- Merck & Co. (Rahway, NJ)
- …testing in CI/CD pipelines. They ensure the security of the software development lifecycle, conduct proof-of-concepts for new technologies, and collaborate with ... API scanning, etc in pipelines.Responsible for the security of the software development lifecycle using CI/CD.Identify, evaluate, and conduct proof-of-concepts for… more
- McDonald's (Chicago, IL)
- …on VM Platform health status and operational trends to management. Research , validate and prioritize vulnerabilities. Perform in-context vulnerability risk ... Manager (CISM), or Offensive Security Certified Professional (OSCP) (preferred) Tools & Software Used Vulnerability scanning tools (eg, Nessus, Qualys, Wiz,… more
- Zetier (San Antonio, TX)
- Principal Vulnerability Researcher Zetier is seeking Principal Vulnerability Researchers to analyze and counter malicious software and develop ... operationally critical cyber capabilities. Candidates will demonstrate practical experience designing, developing, and deploying tools intersecting command and control, persistence, and networking. Required: Highly experienced with reverse engineering compiled… more
- S&P Global, Inc. (New York, NY)
- …development with strong skills in J2EE, JMS, EJB. Proven experience leading software development teams or technical projects. Proficient in advanced SQL and PL/SQL. ... Experience with Unix scripting, vulnerability remediation, and application performance tuning. Strong communication and...the largest global resource for index-based concepts, data and research , and home to iconic financial market indicators, such… more
- Quorum Business Solutions, Inc. (Houston, TX)
- …international and dynamic environment? Then now is the time to join Quorum Software , a rapidly growing company and industry leader in oil & gas transformation. ... Quorum Software is the world's largest provider of digital technology...policies or guidelines of the Quorum's sponsor Oversee the vulnerability scan & pen test process based upon a… more
- INSPYR Solutions (Silver Spring, MD)
- …business leaders. Configure, troubleshoot, and maintain security infrastructure - including software and hardware in cloud environments, as well as on-premises. ... and best practices while meeting security best practices and business goals Research and explore emerging security technologies and determine their appropriate use… more
- Tenable, Inc. (Columbia, MD)
- …dynamic product marketing professional to help extend the company's leadership in vulnerability assessment. Nessus is the most widely deployed vulnerability ... channel-centric business models Identify and deliver thought leadership leveraging Tenable Research insights to drive brand awareness and demand generation Create… more
- CACI International, Inc. (Reston, VA)
- …Telecommunications VNFs; Cloud Computing Service Models for Compute and Storage; Vulnerability Research tools, techniques and processes; Network Security ... solutions and serve as a thought leader in applying advanced research and emerging technologies to mission-critical challenges. This candidate will lead… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Huntington Ingalls Industries (Fort George G Meade, MD)
- …threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive ... single day-matters. Essential Job Responsibilities Assists with analysis and research for industry, infrastructure, technology, country, geographic area, biographic… more
- SAIC (El Segundo, CA)
- …training exercises, and strategic engagement policy to include analysis and research for industry, infrastructure, technology, and targeted vulnerability . ... and expansion efforts of the Space C2 program with an emphasis on Agile software best practices. We know you have in-depth experience with DoD program acquisition… more
- Nightwing (Annapolis, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Palo Alto Networks (Baltimore, MD)
- …Your Impact Assist in the development of internal infrastructure design for research , development, and testing focused on offensive security Conducts periodic scans ... a team of consultants Demonstrate a deep understanding of how malicious software works (ie-malware, trojans, rootkits, etc.) Ability to modify known and/or craft… more
- Northrop Grumman (San Antonio, TX)
- …with products that may involve kernel development, reverse engineering or vulnerability research of network and communication systems. **Essential Functions:** ... Grumman Mission Systems is seeking a ** Software Engineer or Principal Software Engineer: Vuln** **erability Research - Reverse Engineering** to join our… more
- Marriott (Bethesda, MD)
- …team to understand findings, their relevance and potential impact. + Conduct basic vulnerability research under the guidance of the Senior Manager. + File ... understanding of OWASP Top 10 and its implications to software security + Basic understanding of common software...with internal policies and external regulations. + Review Security Researcher findings through the company Bug Bounty program and… more
- Amazon (Austin, TX)
- … Vulnerability Management) organization. Our organization is accountable for the end-to-end software vulnerability lifecycle across all aspects of AWS. We are ... can be located in Seattle, WA Key job responsibilities Research and interpret vulnerability disclosures and intelligence...the team Our organization is accountable for the end-to-end software vulnerability lifecycle across all AWS. Diverse… more
- Palo Alto Networks (Santa Clara, CA)
- …or Software vulnerabilities + Knowledge of cybersecurity frameworks and vulnerability methodologies + Proficiency in Linux and Windows operating systems + ... we all win with precision. **Your Career** The Cortex Vulnerability Experience Platform team is expanding, and we're looking...expanding, and we're looking for a Full Stack Sr. Software Engineer to join our team. This team is… more
- RTX Corporation (Columbia, MD)
- …+ Experience with some assembly language (x86/64, ARM, PPC, MIPS, etc.). + Vulnerability research experience + Reverse engineering skills using a tool such ... implants, payloads, and communication stacks based on extensive reverse engineering, vulnerability analysis, and software development + Develop unique networking… more
- Sandia National Laboratories (Livermore, CA)
- …+ Experience in one or more of the following: reverse engineering, software vulnerability assessment, web application assessment, computer networking, computer ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...JavaScript, JQuery, or Spring MVC. + Knowledge of secure software engineering practices, including vulnerability assessment and… more
- Parsons Corporation (Fort Belvoir, VA)
- …and BOFs + Work in a Scrm/Agile Environment + Malware development, analysis and software vulnerability research **What Required Skills You'll Bring:** + ... development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research , or software… more