• Eisai, Inc (Nutley, NJ)
    …is breaking through in neurology and oncology, with a strong emphasis on research and development. Our history includes the development of many innovative medicines, ... Cloud computing, on-premises data centers, network topology, endpoints (PCs, Printers, mobile devices, etc), and strategic infrastructure platforms such as Office… more
    HireLifeScience (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Northeast Georgia Health System, Inc (Gainesville, GA)
    …Anti-Malware, Data Loss Prevention, End-point encryption, Incident Detection and Response, Mobile Device Management Vulnerability Management tools. Minimum Job ... Business requirements, process, and practice. Working knowledge of forensic tools. Research , recommend, and architect NGHS Security infrastructure tools.Understanding of… more
    JobGet (04/27/24)
    - Save Job - Related Jobs - Block Source
  • Mobile Vulnerability

    GliaCell Technologies (Annapolis Junction, MD)
    Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
    GliaCell Technologies (04/03/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (04/10/24)
    - Save Job - Related Jobs - Block Source
  • Mobile CNO Software Developer

    Percival Engineering (Dulles, VA)
    …is also required Responsibilities Include: + Developing custom applications and/or performing vulnerability research on mobile platforms to include Android ... our team does it all. If you are a Mobile CNO Software Developer with a passion for innovation...skills include experience in static and dynamic reverse engineering, vulnerability research , binary analysis of executables, exposure… more
    Percival Engineering (03/28/24)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Research Engineer

    Northrop Grumman (Cincinnati, OH)
    …to live in Cincinnati . **Northrop Grumman Mission Systems** (NGMS) is seeking Vulnerability Research Engineers to join our team of qualified, diverse ... of a degree. + Experience with a disassembler for vulnerability research (IDA Pro, Ghidra, BinaryNinja, radare2,...engineering hardware and software such as embedded systems (IoT), mobile devices/phones. + Development of software to run in… more
    Northrop Grumman (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Staff Security Engineer, Hardware…

    Google (Mountain View, CA)
    …complex issues involving connectivity security. In this role, you will lead vulnerability research for Pixel devices including hardware, firmware software, ... focuses on designing and delivering the world's most helpful mobile experience. The team works on shaping the future.... + Define the strategy and roadmap for Pixel vulnerability research . + Evaluate and design innovative… more
    Google (04/11/24)
    - Save Job - Related Jobs - Block Source
  • Lead Vulnerability Analyst

    Leidos (Ashburn, VA)
    …(ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current ... networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The CBP SOC… more
    Leidos (03/20/24)
    - Save Job - Related Jobs - Block Source
  • Vulnerability Management Analyst

    Plante Moran (IN)
    Vulnerability Management Analyst - India - Mumbai + Location: India, Maharashtra, Mumbai Make your mark. Our Technology Services team focuses on the firm's critical ... enable and manage growth, leverage resources, and mitigate costs and risks. The Vulnerability Management and SOC (Security Operations Center) Analyst role will be an… more
    Plante Moran (03/01/24)
    - Save Job - Related Jobs - Block Source
  • Threat Detection & Response, Analyst

    MUFG (Tampa, FL)
    …Knowledge of cloud computing security, network, operating system, database, application, and mobile device security. + Knowledge of vulnerability management and ... criminals to various systems, technologies, operations, and programs, and analyzing research to determine a cyber criminal's capabilities, intentions, and attack… more
    MUFG (03/15/24)
    - Save Job - Related Jobs - Block Source
  • Mobile Exploit Developer/Android Mid-Senior

    Parsons Corporation (Chantilly, VA)
    …Network Operations arena. Our mission is to provide critical vulnerability research and exploitation development on Android mobile device platforms. Our team ... development and has an understanding of Android development. Relevant experience with vulnerability research and working with existing toolchains and weaponizing… more
    Parsons Corporation (03/28/24)
    - Save Job - Related Jobs - Block Source
  • SOC (Service Operations Analyst I) - Security

    Weill Cornell Medical College (New York, NY)
    …response, intrusion detection/prevention, data loss prevention, encryption, and endpoint and mobile device security. + Assists in vulnerability management ... Physician Organization - are engaged in world-class clinical care and cutting-edge research that connect patients to the latest treatment innovations and prevention… more
    Weill Cornell Medical College (04/13/24)
    - Save Job - Related Jobs - Block Source
  • Web & Mobile Applications…

    Ventura County (Ventura, CA)
    Web & Mobile Applications Architect/Supervisor Print (https://www.governmentjobs.com/careers/ventura/jobs/newprint/4445030) Apply  Web & Mobile Applications ... improvement, applications support, voice/data infrastructure, data security, threat and vulnerability /risk management, and extended staffing. The Position Under general… more
    Ventura County (04/05/24)
    - Save Job - Related Jobs - Block Source
  • VAT Analyst - Tier 2

    Leidos (Bluemont, VA)
    …(ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current ... networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile /cellular, cloud, security devices, servers and workstations. The FEMA… more
    Leidos (04/04/24)
    - Save Job - Related Jobs - Block Source
  • Senior Cybersecurity Engineer

    Trane Technologies (St. Paul, MN)
    …the activities will include threat modeling, attack modeling, security DFMEA, vulnerability assessment, triaging, and reporting. This Sr. Cyber Security Engineer ... including reviewing and explaining security tools and processes, providing vulnerability explanations and remediation guidance + Optimize product/system security by… more
    Trane Technologies (03/20/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Engineer 1

    University of Washington (Seattle, WA)
    …Collaborating with fellow Cyber Security Engineers and Analysts to conduct vulnerability assessments, threat intelligence, and incident response activities across UW ... Cancer Care Alliance (a partnership between UW Medicine, Fred Hutchinson Cancer Research , and Seattle Children's). ITS is responsible for the ongoing support and… more
    University of Washington (04/11/24)
    - Save Job - Related Jobs - Block Source
  • Staff, Penetration Testing Engineer

    Walmart (Bentonville, AR)
    …cloud services, Internet of Things (IoT), identity and access management, mobile development, virtualization, AI and Robotics and custom hardware. They develop ... customers value, whether they shop online at Walmart.com, through one of our mobile apps, or in-store. Focus areas include customers, stores and employees, in-store… more
    Walmart (03/20/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Network Engineer-TS/SCI

    CACI International (Florham Park, NJ)
    …Cyber Innovation: Use prior experience and knowledge of reverse engineering, vulnerability research , and software development skills, in-depth research ... Cybersecurity posture. **More About this Role:** + Provide technical leadership on vulnerability research tasks to identify and evaluate security strengths and… more
    CACI International (04/03/24)
    - Save Job - Related Jobs - Block Source
  • Information Security Engineer II

    NCR VOYIX (Atlanta, GA)
    …and testing, monitoring and metrics, incident management, and threat and vulnerability management. The Information Security Engineer II shall be responsible for ... Engineer II shall work in a collaborative manner with vulnerability coordinators and remediation team to make sure the...a 24x7 basis. + Hands on experience in detailed research and analysis. + Triage, respond to and escalate… more
    NCR VOYIX (04/04/24)
    - Save Job - Related Jobs - Block Source