- Draper (Boston, MA)
- …efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a ... is required. Additional Job Description: Program Analysis, Reverse Engineering, and Vulnerability Research : + Proficiency with modern program analysis… more
- Draper (Boston, MA)
- …efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a ... systems, compiler theory, threat intelligence, fuzzing, binary analysis, and vulnerability research . Job Description: Duties/Responsibilities * Assess hardware… more
- Draper (Boston, MA)
- …efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and exploit development on a ... wide range of devices and systems. Job Description: + Assess hardware and software for security vulnerabilities using a breadth of technologies and techniques. + Develop software that meets behavior and security requirements for tailored applications. +… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... + Anti-debugging/Anti-instrumentation Techniques + Network and Host Security Products + Vulnerability Assessment Summer Research Program Overview The Summer … more
- Oracle (Boston, MA)
- …a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration. The biggest ... consult on secure development life-cycle practices + Communicate and educate Senior Management on key Security topics and directions + Perform… more