- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Navient (Annapolis, MD)
- …capable of rapidly conceptualizing, developing, and deploying new web and mobile applications from ideation to implementation. You'll thrive in an environment ... are completed successfully and on time. + Lead the mobile initiatives from architecture to implementation + Act as...trust. + Innovation and Thought Leadership: Your contributions to research , innovation, and thought leadership will position us as… more
- Lentech, Inc (Fort Meade, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...hashing Forensic analysis of Windows systems, Linux systems or mobile devices Commercial / GOTS tools for Intrusion detection… more
- Parsons Corporation (Annapolis Junction, MD)
- …and common cyber vulnerabilities. This position will combine expert level research with analyzed intelligence community assessments and reports and open-source ... intelligence to support vulnerability discovery and mitigation efforts of United States National...+ Forensic analysis of Windows systems, Linux systems or mobile devices + Commercial / GOTS tools for Intrusion… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Jacobs (Columbia, MD)
- …include the following: + Site Surveys and Interface Technologies + Vulnerability Assessments, Penetration Testing, and Continuous Monitoring + Risk Management ... including analyses of the adequacy of implemented security features and research and analysis of security technology. + Extensive experience in conducting… more
- Jacobs (Fort Meade, MD)
- …support for incident response activities, intrusion events, and malware analysis * Research , design, deploy, and lead training events. * Evaluate emerging forensic ... Intelligence Briefings; CI or HUMINT Policy Analysis; Threat and Vulnerability Assessments; and Analytical Information Reports. \#divergent #902 \#divergent **Here's… more
- Nightwing (Annapolis Junction, MD)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... a broad range of technologies (eg, Linux, Windows, Virtualization\Hypervisors, Mobile , and Embedded\IoT systems). Additionally, you will influence the requirements… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2… more
- Nightwing (Annapolis Junction, MD)
- …challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation, ... a broad range of technologies (eg, Linux, Windows, Virtualization\Hypervisors, Mobile , and Embedded\IoT systems). Additionally, you will influence the requirements… more