- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be contributing to the… more
- Draper (Boston, MA)
- …organizational needs, our technical efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals...exploit development on a wide range of devices and systems . Job Description: + Assess hardware and software for… more
- MIT Lincoln Laboratory (Lexington, MA)
- …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems...essential to the success of their missions. Position Description Cyber System Exploitation Intern When you join… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber Physical Systems Group tackles key problems in the convergence of cybersecurity and the physical world in an interdisciplinary research and ... an experienced Full Spectrum Cyber Capability and Operations Expert to join our Cyber Physical Systems group within the Cyber Security and Information… more
- BAE Systems (Merrimack, NH)
- …create game-changing capabilities. The BAE Systems FAST Labs RF, Electronics, Cyber Converged Solutions (CS) and RF Exploitation and Architectures (REXAS) ... Exemplified by our mission: We Protect Those Who Protect Us , BAE Systems Fast Labs innovates next generation capabilities for the warfighter. Through research… more
- MIT Lincoln Laboratory (Lexington, MA)
- … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... our operational partners in the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems can be corrected,… more
- BAE Systems (Merrimack, NH)
- …Processing + Electronic Warfare, Electronic Attack, and Electronic Support Measures + Cyber vulnerability research and reverse engineering + Experience leading ... **Job Description** FAST Labs is a world-class research organization. Our vision, We secure the future...Labs defines the next generation of technology across BAE Systems Electronic Systems (ES) sector. Internal to… more
- RTX Corporation (Cambridge, MA)
- …protection, and exploitation . This is a position for candidates with research and development (R&D) program management experience. In this role, you will provide ... RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It… more
- MIT Lincoln Laboratory (Lexington, MA)
- …and sabotage; and safeguards personnel, classified and unclassified information systems , personal identifiable information, property, and other assets from ... exploitation and recruitment by foreign intelligence agencies. We foster...solve complex security problems in close collaboration with Laboratory research teams and Government counterparts. Our people are our… more
- Bank of America (Boston, MA)
- …the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides services to ... and leading ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging… more