cyber (IN)
- …designing and implementing application security solutions for web and or mobile applications + Experience developing and reporting vulnerability metrics ... teams to enhance and evangelize security in applications (& infrastructure). Research emerging technologies and maintain awareness of current security risks in… more
- Comcast (Philadelphia, PA)
- …for conducting a variety of security assessments, including web application, network, mobile , and cloud penetration testing, as well as participating in red team ... and CVE databases.** **Practical experience with web application, network, mobile , and cloud penetration testing.** **Strong network and application penetration… more
- Motion Recruitment Partners (Plano, TX)
- …need to be skilled in performing thorough penetration tests on web APIs and mobile applications. Hybrid schedule, onsite 3 days a week. **Senior Red Team Penetration ... and multiple operating systems (eg Windows, Linux). Experience conducting manual API and Mobile PenTest using Burp Suite. + Proficient in at least one scripting… more