- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Percival Engineering (Dulles, VA)
- …is also required Responsibilities Include: + Developing custom applications and/or performing vulnerability research on mobile platforms to include Android ... our team does it all. If you are a Mobile CNO Software Developer with a passion for innovation...skills include experience in static and dynamic reverse engineering, vulnerability research , binary analysis of executables, exposure… more
- Northrop Grumman (Cincinnati, OH)
- …to live in Cincinnati . **Northrop Grumman Mission Systems** (NGMS) is seeking Vulnerability Research Engineers to join our team of qualified, diverse ... of a degree. + Experience with a disassembler for vulnerability research (IDA Pro, Ghidra, BinaryNinja, radare2,...engineering hardware and software such as embedded systems (IoT), mobile devices/phones. + Development of software to run in… more
- Leidos (Ashburn, VA)
- …(ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current ... networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC… more
- Plante Moran (IN)
- Vulnerability Management Analyst - India - Mumbai + Location: India, Maharashtra, Mumbai Make your mark. Our Technology Services team focuses on the firm's critical ... enable and manage growth, leverage resources, and mitigate costs and risks. The Vulnerability Management and SOC (Security Operations Center) Analyst role will be an… more
- Walmart (Bentonville, AR)
- …security issues. Someone with depth of experience in data platforms, cloud and mobile technologies, and experience in code deployment. This role will be filled with ... someone that likes a challenge, has the ability to research and apply solutions, with a passion for growing the business securely preserving confidentiality,… more
- Parsons Corporation (Chantilly, VA)
- …Network Operations arena. Our mission is to provide critical vulnerability research and exploitation development on Android mobile device platforms. Our team ... development and has an understanding of Android development. Relevant experience with vulnerability research and working with existing toolchains and weaponizing… more
- Weill Cornell Medical College (New York, NY)
- …response, intrusion detection/prevention, data loss prevention, encryption, and endpoint and mobile device security. + Assists in vulnerability management ... Physician Organization - are engaged in world-class clinical care and cutting-edge research that connect patients to the latest treatment innovations and prevention… more
- Ventura County (Ventura, CA)
- Web & Mobile Applications Architect/Supervisor Print (https://www.governmentjobs.com/careers/ventura/jobs/newprint/4445030) Apply Web & Mobile Applications ... improvement, applications support, voice/data infrastructure, data security, threat and vulnerability /risk management, and extended staffing. The Position Under general… more
- Leidos (Bluemont, VA)
- …(ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current ... networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The FEMA… more
- Trane Technologies (St. Paul, MN)
- …the activities will include threat modeling, attack modeling, security DFMEA, vulnerability assessment, triaging, and reporting. This Sr. Cyber Security Engineer ... including reviewing and explaining security tools and processes, providing vulnerability explanations and remediation guidance + Optimize product/system security by… more
- Walmart (Bentonville, AR)
- …cloud services, Internet of Things (IoT), identity and access management, mobile development, virtualization, AI and Robotics and custom hardware. They develop ... customers value, whether they shop online at Walmart.com, through one of our mobile apps, or in-store. Focus areas include customers, stores and employees, in-store… more
- CACI International (Florham Park, NJ)
- …Cyber Innovation: Use prior experience and knowledge of reverse engineering, vulnerability research , and software development skills, in-depth research ... Cybersecurity posture. **More About this Role:** + Provide technical leadership on vulnerability research tasks to identify and evaluate security strengths and… more
- State of Montana (Helena, MT)
- …software applications or hardware issues when problems occur by conducting research , working with vendors, working with the State Information Technology Services ... job functions including but not limited to: applications, software, computer systems, mobile devices, network tools and features, security tools and features, and… more
- Walmart (Bentonville, AR)
- …cloud services, Internet of Things (IoT), identity and access management, mobile development, virtualization, AI and Robotics and custom hardware. They develop ... vulnerabilities in IoT, embedded devices, cloud-based technologies and services, mobile solutions, APIs, hardware, firmware, source code and applications. Develop… more
- Medtronic (Mounds View, MN)
- …Bill of Material (SBOM) development and maintenance for the purposes of vulnerability monitoring. + Possess an understanding of scoring methodologies for security ... threats like the common vulnerability scoring (CVSS) and apply appropriately. + Assist with...Strong technical and troubleshooting skills. + Strong capability to research and evaluate emerging technologies + Preference is given… more
- Motion Recruitment Partners (Plano, TX)
- …Cloud Security, Security operations). + Experience in aligning threat and vulnerability management efforts to frameworks and control objectives - MITRE ATT&CK, ... **Responsibilities** + Conduct penetration tests across Web applications, APIs, Mobile applications, infrastructure, cloud environments, and devices. + Conduct red… more
- NCR VOYIX (Atlanta, GA)
- …and testing, monitoring and metrics, incident management, and threat and vulnerability management. The Information Security Engineer II shall be responsible for ... Engineer II shall work in a collaborative manner with vulnerability coordinators and remediation team to make sure the...a 24x7 basis. + Hands on experience in detailed research and analysis. + Triage, respond to and escalate… more