• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
    MIT Lincoln Laboratory (04/10/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Test Exploitation Developer

    Adapt Forward (North Charleston, SC)
    …software, hardware procurement and classified development necessary to execute test cases for cyber events of DoD Systems . The selected candidate will also ... support penetration testing, event development and mission based cyber risk assessments for DoD systems . Qualifications: * US Citizen * TS with SCI Clearance… more
    Adapt Forward (03/07/24)
    - Save Job - Related Jobs - Block Source
  • FAST Labs: Technology Development Director…

    BAE Systems (Merrimack, NH)
    …you will drive disruptive RF Exploitation architectures and capabilities from research and development efforts into BAE Systems Business Areas products and ... aerospace and defense industry s most difficult problems. Through research and development (R&D) programs funded by science and...the areas of RF electronic warfare, advanced electronics and cyber . BAE Systems FAST Labs - RF,… more
    BAE Systems (03/03/24)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Security Researcher

    Microsoft Corporation (Redmond, WA)
    …GHOST (Global Hunting, Oversight, and Strategic Triage Team) as a Security Researcher ? Do you have an interest in helping Microsoft's clients defend themselves ... against targeted exploitation ? Are you interested in being intimately involved in...GHOST team. We are looking for an experienced Security Researcher with required analytical background to join our team… more
    Microsoft Corporation (04/20/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    BlueHalo, LLC (Annapolis Junction, MD)
    …career. You'd like to do this + Conduct in-depth target analysis and research + Develop innovative tradecraft, exploitation techniques, and concepts of operation ... make this impact now. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As...is required You could also have this: + Open-source research background + Experience using learning management systems more
    BlueHalo, LLC (04/11/24)
    - Save Job - Related Jobs - Block Source
  • Computer Network Exploitation Analyst

    BigBear.ai (Columbia, MD)
    …and technical expertise to understand information found in SIGINT and cybersecurity systems and facilitate the exploitation of digital networks. Working closely ... mission forward. What you will do Conduct in-depth target analysis and research . Develop innovative tradecraft, exploitation techniques, and concepts of… more
    BigBear.ai (02/09/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    CACI International (Chantilly, VA)
    …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
    CACI International (02/24/24)
    - Save Job - Related Jobs - Block Source
  • Senior Security Intel Engineer, Vulnerability…

    Amazon (Arlington, VA)
    …is seeking an innovative Senior Security Intel Engineer to join the Vulnerability and Exploitation Threat Intelligence (VEX TI) team as a part of Amazon Cyber ... and report timely, accurate, and actionable threat intelligence. ACTI delivers cyber threat intelligence to Amazon and AWS leadership, service teams, partners,… more
    Amazon (04/30/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... Amentum is seeking multiple Digital Network Exploitation Analyst (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to… more
    Amentum (03/31/24)
    - Save Job - Related Jobs - Block Source
  • Senior Data Scientist 3 - AI-Enabled Signal…

    Pacific Northwest National Laboratory (Richland, WA)
    …to sophisticated technologies and materials, the threats grow more dynamic and complex-from cyber and nuclear to chemical and biological weapons of mass effect and ... algorithms, and tools-are enabling stronger, more resilient technologies and systems to safeguard national security. Coupled with decades of...Do you want to create a legacy of meaningful research for the greater good? Do you want to… more
    Pacific Northwest National Laboratory (04/06/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Software Engineer Sr (Embedded…

    Lockheed Martin (Grand Prairie, TX)
    …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
    Lockheed Martin (02/16/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Engineer

    Leidos (Arlington, VA)
    …attacks to mission systems . You will perform data analysis, investigative analysis, research on existing and emerging cyber threats, and develop tools to ... and a variety of exciting R&D programs. As a Cyber Systems Engineer, you will be expected...gathering. + Document threats via threat intelligence reports. + Research emerging cyber threats. Apply analytical understanding… more
    Leidos (02/19/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Intel Analyst

    Leidos (Ashburn, VA)
    …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Cleared Senior Cyber Systems Analyst

    Spectrum Comm Inc (Edwards, CA)
    …and reporting. The Cyber Analyst plans for and coordinates cyber -vulnerability and penetration/ exploitation testing to include test plans and testing ... The Cyber Security Analyst is the primary individual with...reports, and draft sections of the final report. + Research and analysis of available test options and determining… more
    Spectrum Comm Inc (03/29/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Threat Hunt Analyst

    Leidos (Ashburn, VA)
    …a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective ... security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial...analysis and threat findings to appropriate stakeholders + Lead cyber threat hunt missions with minimal supervision or guidance… more
    Leidos (04/04/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Countermeasures Engineer

    Leidos (Ashburn, VA)
    …(Certified Professional) + OSCE (Certified Expert) + OSWP (Wireless Professional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (04/02/24)
    - Save Job - Related Jobs - Block Source
  • Senior SIGINT & Cyber Analyst

    CACI International (Fort Meade, MD)
    …a bridging infrastructure between SIGINT/ CYBER and SOCOM entities, merging SIGINT/ CYBER systems capabilities and the integration of new systems ... Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation more
    CACI International (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Cyber -Physical Systems Engineer

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber -Physical Systems Group tackles challenges at the convergence of cybersecurity and the physical world. We operate in an interdisciplinary research ... and development environment and our focus is on developing new cyber -physical capabilities for the DoD, intelligence community, and federal agencies. Our key… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source