- Lockheed Martin (Hanover, MD)
- …package\. We support our employees, so they can support our mission\. **The Work:** As the Offensive Cyber VR/RE, your one of a kind mind will jump in to ... **Description:** **What We're Doing:** Lockheed Martin, Cyber & Intelligence invites you to step up...of Lockheed Martin to keep the threats at bay\. Cyber | Lockheed Martin **Who we are:** Lockheed Martin's… more
- MIT Lincoln Laboratory (Lexington, MA)
- …to the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis of offensive or defensive cyber ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities ...essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …to the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis of offensive or defensive cyber ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities ...Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive cyber tools, ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities ...sponsors. We provide support across the full lifecycle of offensive cyber operations, from the reverse engineering… more
- JPMorgan Chase (Plano, TX)
- …that encourage continuous improvement + Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities , industry ... propelling continuous improvement. As an Assessments & Exercises Vice President in the Cyber and Tech Controls line of business, you will contribute significantly to… more
- Palo Alto Networks (Washington, DC)
- …**Your Impact** + Assist in the development of internal infrastructure design for research , development, and testing focused on offensive security + Conducts ... a few! **Your Career** The Principal Consultant on the Offensive Security team is focused on assessing and challenging...testing and code auditing to find security gaps and vulnerabilities + Knowledge and experience in conducting cyber… more
- CoStar Realty Information, Inc. (Arlington, VA)
- Senior Offensive Security Engineer Job Description ** Offensive Security Engineer** **Overview** CoStar Group (NASDAQ: CSGP) is a leading global provider of ... available, we provide an invaluable edge in real estate. Evolve our offensive security capabilities to test our internal and external facing processes,… more
- Nightwing (San Antonio, TX)
- …is looking for interns interested in a career focused on offensive cyber practices as a Vulnerability Researcher . Nightwing's goal is to teach interns ... challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous... offensive cyber practices that they would not encounter in everyday… more
- Northrop Grumman (Cincinnati, OH)
- … hardware and software solutions with learning opportunities in offensive cyber operations (OCO). **Essential Functions:** + Research vulnerabilities and ... . **Northrop Grumman Mission Systems** (NGMS) is seeking a senior level **Vulnerability Research Engineer** to join our team of qualified, diverse individuals at our… more
- MIT Lincoln Laboratory (Lexington, MA)
- …to the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis of offensive or defensive cyber ... for our operational partners in the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems can be… more
- Leidos (Reston, VA)
- …motivated and skilled Cyber Systems Analyst to contribute to our research and development (R&D) efforts in offensive computer network vulnerability ... Conduct in-depth research and analysis of emerging cyber threats and vulnerabilities , with a focus...System Security Professional (CISSP), SANS - GXPN - Exploit Researcher and Advanced Penetration Tester, OSEE (Exploitation Expert) .… more
- Lockheed Martin (Fort Bragg, NC)
- …to support cyber offensive , defense, and full spectrum cyber operations *Conduct vulnerability research , reverse engineering, and penetration testing ... cyber solutions, including secure systems to support cyber offensive , defense, and full spectrum ...subject matter \(hardware, software, networks, cloud, etc\.\) to conduct research to evaluate potential vulnerabilities and develop… more
- Leidos (Odenton, MD)
- …work is ahead!** The National Security Sector (NSS) is hiring for a Lead Offensive Cyber Operations Planner to provide expert guidance and direction to planning ... characteristic. + Review, approve, prioritize, and submit operational requirements for research , development, and/or acquisition of cyber capabilities. + Develop… more
- Lockheed Martin (Grand Prairie, TX)
- …to support cyber offensive , defense and full spectrum cyber operations * Conducting vulnerability research , reverse engineering, penetration testing ... **Description:** You will be a Cyber Software Engineer in the Program Protection Organization\....on mission requirements * Embedded Systems knowledge to conduct research to evaluate potential vulnerabilities and develop… more
- Bank of America (Washington, DC)
- …experience in both offensive and defensive security roles to help uplift cyber security initiatives throughout the bank. This role will be expected to actively ... Cyber Threat Purple Team Chicago, Illinois;Washington, District of...and complex environment. As well as support in vulnerability research and assist in high impact incident response engagements.… more
- Percival Engineering (Columbia, MD)
- …System Engineering and Vulnerability research with a focus on OCO ( Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities ... breaking the systems down into components, analyzing components/systems for cyber vulnerabilities , and developing mitigations or countermeasures Required… more
- CACI International (Chantilly, VA)
- …* **What You'll Get to Do:** **Want to stretch your skills and knowledge in the Offensive Cyber domain? As a Computer Network Operator, YOU will get to work with ... analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support… more
- SMX (Patuxent River, MD)
- …research into mitigation solutions and strategies to cyber security issues + Research cyber vulnerabilities and threats + Research architecture ... network, software issues + Conduct research into cyber events, threats, adversarial offensive and defensive tools, techniques, and methods + Conduct … more
- Amentum (Honolulu County, HI)
- …Project Management, or a related field. + Demonstrated experience with cyber risks, exploits, vulnerabilities and associated mitigations. + Demonstrated ... experience managing classified projects from initiation to closure. + Experience supporting offensive and defensive cyber efforts in the Indo-Pacific theater.… more
- CVS Health (Boston, MA)
- …exploitation, and abuse, ensuring early identification and elimination of complex vulnerabilities . **Adversary Simulation & Offensive Strategy** + Drive the ... approaches, leveraging AI, machine learning, and automation to enhance both offensive and defensive capabilities. + Proven ability to foster collaboration across… more