- Battelle Memorial Institute (Columbus, OH)
- …all qualified individuals to apply. **Job Summary** Battelle is currently seeking an aspiring ** Mid - level Vulnerability Researcher ** to work in our ... questions, this is the job for you! As a mid - level Vulnerability Researcher ,...using debugging tools + Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja) +… more
- Battelle Memorial Institute (Columbus, OH)
- …you? If you answered yes to these questions, this is the job for you! As a ** Mid - level Vulnerability Researcher ** , you will work with disassemblers and ... apply. **Job Summary** Battelle is currently seeking an aspiring ** Mid - level ** ** Vulnerability Researcher **...using debugging tools + Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja) +… more
- Google (New York, NY)
- …at Google (https://careers.google.com/benefits/) . **Responsibilities** + Conduct analysis to assess vulnerability impact and risk through industry research , and ... Security Consultant, Application and Vulnerability Management, Public Sector _corporate_fare_ Google _place_ New York, NY, USA ** Mid ** Experience driving… more
- GliaCell Technologies (Annapolis Junction, MD)
- …security clearance is REQUIRED. Please do not apply if you currently do not possess this level of clearance. Are you a Mid - Level Reverse Engineer who is ... to work with some amazingly talented people Job Description: GliaCell is seeking a Mid - Level Reverse Engineer on one of our subcontracts. This is a full-time… more
- GliaCell Technologies (MD)
- …security clearance is REQUIRED. Please do not apply if you currently do not possess this level of clearance. Are you a Mid - Level Cyber Software Engineer who ... to work with some amazingly talented people Job Description: GliaCell is seeking a Mid - Level Cyber Software Engineer on one of our subcontracts. This is a… more
- SOS International LLC (Reston, VA)
- **Overview** SOSi is seeking a Mid - level Nuclear Engineer (Scientific Support) to be part of a unique, multi-discipline team assisting partners to fuse ... + Support defense analytic requirements with enhanced scientific and engineering research and reverse engineering analysis. + Conduct facility and vulnerability… more
- General Dynamics Information Technology (Hanover, MD)
- …needed. With your proficiency in grasping and applying new information quickly, the Mid - Level Capabilities Development Engineer will be proficient in C/C++, and ... **Req ID:** RQ207031 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret...time operating systems. you'll be involved in Protocol Analysis, Vulnerability Assessment, Security Research , Rapid Prototyping of… more
- Huntington Ingalls Industries (Concord, MA)
- …Time/Salaried/Exempt Anticipated Salary Range: $73,553.00 - $110,000.00 Security Clearance: Secret Level of Experience: Mid This opportunity resides with Warfare ... access controls. + Utilize encryption technologies, conduct penetration and vulnerability tests, and explore various security research ...+ Experience & Education: + For a Bachelor's Degree Level : A minimum of 2 years of relevant experience.… more
- The Boeing Company (Seattle, WA)
- …requirements. + Conduct product security risk assessments, attack surface analyses, and vulnerability evaluations for embedded and IT systems. + Assist in security ... and security technologies to continuously improve security posture. + Support research and development activities that result in innovative solutions to enhance… more
- BOOZ, ALLEN & HAMILTON, INC. (Charleston, SC)
- Low-Code Systems Administrator, Mid The Opportunity: Your combination of people skills and system administrator knowledge makes you the team hero, solving one ... Join us. The world can't wait. You Have: + 3+ years of experience with research , design, and development of computer and network sof tware + Knowledge of RHEL… more
- Vexterra Group (Bethesda, MD)
- …Using knowledge gained through the application of reverse- engineering and other research techniques, engineer low- level C and assembly. Position Requirements: + ... digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify… more
- Google (MD)
- …an understanding of offensive security tradecraft, and for reverse engineering and vulnerability research . You will help in creating sophisticated tools to ... VA, USA; Maryland, USA; +2 more; +1 more _laptop_windows_ Remote eligible ** Mid ** Experience driving progress, solving problems, and mentoring more junior team… more
- Google (Seattle, WA)
- …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... Core _corporate_fare_ Google _place_ Kirkland, WA, USA; Seattle, WA, USA ** Mid ** Experience driving progress, solving problems, and mentoring more junior team… more
- Google (Seattle, WA)
- …experience in a technical leadership role. + Experience in security assessments, vulnerability management, security research , or vulnerability investigation, ... Core _corporate_fare_ Google _place_ Kirkland, WA, USA; Seattle, WA, USA ** Mid ** Experience driving progress, solving problems, and mentoring more junior team… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Response (SIR): enrichment, correlation rules, and automated playbooks. + Vulnerability Response (VR): scanner integrations, remediation workflows, patch group… more
- MUFG (Jersey City, NJ)
- …skills needed to be proficient + Scope and perform penetration testing and vulnerability research of complex proprietary software and hardware for client ... are mitigated and/or remediated within the firm's risk tolerance and service level agreements + Continually research new exploitation/attack techniques against… more
- Leidos (Reston, VA)
- …candidate shall perform the following as part of a larger team:** * Vulnerability research and analysis, reversing engineering threats to determine methods of ... software through application security architecture software evaluations, web application vulnerability assessment penetration testing and fuzzing, malware research… more
- City of New York (New York, NY)
- …matters, including conducting or directing all aspects of water supply related research . - Participating in high level training and knowledge transfer ... the Town of Mount Pleasant, Westchester County, NY approximately 28 miles from mid -town Manhattan. CITY RESEARCH SCIENTIST - 21744 Qualifications 1. For… more
- Teledyne (Huntsville, AL)
- …the excitement of being on a team that wins. **Job Description** **Job Summary** The Mid - Level to Senior Level Information System Security Officer ( Mid ... water quality environmental monitoring, electronics design and development, oceanographic research , deepwater oil and gas exploration and production, medical imaging… more
- Leonardo DRS, Inc. (San Diego, CA)
- …control. As a laser technology pioneer, Daylight Solutions has delivered more mid -IR systems to more applications world-wide than any other company. Daylight laser ... full spectrum from UV to visible to NIR to mid -IR._ _At DRS Daylight Solutions, you will be eligible...and provide statistics and reports on network performance and vulnerability management + Respond to emergency network outages in… more