- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- ARSIEM (Annapolis Junction, MD)
- …have an impact on every client you work with. ARSIEM is currently looking for a Mobile Vulnerability Researcher . The positions will support one of our ... in Annapolis Junction, MD . Responsibilities + Work on a team performing vulnerability research against mobile technologies. + Be familiar with the latest… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Chenega Corporation (Washington, DC)
- …API Top Ten (or alternate criteria as specified) + Perform network mapping, vulnerability scanning, and support phishing simulations as well as report findings and ... certification + Background check **Knowledge, Skills, and Abilities:** + Experience assessing mobile devices (IOS, Android, Windows) such as iPhone, iPad, and other … more
- Navient (Washington, DC)
- …capable of rapidly conceptualizing, developing, and deploying new web and mobile applications from ideation to implementation. You'll thrive in an environment ... are completed successfully and on time. + Lead the mobile initiatives from architecture to implementation + Act as...trust. + Innovation and Thought Leadership: Your contributions to research , innovation, and thought leadership will position us as… more
- Parsons Corporation (Annapolis Junction, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
- Lentech, Inc (Fort Meade, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...hashing Forensic analysis of Windows systems, Linux systems or mobile devices Commercial / GOTS tools for Intrusion detection… more
- Koniag Government Services (Washington, DC)
- …on quick wins as part of a longer-term enterprise roadmap. + Support Mobile Application MFA Proof of Concept (PoC) solutions. + Develop enhanced Multi-Factor ... + Review current system security measures, conduct system security and vulnerability analyses and risk assessments; recommend and support the implementation of… more
- Export-Import Bank of the United States (Washington, DC)
- …and maintaining Hardware and Software for desktops, servers, storage, network (LAN/WAN), Mobile Device, Cloud (IaaS, SaaS, PaaS) etc., by ensuring the availability ... and in the continuity of operations situations. The incumbent also performs market/industry research to identify IT solutions for the agency and any other duties as… more
- Jacobs (Columbia, MD)
- …include the following: + Site Surveys and Interface Technologies + Vulnerability Assessments, Penetration Testing, and Continuous Monitoring + Risk Management ... including analyses of the adequacy of implemented security features and research and analysis of security technology. + Extensive experience in conducting… more
- Nightwing (Annapolis Junction, MD)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... a broad range of technologies (eg, Linux, Windows, Virtualization\Hypervisors, Mobile , and Embedded\IoT systems). Additionally, you will influence the requirements… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Nightwing (Annapolis Junction, MD)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... a broad range of technologies (eg, Linux, Windows, Virtualization\Hypervisors, Mobile , and Embedded\IoT systems). Additionally, you will influence the requirements… more
- Jacobs (Fort Meade, MD)
- …support for incident response activities, intrusion events, and malware analysis * Research , design, deploy, and lead training events. * Evaluate emerging forensic ... Intelligence Briefings; CI or HUMINT Policy Analysis; Threat and Vulnerability Assessments; and Analytical Information Reports. \#divergent #902 \#divergent **Here's… more