- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- ARSIEM (Annapolis Junction, MD)
- …have an impact on every client you work with. ARSIEM is currently looking for a Mobile Vulnerability Researcher . The positions will support one of our ... in Annapolis Junction, MD . Responsibilities + Work on a team performing vulnerability research against mobile technologies. + Be familiar with the latest… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Navient (Annapolis, MD)
- …capable of rapidly conceptualizing, developing, and deploying new web and mobile applications from ideation to implementation. You'll thrive in an environment ... are completed successfully and on time. + Lead the mobile initiatives from architecture to implementation + Act as...trust. + Innovation and Thought Leadership: Your contributions to research , innovation, and thought leadership will position us as… more
- Lentech, Inc (Fort Meade, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...hashing Forensic analysis of Windows systems, Linux systems or mobile devices Commercial / GOTS tools for Intrusion detection… more
- Parsons Corporation (Annapolis Junction, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
- Jacobs (Columbia, MD)
- …include the following: + Site Surveys and Interface Technologies + Vulnerability Assessments, Penetration Testing, and Continuous Monitoring + Risk Management ... including analyses of the adequacy of implemented security features and research and analysis of security technology. + Extensive experience in conducting… more
- Nightwing (Annapolis Junction, MD)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... a broad range of technologies (eg, Linux, Windows, Virtualization\Hypervisors, Mobile , and Embedded\IoT systems). Additionally, you will influence the requirements… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Nightwing (Annapolis Junction, MD)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... a broad range of technologies (eg, Linux, Windows, Virtualization\Hypervisors, Mobile , and Embedded\IoT systems). Additionally, you will influence the requirements… more