- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- SMBC (New York, NY)
- …SMBC offers a competitive portfolio of benefits to its employees. **Role Description** As a Cyber Security Analyst - Threat Researcher , you will be a key part of ... and Skills** **Required Qualifications:** + 3+ years of dedicated experience in cyber threat intelligence, threat research , or a threat hunting role… more
- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
- CACI International (Fort Bragg, NC)
- …Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation ... Analyst; Digital Network Exploitation Analyst; Cyberspace Operator; Expeditionary Cyber Operator; Cyber Capability Developer; Analytic Support Officer - **… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- CACI International (Chantilly, VA)
- …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
- CACI International (Chantilly, VA)
- Digital Network Exploitation Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee ... support of operations; your thorough understanding of how adversaries conduct cyber operations will inform identifying initial access vectors, target architecture… more
- Lockheed Martin (Fort Meade, MD)
- …tools, debugging tools \(Ghidra/Binary ninja\)\. Software vulnerability analysis and exploitation \. Understanding of intrusion detection systems , firewalls, VPN ... **Description:** You will be a Classified Cyber Solutions Developer for Lockheed Martin in the...MD area\. Our team is responsible for leading advanced research projects in computer network operations \(CNO\) and developing… more
- Lockheed Martin (Grand Prairie, TX)
- …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- BAE Systems (Burlington, MA)
- …have the opportunity to develop and mature advanced technology capabilities in the areas of cyber and Electronic Warfare (EW). Within BAE Systems FAST Labs RF ... growing rapidly. Ranging from the next generation of new RF/ cyber algorithms to demonstration of advanced EW capabilities in... and EW mission areas and ensure transition of research efforts into BAE Systems Business Area… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber Physical Systems Group tackles key problems in the convergence of cybersecurity and the physical world in an interdisciplinary research and ... Laboratory is seeking an experienced Offensive Cyber Operations Expert to join our Cyber Physical Systems group within the Cyber Security and Information… more
- Southern California Edison (Rosemead, CA)
- **Join the Clean Energy Revolution** Become a Cyber Security Threat Hunt, Senior Specialist at Southern California Edison (SCE) and build a better tomorrow. In this ... job, you'll be a part of the Cyber Threat Hunt and Intelligence team, a sub-team under...will be primarily responsible for not only conducting continuous research on emerging threats and threat actor activity but… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- **Description** The Mission Concepts & Capabilitis (MCC) division of Applied Research Associates, Inc. (ARA) is building a team to conduct cyber assessments of ... vulnerabilities of critical US and Allied systems , networks, infrastructures, and assets. Our team will support...Mission Assurance Department (MA) program. We are seeking hands-on cyber analysts with and understanding of both the compliance… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more
- Chenega Corporation (Washington, DC)
- …activity relevant to cyber defense practices. + Identify applications and operating systems of a network device based on network traffic. + Other duties as ... **Req ID:** 36566 **Summary** **Intermediate Cyber Defense Analyst** **Washington, DC** Are you ready...and take your career to the next level! Chenega Systems (CS) provides federal agencies empowered solutions in Cybersecurity… more
- Nightwing (Arlington, VA)
- Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical… more