- Metasys Technologies, Inc. (Dallas, TX)
- …testing, cyber risk & strategic analysis, cyber research , cyber awareness & training, cyber vulnerability detection & assessment, cyber ... policies and procedures to minimize network intrusion, malware events, and vulnerability issues for internal and external customers. Interact with internal and… more
- DCS Corp (Ridgecrest, CA)
- …including Interface Control Documents (ICDs), Specifications, and System Architectures Research known vulnerability database sources (CVEs and CWEs) ... Team (IPT). CSSE is the combination of traditional systems engineering with cyber engineering. Knowledge of hardware and software design are incorporated in the… more
- Dunhill Professional Search (San Antonio, TX)
- …Telework*Must be local to San Antonio, TX area*U.S. Citizenship RequiredJob Role:Creates cyber -intelligence tools / methods and performs research and analysis in ... able to balance multiple tasks simultaneously.Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion… more
- Dunhill Professional Search (San Antonio, TX)
- …Telework*Must be local to San Antonio, TX area*U.S. CitizenshipJob Role:Creates cyber -intelligence tools / methods and performs research and analysis ... able to balance multiple tasks simultaneously.Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion… more
- Bering Straits Native Corporation (Beavercreek, OH)
- …Assessment and Authorization documentation (eg, IA SOP, SSP, MSSP, RAR, SCTM). Research , configure, analyze and/or use software applications for security ... vulnerability monitoring, security automation and alerting.Identify policy conflicts and...perform the essential functions. 3-5+ years' experience in government cyber security, preferably with RMF and focused on "systems"… more
- Computer World Services (CWS)Corporation (Adelphi, MD)
- …Seeking a highly motivated Classified Cybersecurity Senior to support the Army Research Lab (ARL) classified environment and systems. Key Tasks and Responsibilities ... processing, tagging, updating for all sites Review any reported ARL Vulnerability Disclosure Program (VDP)s, monitor until completion, and update VDP data… more
- RIVET OPERATIONS COMPANY LLC (Dededo, GU)
- …area. Rivet Operations Company ("Rivet") is a leader in physical and cyber security, scientific research , development, and facilities management. Essential ... risks on systems and networksContractor must have experience with utilizing vulnerability tools to conduct automated scans such as Assured Compliance Assessment… more
- SAIC (Chantilly, VA)
- **Description** SAIC is seeking ** Cyber Threat & Vulnerability Hunter** to join its Blue Team Vulnerability Assessment Program in **Chantilly, Virginia.** ... Operate and support maintenance of technical hunt software and hardware + Research , evaluate and recommend new cybersecurity technologies and techniques to enhance… more
- Leidos (Columbia, MD)
- …environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, development, integration, and test tasks to ... services and mission software capabilities in the areas of cyber , logistics, security operations, and decision analytics to support...through all stages of the product lifecycle - from vulnerability research to development and test. This… more
- Leidos (Columbia, MD)
- …environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, development, integration, and test tasks to ... services and mission software capabilities in the areas of cyber , logistics, security operations, and decision analytics to support...through all stages of the product lifecycle - from vulnerability research to development and test. This… more
- Leidos (Ashburn, VA)
- …to be considered. Must be US Citizen. **Primary Responsibilities** Information Security Vulnerability Management + Continuously research emerging threats to the ... US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS NOSC… more
- SAIC (Chantilly, VA)
- **Description** SAIC is seeking a Principal Cyber Security Cloud Analyst, to serve as a member of a Vulnerability Assessment program. This position is located in ... and techniques + Support the execution of periodic and on-demand Cloud-based vulnerability assessments where various cloud related system artifacts are analyze to… more
- Chenega Corporation (Washington, DC)
- …size, scope, and complexity as required by this Task Order. * Experience managing cyber vulnerability and threat information on an HQ level. * Position requires ... other cyber policy requirements impacting the Treasury Threat and Vulnerability Program. * Facilitate IT security/risk training curriculum. * Serve as project… more
- TestPros (Norfolk, VA)
- …include Program Management, Program Oversight, Process Audit, Intelligence Analysis, Cyber Security, NIST SP 800-171 Assessment and Compliance, Computer Forensics, ... Independent Verification and Validation (IV&V), Quality Assurance (QA), Compliance, and Research and Development (R&D) services. TestPros is an Equal Opportunity… more
- Lockheed Martin (Grand Prairie, TX)
- …as: embedded cyber resilient systems, software assurance, weapon system cyber vulnerability assessments, and other technologies\. * Demonstrated experience ... technology development in DoD lifecycles; ideally from early concept/ vulnerability identification, thru development/prototyping, and then the integration into...of advanced cyber research and development projects\. * Team… more
- Leidos (Columbia, MD)
- …environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, development, integration, and test tasks to ... teams that collaborate closely with customers? Are you intrigued by offensive cyber vulnerability analysis and reverse engineering (VR/RE)? How about offensive… more
- Lockheed Martin (Grand Prairie, TX)
- …such as: embedded cyber resilient systems, software assurance, weapon system cyber vulnerability assessments, and other technologies\. * A subject matter ... **Description:** Are you seeking a rewarding career as a leading Cyber Security Architect Principal Investigator who will research , develop, and deliver… more
- Spectrum Comm Inc (Edwards, CA)
- …and reporting. The Cyber Analyst plans for and coordinates cyber - vulnerability and penetration/exploitation testing to include test plans and testing ... The Cyber Security Analyst is the primary individual with...reports, and draft sections of the final report. + Research and analysis of available test options and determining… more
- Nightwing (Palm Bay, FL)
- …systems defense and managed services; cyber analytics and intelligence services; cyber network operations; vulnerability research ; and field deployment ... Details** Our team covers the full life cycle from emulation, reverse engineering, vulnerability research , and CNO/CNE tool development. Our mission covers a… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive… more