- Battelle Memorial Institute (Columbus, OH)
- …all qualified individuals to apply. **Job Summary** Battelle is currently seeking an aspiring ** Mid - level Vulnerability Researcher ** to work in our ... questions, this is the job for you! As a mid - level Vulnerability Researcher ,...using debugging tools + Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja) +… more
- Northrop Grumman (San Antonio, TX)
- …with products that may involve kernel development, reverse engineering or vulnerability research of network and communication systems. **Essential Functions:** ... company performing an individual internship in an entry to mid - level career type role. The service member...a **Software Engineer or Principal Software Engineer: Vuln** **erability Research - Reverse Engineering** to join our team in… more
- Battelle Memorial Institute (Beavercreek, OH)
- Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and manufacture products and deliver critical services ... Cyber Analytics Department in **Beavercreek/Dayton, Ohio** is seeking a **Cyber Research Engineer III** to join our multi-disciplinary team, bringing together the… more
- GliaCell Technologies (Annapolis Junction, MD)
- …security clearance is REQUIRED. Please do not apply if you currently do not possess this level of clearance. Are you a Mid - Level Reverse Engineer who is ... to work with some amazingly talented people Job Description: GliaCell is seeking a Mid - Level Reverse Engineer on one of our subcontracts. This is a full-time… more
- SOS International LLC (Reston, VA)
- Overview SOSi is seeking a Mid - level Nuclear Engineer (Scientific Support) to be part of a unique, multi-discipline team assisting partners to fuse operations ... research and reverse engineering analysis. Conduct facility and vulnerability assessments on foreign nuclear capabilities. Develop innovative analytic and… more
- General Dynamics Information Technology (Hanover, MD)
- …needed. With your proficiency in grasping and applying new information quickly, the Mid - Level Capabilities Development Engineer will be proficient in C/C++, and ... **Req ID:** RQ201048 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret...time operating systems. you'll be involved in Protocol Analysis, Vulnerability Assessment, Security Research , Rapid Prototyping of… more
- Belay Technologies (Fort Meade, MD)
- …Perl, C#, Rust. + Experience with Reverse Engineering. + Experience with Vulnerability Research and Exploit development. + Knowledge of end-to-end SIGINT ... runner up in 2020 and a finalist in 2021! Belay Technologies is seeking a Mid - level Software Engineer (SWE) to join our intel team. You will act as a reverse… more
- Huntington Ingalls Industries (Concord, MA)
- …Time/Salaried/Exempt Anticipated Salary Range: $73,553.00 - $110,000.00 Security Clearance: Secret Level of Experience: Mid This opportunity resides with Warfare ... access controls. + Utilize encryption technologies, conduct penetration and vulnerability tests, and explore various security research ...+ Experience & Education: + For a Bachelor's Degree Level : A minimum of 2 years of relevant experience.… more
- Leidos (Clarksburg, WV)
- …WV with remote work possible. We are seeking a talented and experienced Mid - Level Information Systems Security Officer on our team. The ideal candidate ... DISA and SANS Institute); knowledge of Agile development methodology; demonstrated level of experience in information security practices within the federal and/or… more
- ASM Research, An Accenture Federal Services Company (Montgomery, AL)
- Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate data and cyber security risks. Designs and develops ... determining scope, urgency, and potential impact, identifying the specific vulnerability , and making recommendations that enable expeditious remediation. + Performs… more
- Vexterra Group (Bethesda, MD)
- …Using knowledge gained through the application of reverse- engineering and other research techniques, engineer low- level C and assembly. Position Requirements: + ... digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify… more
- MUFG (Tampa, FL)
- …skills needed to be proficient + Scope and perform penetration testing and vulnerability research of complex proprietary software and hardware for client ... are mitigated and/or remediated within the firm's risk tolerance and service level agreements + Continually research new exploitation/attack techniques against… more
- Santander US (Quincy, MA)
- …security research on threats and remediation methods + Conducts vulnerability assessment on the target IT Infrastructure, applications, and related information ... risk management is a plus. + Proven relationship building skills working with mid to senior level management and cross-functional teams; understands risks;… more
- Texas Tech University (Lubbock, TX)
- …References, Resume / CV **Job Type:** Full Time **Job Group:** Mid - level Officer and Manager **Shift:** Day **Required Qualifications:** Bachelor's ... databases. + Perform password auditing, network based and Web application-based vulnerability scanning, virus management, and intrusion detection. + Conducting risk… more
- Tri-State Generation and Transmission Association, Inc. (Westminster, CO)
- …hiring salary range based upon work experience, education, and/or skill level . **Responsibilities:** + Provision, tune, maintain, monitor, and troubleshoot network ... applicable to Tri-State information systems and third-party vendors. + Conducts vulnerability scans or assessments using Tri-State's vulnerability management… more
- Aramco Services Company (Houston, TX)
- OVERVIEW: The Penetration Tester position applies mid - level principles and moderate to highly complex research , evaluation, managing, administering, ... position focuses on offensive security tasks such as penetration testing, vulnerability assessments, and red teaming exercises. The role involves identifying and… more
- State of Connecticut, Department of Administrative Services (Hartford, CT)
- …you ready to coordinate projects that support complex and specialized research investigations and statistical analyses? Are data-driven studies and projects ... Performs related duties as required. Systems Programming + Provides second or third level support for network connectivity, or related network issues for the user… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... and experimental test plans Prepare, and often deliver, briefing materials to mid - level and senior client management Perform troubleshooting Review technical… more
- University of Connecticut (UConn) (Storrs, CT)
- …Systems Administrator to support and coordinate technical operations within our Secure Research environment. This role focuses heavily on Microsoft 365 (Office 365) ... and collaboration infrastructure. MINIMUM QUALIFICATIONS FOR THE SYSTEM ADMINISTRATOR 2 AND 3 LEVEL + (Both levels) Education & Experience + Eight (8) years of… more
- CACI International (Aberdeen Proving Ground, MD)
- …of Travel: Continental US * * * **The Opportunity:** CACI seeks a motivated, mid - level Cyber Security Engineer to support the C5ISR Center at Aberdeen Proving ... join a team of cyber security engineers to perform vulnerability assessments for the Cyber Security (CS) Division at...and applying new testing tools and techniques. + Conduct research and development efforts to explore current and emerging… more