• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be contributing to the… more
    MIT Lincoln Laboratory (12/17/25)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
    MIT Lincoln Laboratory (12/17/25)
    - Save Job - Related Jobs - Block Source
  • ACTI Cyber Threat Exploitation

    Amazon (Arlington, VA)
    …technical work on exploits, vulnerability research , and threat intelligence, the Cyber Threat Exploitation Engineer will steer strategic direction in the ... Engineer to join the Amazon Cyber Threat Intelligence (ACTI) team as a Cyber Threat Exploitation Engineer where you will leverage your in-depth knowledge and… more
    Amazon (12/31/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    Amentum (Norfolk, VA)
    …or exploitation analysis + Proficiency in decomposing complex computer systems /networking configurations in support of system exploitation analysis + ... test requirements for each system under test and research and coordinate with other DoD organizations, academia, private...+ HQ Tasks: + Serve as a OPTEVFOR 01D Exploitation Analyst supporting cyber survivability policy and… more
    Amentum (11/12/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst - Top Secret Clearance…

    Cambridge International Systems Inc (Norfolk, VA)
    …Expertise: + Demonstrated ability to reverse engineer, exploit, or emulate real-world cyber threats across networked and embedded systems . + Familiarity with ... Exploitation Analyst - Top Secret Clearance | Norfolk, VA Cambridge International Systems , Inc. Join a dynamic global team united by shared values: commitment,… more
    Cambridge International Systems Inc (12/04/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst 1-4…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
    Amentum (10/24/25)
    - Save Job - Related Jobs - Block Source
  • Junior Vulnerability Researcher

    Battelle Memorial Institute (Columbus, OH)
    …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
    Battelle Memorial Institute (01/01/26)
    - Save Job - Related Jobs - Block Source
  • Senior Vulnerability Researcher

    Battelle Memorial Institute (Columbus, OH)
    …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
    Battelle Memorial Institute (11/14/25)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Researcher - Assessments…

    JPMorgan Chase (Wilmington, DE)
    …dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In this role, you ... As an Vulnerability Researcher - Assessments & Exercises at JPMorgan Chase...simulations - such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the… more
    JPMorgan Chase (10/16/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    ManTech (Annapolis Junction, MD)
    …as Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, Information Systems , Networking and ... **MANTECH** seeks a motivated, career and customer-oriented **Digital Network Exploitation ** Analyst to join our team in **Annapolis Junction, MD.** This role offers… more
    ManTech (12/20/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst - Mid…

    National Security Agency/Central Security Service (Fort Meade, MD)
    …and networking in order to design and develop advanced tools, techniques, and systems . Digital Network Exploitation Analysts employ computer science skills to ... Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply… more
    National Security Agency/Central Security Service (01/01/26)
    - Save Job - Related Jobs - Block Source
  • Senior Vulnerability Researcher & Reverse…

    Parsons Corporation (West Melbourne, FL)
    …/Reverse Engineer** to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero ... Days). **What You'll Be Doing:** + Reverse engineering systems and software executables using tools like Ghidra, Binary Ninja, or IDA Pro + Identifying potential… more
    Parsons Corporation (12/05/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    CACI International (Chantilly, VA)
    …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
    CACI International (10/29/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst (EA)

    AeroVironment (Jessup, MD)
    **Worker Type** Regular **Job Description** **Summary** The ** Exploitation Analyst (EA)** will work closely with other technical experts and play a crucial role in ... problems. **Position Responsibilities:** + Conduct in-depth target analysis and research . + Apply knowledge of computer security principles, vulnerability analysis,… more
    AeroVironment (12/17/25)
    - Save Job - Related Jobs - Block Source
  • CI Poly Digital Network Exploitation

    Insight Global (Fort Meade, MD)
    Job Description Insight Global is seeking a highly skilled Digital Network Exploitation Analyst in Fort Meade to support critical missions by identifying, analyzing, ... role involves advanced reconnaissance, network mapping, vulnerability assessment, and exploitation planning to strengthen operational capabilities. Key Responsibilities: Conduct… more
    Insight Global (12/18/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    ManTech (Annapolis Junction, MD)
    …Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, Information Technology, Information Systems , ... **MANTECH seeks a motivated and mission-driven Digital Network Exploitation Analyst to join our team in Annapolis...Assess the risk and impact of identified vulnerabilities. + Research and analyze exploit techniques for known vulnerabilities. +… more
    ManTech (12/20/25)
    - Save Job - Related Jobs - Block Source
  • Senior Embedded Vulnerability Researcher

    Draper (Boston, MA)
    …organizational needs, our technical efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals...exploit development on a wide range of devices and systems . Job Description: + Assess hardware and software for… more
    Draper (10/11/25)
    - Save Job - Related Jobs - Block Source
  • Group 05-51 | SRP Intern | Cyber -Physical…

    MIT Lincoln Laboratory (Lexington, MA)
    …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
    MIT Lincoln Laboratory (12/16/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Software Engineer Sr (Embedded)

    Lockheed Martin (Grand Prairie, TX)
    …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
    Lockheed Martin (12/10/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Intel Analyst

    Leidos (Ashburn, VA)
    …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (11/13/25)
    - Save Job - Related Jobs - Block Source