- Merck & Co. (Rahway, NJ)
- …testing in CI/CD pipelines. They ensure the security of the software development lifecycle, conduct proof-of-concepts for new technologies, and collaborate with ... API scanning, etc in pipelines.Responsible for the security of the software development lifecycle using CI/CD.Identify, evaluate, and conduct proof-of-concepts for… more
- STR (Arlington, VA)
- …any of the following cyber domains: cyber-related algorithm design, cyber-related software engineering, reverse engineering, vulnerability research , exploit ... search and optimization, autonomy and planning, machine learning, networking, or agent-based software design would be viewed favorably. What you will do: Technical… more
- Lam Research Corporation (Tualatin, OR)
- …systems to achieve their business objectives. The Impact You'll Make Lam Research is seeking an experienced IT Asset Management and Configuration Management Database ... detailed troubleshooting. You will be setting strategies for Hardware and Software Asset Management and addressing specific issues impacting individual Configuration… more
- Tenable, Inc. (Columbia, MD)
- …dynamic product marketing professional to help extend the company's leadership in vulnerability assessment. Nessus is the most widely deployed vulnerability ... channel-centric business models Identify and deliver thought leadership leveraging Tenable Research insights to drive brand awareness and demand generation Create… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Sony Pictures (Culver City, CA)
- …and application implementations. Security Solution Evaluation and Selection: Research , evaluate, and recommend cutting-edge security technologies and tools. ... Oversee proof-of-concept initiatives and guide vendor selection. Conduct market research to assess the landscape of available security solutions in specific areas… more
- Nightwing (Annapolis, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Northrop Grumman (San Antonio, TX)
- …with products that may involve kernel development, reverse engineering or vulnerability research of network and communication systems. **Essential Functions:** ... Grumman Mission Systems is seeking a ** Software Engineer or Principal Software Engineer: Vuln** **erability Research - Reverse Engineering** to join our… more
- Marriott (Bethesda, MD)
- …team to understand findings, their relevance and potential impact. + Conduct basic vulnerability research under the guidance of the Senior Manager. + File ... understanding of OWASP Top 10 and its implications to software security + Basic understanding of common software...with internal policies and external regulations. + Review Security Researcher findings through the company Bug Bounty program and… more
- Amazon (Austin, TX)
- … Vulnerability Management) organization. Our organization is accountable for the end-to-end software vulnerability lifecycle across all aspects of AWS. We are ... can be located in Seattle, WA Key job responsibilities Research and interpret vulnerability disclosures and intelligence...the team Our organization is accountable for the end-to-end software vulnerability lifecycle across all AWS. Diverse… more
- Palo Alto Networks (Santa Clara, CA)
- …or Software vulnerabilities + Knowledge of cybersecurity frameworks and vulnerability methodologies + Proficiency in Linux and Windows operating systems + ... we all win with precision. **Your Career** The Cortex Vulnerability Experience Platform team is expanding, and we're looking...expanding, and we're looking for a Full Stack Sr. Software Engineer to join our team. This team is… more
- TEKsystems (Indianapolis, IN)
- …SLA performance, discuss challenges, and identify areas for improvement. * Manage vulnerability scanning software . * Analyze scan results, identify false ... Description The Vulnerability and Patch Management Analyst will play a...to closure, ensuring all remediation activities are documented. * Research and understand new vulnerabilities, exploits, and attack vectors,… more
- RTX Corporation (Columbia, MD)
- …+ Experience with some assembly language (x86/64, ARM, PPC, MIPS, etc.). + Vulnerability research experience + Reverse engineering skills using a tool such ... implants, payloads, and communication stacks based on extensive reverse engineering, vulnerability analysis, and software development + Develop unique networking… more
- Sandia National Laboratories (Livermore, CA)
- …+ Experience in one or more of the following: reverse engineering, software vulnerability assessment, web application assessment, computer networking, computer ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...JavaScript, JQuery, or Spring MVC. + Knowledge of secure software engineering practices, including vulnerability assessment and… more
- Parsons Corporation (Fort Belvoir, VA)
- …and BOFs + Work in a Scrm/Agile Environment + Malware development, analysis and software vulnerability research **What Required Skills You'll Bring:** + ... development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research , or software… more
- Parsons Corporation (Fort Belvoir, VA)
- …bypassing mitigations + Conduct dynamic analysis + Malware development, analysis and software vulnerability research **What Required Skills You'll Bring:** ... development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research , or software… more
- General Dynamics Information Technology (Fort Belvoir, VA)
- …development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research , or software ... Obtain:** Top Secret/SCI **Public Trust/Other Required:** None **Job Family:** Software Development **Skills:** National Security,Red Teaming, Software Systems… more
- M&T Bank (Buffalo, NY)
- …analyze, and resolve software and security patch issues. * Manage software vulnerability assessments and remediation processes. Collaboration & Support: * ... a highly organized and detail-oriented Infrastructure Analyst II to join the Software Management Team within our End User Computing division. This role focuses… more