- SAIC (Chantilly, VA)
- **Description** SAIC is seeking ** Cyber Threat & Vulnerability Hunter** to join its Blue Team Vulnerability Assessment Program in **Chantilly, Virginia.** ... Operate and support maintenance of technical hunt software and hardware + Research , evaluate and recommend new cybersecurity technologies and techniques to enhance… more
- Leidos (Columbia, MD)
- …environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, development, integration, and test tasks to ... services and mission software capabilities in the areas of cyber , logistics, security operations, and decision analytics to support...through all stages of the product lifecycle - from vulnerability research to development and test. This… more
- Leidos (Columbia, MD)
- …environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, development, integration, and test tasks to ... services and mission software capabilities in the areas of cyber , logistics, security operations, and decision analytics to support...through all stages of the product lifecycle - from vulnerability research to development and test. This… more
- Leidos (Ashburn, VA)
- …to be considered. Must be US Citizen. **Primary Responsibilities** Information Security Vulnerability Management + Continuously research emerging threats to the ... US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS NOSC… more
- SAIC (Chantilly, VA)
- **Description** SAIC is seeking a Principal Cyber Security Cloud Analyst, to serve as a member of a Vulnerability Assessment program. This position is located in ... and techniques + Support the execution of periodic and on-demand Cloud-based vulnerability assessments where various cloud related system artifacts are analyze to… more
- Chenega Corporation (Washington, DC)
- …size, scope, and complexity as required by this Task Order. * Experience managing cyber vulnerability and threat information on an HQ level. * Position requires ... other cyber policy requirements impacting the Treasury Threat and Vulnerability Program. * Facilitate IT security/risk training curriculum. * Serve as project… more
- TestPros (Norfolk, VA)
- …include Program Management, Program Oversight, Process Audit, Intelligence Analysis, Cyber Security, NIST SP 800-171 Assessment and Compliance, Computer Forensics, ... Independent Verification and Validation (IV&V), Quality Assurance (QA), Compliance, and Research and Development (R&D) services. TestPros is an Equal Opportunity… more
- Lockheed Martin (Grand Prairie, TX)
- …as: embedded cyber resilient systems, software assurance, weapon system cyber vulnerability assessments, and other technologies\. * Demonstrated experience ... technology development in DoD lifecycles; ideally from early concept/ vulnerability identification, thru development/prototyping, and then the integration into...of advanced cyber research and development projects\. * Team… more
- Leidos (Columbia, MD)
- …environment with a team of Cyber Engineers in reverse engineering, vulnerability research , prototyping, design, development, integration, and test tasks to ... teams that collaborate closely with customers? Are you intrigued by offensive cyber vulnerability analysis and reverse engineering (VR/RE)? How about offensive… more
- Lockheed Martin (Grand Prairie, TX)
- …such as: embedded cyber resilient systems, software assurance, weapon system cyber vulnerability assessments, and other technologies\. * A subject matter ... **Description:** Are you seeking a rewarding career as a leading Cyber Security Architect Principal Investigator who will research , develop, and deliver… more
- Spectrum Comm Inc (Edwards, CA)
- …and reporting. The Cyber Analyst plans for and coordinates cyber - vulnerability and penetration/exploitation testing to include test plans and testing ... The Cyber Security Analyst is the primary individual with...reports, and draft sections of the final report. + Research and analysis of available test options and determining… more
- RTX Corporation (Palm Bay, FL)
- …systems defense and managed services; cyber analytics and intelligence services; cyber network operations; vulnerability research ; and field deployment ... Details Our team covers the full life cycle from emulation, reverse engineering, vulnerability research , and CNO/CNE tool development. Our mission covers a wide… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... technical subject matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical analysis of offensive… more
- RTX Corporation (Indialantic, FL)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- RTX Corporation (St. Petersburg, FL)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... International Court , St Petersburg, FL, 33716 USA Position Role Type: Onsite Vulnerability Researcher /Reverse Engineer You have been redirected to RTX's career… more
- Amentum (Fort Belvoir, VA)
- …for program objectives, identifying gaps in cyber architecture, and developing cyber courses of action on vulnerability assessments. Further, RCAs provide ... The Red Team Cyber Analyst shall: + Characterize the adversary's cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- … vulnerability assessments to provide local SME advisory: **Red Cyber Analysis Manager Responsibilities/Tasks:** + Manage projects across multiple teams, ... Red Cyber Analysis Team will:** + Characterize the adversary's cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities… more
- RTX Corporation (Palm Bay, FL)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Our team covers the full life cycle from emulation, reverse engineering, vulnerability research , and CNO/CNE tool development for various operating systems.… more
- RTX Corporation (Annapolis Junction, MD)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... below Desired Skills: Understanding of OS Internals (any major OS) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
- BlackRock (Washington, DC)
- … cyber monitoring, incident response, cyber threat intelligence, cyber forensics, and vulnerability management. Also responsible for coordinating ... * Control the intelligence lifecycle and coordinate the threat research activities in place across Cyber Operations...the threat research activities in place across Cyber Operations * Work with stakeholders to identify intelligence… more