- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- Adapt Forward (North Charleston, SC)
- …software, hardware procurement and classified development necessary to execute test cases for cyber events of DoD Systems . The selected candidate will also ... support penetration testing, event development and mission based cyber risk assessments for DoD systems . Qualifications: * US Citizen * TS with SCI Clearance… more
- BAE Systems (Merrimack, NH)
- …you will drive disruptive RF Exploitation architectures and capabilities from research and development efforts into BAE Systems Business Areas products and ... aerospace and defense industry s most difficult problems. Through research and development (R&D) programs funded by science and...the areas of RF electronic warfare, advanced electronics and cyber . BAE Systems FAST Labs - RF,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
- Microsoft Corporation (Redmond, WA)
- …GHOST (Global Hunting, Oversight, and Strategic Triage Team) as a Security Researcher ? Do you have an interest in helping Microsoft's clients defend themselves ... against targeted exploitation ? Are you interested in being intimately involved in...GHOST team. We are looking for an experienced Security Researcher with required analytical background to join our team… more
- BlueHalo, LLC (Annapolis Junction, MD)
- …career. You'd like to do this + Conduct in-depth target analysis and research + Develop innovative tradecraft, exploitation techniques, and concepts of operation ... make this impact now. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As...is required You could also have this: + Open-source research background + Experience using learning management systems… more
- BigBear.ai (Columbia, MD)
- …and technical expertise to understand information found in SIGINT and cybersecurity systems and facilitate the exploitation of digital networks. Working closely ... mission forward. What you will do Conduct in-depth target analysis and research . Develop innovative tradecraft, exploitation techniques, and concepts of… more
- CACI International (Chantilly, VA)
- …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
- Amazon (Arlington, VA)
- …is seeking an innovative Senior Security Intel Engineer to join the Vulnerability and Exploitation Threat Intelligence (VEX TI) team as a part of Amazon Cyber ... and report timely, accurate, and actionable threat intelligence. ACTI delivers cyber threat intelligence to Amazon and AWS leadership, service teams, partners,… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... Amentum is seeking multiple Digital Network Exploitation Analyst (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to… more
- Pacific Northwest National Laboratory (Richland, WA)
- …to sophisticated technologies and materials, the threats grow more dynamic and complex-from cyber and nuclear to chemical and biological weapons of mass effect and ... algorithms, and tools-are enabling stronger, more resilient technologies and systems to safeguard national security. Coupled with decades of...Do you want to create a legacy of meaningful research for the greater good? Do you want to… more
- Lockheed Martin (Grand Prairie, TX)
- …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
- Leidos (Arlington, VA)
- …attacks to mission systems . You will perform data analysis, investigative analysis, research on existing and emerging cyber threats, and develop tools to ... and a variety of exciting R&D programs. As a Cyber Systems Engineer, you will be expected...gathering. + Document threats via threat intelligence reports. + Research emerging cyber threats. Apply analytical understanding… more
- Leidos (Ashburn, VA)
- …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- Spectrum Comm Inc (Edwards, CA)
- …and reporting. The Cyber Analyst plans for and coordinates cyber -vulnerability and penetration/ exploitation testing to include test plans and testing ... The Cyber Security Analyst is the primary individual with...reports, and draft sections of the final report. + Research and analysis of available test options and determining… more
- Leidos (Ashburn, VA)
- …a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective ... security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial...analysis and threat findings to appropriate stakeholders + Lead cyber threat hunt missions with minimal supervision or guidance… more
- Leidos (Ashburn, VA)
- …(Certified Professional) + OSCE (Certified Expert) + OSWP (Wireless Professional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
- CACI International (Fort Meade, MD)
- …a bridging infrastructure between SIGINT/ CYBER and SOCOM entities, merging SIGINT/ CYBER systems capabilities and the integration of new systems ... Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber -Physical Systems Group tackles challenges at the convergence of cybersecurity and the physical world. We operate in an interdisciplinary research ... and development environment and our focus is on developing new cyber -physical capabilities for the DoD, intelligence community, and federal agencies. Our key… more