- RTX Corporation (Arlington, VA)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... intelligence, and services offerings. Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support… more
- RTX Corporation (Arlington, VA)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... offerings. Nightwing CIS Business Unit provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support… more
- RTX Corporation (Sterling, VA)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- RTX Corporation (Sterling, VA)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... future of our cybersecurity, intelligence, and services offerings. CODEX Overview CODEX ( Cyber Offense and Defense Experts) division brings together an elite team of… more
- CACI International (Chantilly, VA)
- Cyber Threat Analyst Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of ... have a wide range knowledge and skills, such as computer forensics/ mobile device forensics, data recovery, reverse engineering intrusion analysis and methodologies,… more
- Percival Engineering (Dulles, VA)
- …is also required Responsibilities Include: + Developing custom applications and/or performing vulnerability research on mobile platforms to include Android ... Ready to dive into and learn the latest cyber strategies and techniques? Are you all about...skills include experience in static and dynamic reverse engineering, vulnerability research , binary analysis of executables, exposure… more
- Parsons Corporation (Chantilly, VA)
- …Network Operations arena. Our mission is to provide critical vulnerability research and exploitation development on Android mobile device platforms. Our team ... development and has an understanding of Android development. Relevant experience with vulnerability research and working with existing toolchains and weaponizing… more
- Google (Reston, VA)
- …NDK. + Experience customizing Android firmware images. + Experience in vulnerability discovery and analysis, design auditing, and code-level security auditing. + ... effectively prepare for, proactively mitigate, and detect and respond to cyber security threats. Security Consultants have an understanding of computer science,… more
- SAIC (Mclean, VA)
- …to the Sponsor. f. The Contractor shall utilize information technology security research to identify projects in coordination with Cyber Security Project ... provided to the Sponsor. 11. Demonstrated experience utilizing information technology security research to identify projects in coordination with Cyber Security… more
- CACI International (Chantilly, VA)
- …red team exercises + Career experience in exploit dev, malware analysis, digital forensics, vulnerability research , or web app development / pen testing + Career ... applications pen-testing experience. As a functional member of a cyber red team, you will look for creative ways...training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses… more
- Koniag Government Services (Washington, DC)
- …completing a Zero Trust maturity model assessment. + Review existing and planned cyber response technologies including EDR, VA, SIEM and logging solutions and make ... on quick wins as part of a longer-term enterprise roadmap. + Support Mobile Application MFA Proof of Concept (PoC) solutions. + Develop enhanced Multi-Factor… more
- RTX Corporation (Sterling, VA)
- …most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical ... Working knowledge CSFC technologies and methodologies* Working knowledge of secure mobile platform management solutions* Working knowledge of Thales HSM's* Working… more
- Administrative Office of the US Courts (Washington, DC)
- …and postproduction assessments of national web applications and host environments, vulnerability scanning, external testing of public facing assets, and the ... development teams to adopt security requirements from the start. Managing the vulnerability scanning programs conducted by internal and external teams throughout the… more