• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Grp 59 - Cyber System Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... our operational partners in the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems can be corrected,… more
    MIT Lincoln Laboratory (05/08/24)
    - Save Job - Related Jobs - Block Source
  • Grp 59 - Cyber System Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems...essential to the success of their missions. As a Cyber System Exploitation Co-Op, you will work… more
    MIT Lincoln Laboratory (05/08/24)
    - Save Job - Related Jobs - Block Source
  • FAST Labs Technology Development Director - RF…

    BAE Systems (Burlington, MA)
    …will drive disruptive RF Exploitation Solutions technologies and capabilities from research and development efforts into BAE Systems Business Areas products ... aerospace and defense industry s most difficult problems. Through research and development (R&D) programs funded by science and...the areas of RF electronic warfare, advanced electronics and cyber . BAE Systems FAST Labs - RF,… more
    BAE Systems (03/03/24)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Cyber -Physical Systems Engineer

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber -Physical Systems Group tackles challenges at the convergence of cybersecurity and the physical world. We operate in an interdisciplinary research ... and development environment and our focus is on developing new cyber -physical capabilities for the DoD, intelligence community, and federal agencies. Our key… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Lead Cyber Operations Infrastructure…

    The MITRE Corporation (Bedford, MA)
    …Summary: Do you have a Cyber Warfare Operations background or Cyber / Digital Network Exploitation Analyst and an interest in Operational Technology ... coupled with significant experience in critical infrastructure environments. + Offensive Cyber Operations: Conduct research and development of innovative … more
    The MITRE Corporation (05/20/24)
    - Save Job - Related Jobs - Block Source
  • Cyber -SIGINT Engineer

    MIT Lincoln Laboratory (Lexington, MA)
    …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... of these physical interfaces and develop prototypes that intersect both domains. The Cyber Physical Systems Group tackles key problems in the convergence of… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Manager

    MIT Lincoln Laboratory (Lexington, MA)
    …and sabotage; and safeguards personnel, classified and unclassified information systems , personal identifiable information, property, and other assets from ... exploitation and recruitment by foreign intelligence agencies. We foster...solve complex security problems in close collaboration with Laboratory research teams and Government counterparts. Our people are our… more
    MIT Lincoln Laboratory (05/23/24)
    - Save Job - Related Jobs - Block Source
  • Threat Intelligence & Offensive Security Analyst

    MassMutual (Springfield, MA)
    …consist of multiple functions which are strategically aligned to manage the cyber threats that the company faces. The threat intelligence function analyzes the ... **Responsibilities** + Analyze Threat Trends in order to recognize and research various threat actor groups, attack patterns, tactics, techniques and procedures… more
    MassMutual (05/10/24)
    - Save Job - Related Jobs - Block Source
  • Security Engineer, Investigations - i3

    Meta (Boston, MA)
    …Subject matter expertise with either criminal organizations, child safety, human exploitation , or fraud/scams. 16. Familiarity with sophisticated cyber threats. ... a multitude of threats including: criminal organizations, human trafficking and exploitation , and scams/fraud. We are seeking security engineers to investigate… more
    Meta (05/13/24)
    - Save Job - Related Jobs - Block Source