- MIT Lincoln Laboratory (Fort Meade, MD)
- …to the success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop ... cyber operations, from the reverse engineering and exploitation of software and hardware systems to...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
- Parsons Corporation (Fort George G Meade, MD)
- …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
- Parsons Corporation (Fort George G Meade, MD)
- …candidate will have extensive hands-on experience in reverse engineering, vulnerability research , exploit development, and offensive cyber operations. This role ... and mentorship to junior team members. Share knowledge and expertise on exploitation techniques, development practices, and offensive cyber strategies + Work… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- Leidos (Arlington, VA)
- …skilled and innovative individuals and a variety of exciting R&D programs. As a Senior Cyber Systems Engineer, your will be expected to "think like an adversary" ... will be leading a team of engineers to perform data analysis, investigative analysis, research on existing and emerging cyber threats, and develop tools to… more
- BAE Systems (Arlington, VA)
- …the opportunity to develop and mature advanced technology capabilities in the areas of cyber and Electronic Warfare (EW). BAE Systems FAST Labs RF, Electronics, ... and EW mission areas and ensure transition of research efforts into BAE Systems Business Area...etc) + Experience with low-level software architectures + Embedded system vulnerability discovery and exploitation experience +… more
- Nightwing (Arlington, VA)
- …intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Nightwing (Arlington, VA)
- …intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Nightwing (Arlington, VA)
- …services offerings. Nightwing CIS Business Unit provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission ... challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous...to reporting incidents. - Knowledge of the NCCIC National Cyber Incident Scoring System to be able… more
- Nightwing (Arlington, VA)
- …intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Nightwing (Arlington, VA)
- …intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission ... challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous...and handling methodologies - Knowledge of the NCCIC National Cyber Incident Scoring System to be able… more
- Noetic Strategies Inc. (Alexandria, VA)
- …for evaluating operational effectiveness, suitability, and survivability of military systems + Determine cyber threat resource requirements, availability, ... Job Title: Senior Cyber Analyst City: Alexandria State: Virginia Position Requirements...sources to solve complex problems + Excellent ability to research , analyze, document, and convey technical information + Familiarity… more
- Nightwing (Arlington, VA)
- …has been providing some of the world's most technically advanced full-spectrum cyber , data operations, systems integration and intelligence support services to ... as part of the Nightwing team. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support… more
- JPMorgan Chase (Washington, DC)
- …fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems , system and software vulnerabilities and exploitation techniques, and web ... shaping the future of cybersecurity. As an Assessments & Exercises Director in the Cyber and Tech Controls line of business, you will lead key efforts to enhance… more
- Nightwing (Arlington, VA)
- …intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Meta (Washington, DC)
- …from a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking a security analyst - threat ... our understanding and mitigation of child sexual abuse and exploitation on our family of apps. In addition to...an eye towards advancing investigative methods, and using innovative research approaches to prevent harm to children on our… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Level of Experience: Mid Job Description Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber , EW and ... changing, multi-domain global security threats, and anticipate emerging threats. Our cyber professionals are on the cutting edge of cyberspace operations, delivering… more
- JPMorgan Chase (Washington, DC)
- …fundamentals (all OSI layers, protocols), Windows/Linux/Unix/Mac operating systems , system and software vulnerabilities and exploitation techniques, and web ... Team members who conduct advanced adversary emulation operations to replicate relevant cyber security threats targeting the firm. Your track record in leading… more
- Zurich NA (Washington, DC)
- …that emulate the tools, tactics, and procedures (TTPs) of threat actors. Lead research with the goal of developing new TTPs improving attack efficacy and assist ... on target access and operational issues. + Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. +… more