• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
    MIT Lincoln Laboratory (08/27/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Analyst - Threat…

    SMBC (Charlotte, NC)
    …SMBC offers a competitive portfolio of benefits to its employees. **Role Description** As a Cyber Security Analyst - Threat Researcher , you will be a key part of ... and Skills** **Required Qualifications:** + 3+ years of dedicated experience in cyber threat intelligence, threat research , or a threat hunting role… more
    SMBC (08/22/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst - TS Clearance |

    Cambridge International Systems Inc (Norfolk, VA)
    …of January 2026. What You'll Do + HQ Tasks: + Serve as the Exploitation Analyst supporting cyber survivability policy and process oversight to warfare divisions, ... analysis + Technical Expertise: + Proficiency in decomposing complex computer systems /networking configurations in support of system exploitation analysis +… more
    Cambridge International Systems Inc (09/04/25)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst (TS/SCI with Poly…

    Deloitte (Baltimore, MD)
    …of professional experience in cybersecurity, with at least 3 years focused on cyber exploitation analysis, threat intelligence, or incident response. Must be ... Our Deloitte Cyber team understands the unique challenges and opportunities...manage to secure success. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
    Deloitte (07/25/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst 1-4…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
    Amentum (07/15/25)
    - Save Job - Related Jobs - Block Source
  • Early Career Vulnerability Researcher

    Battelle Memorial Institute (Columbus, OH)
    …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
    Battelle Memorial Institute (07/27/25)
    - Save Job - Related Jobs - Block Source
  • Senior Vulnerability Researcher & Reverse…

    Parsons Corporation (West Melbourne, FL)
    …/Reverse Engineer** to join our team! In this role you will get to research hardware and software systems to find and exploit unique vulnerabilities (Zero ... Days). **What You'll Be Doing:** + Reverse engineering systems and software executables using tools like Ghidra, Binary Ninja, or IDA Pro + Identifying potential… more
    Parsons Corporation (09/05/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    CACI International (Chantilly, VA)
    …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
    CACI International (07/31/25)
    - Save Job - Related Jobs - Block Source
  • Senior Embedded Vulnerability Researcher

    Draper (Boston, MA)
    …organizational needs, our technical efforts and opportunities vary from conventional cyber operations enablement tooling to embedded vulnerability research and ... Job Description Summary: Draper's Offensive Cyber Security Group is looking for dedicated individuals...exploit development on a wide range of devices and systems . Job Description: + Assess hardware and software for… more
    Draper (06/21/25)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst…

    Deloitte (Baltimore, MD)
    …Do As a Project Delivery Manager on the project, as a Digital Network Exploitation Analyst you will: + Apply data and technical expertise to perform file signature ... and report intelligence-derived significant network events and intrusions + Conduct research and analysis at the operational or strategic level + Communicate… more
    Deloitte (09/12/25)
    - Save Job - Related Jobs - Block Source
  • FAST Labs - Technical Innovation Lead…

    BAE Systems (Burlington, MA)
    …have the opportunity to develop and mature advanced technology capabilities in the areas of cyber and Electronic Warfare (EW). Within BAE Systems FAST Labs RF ... and EW mission areas and ensure transition of research efforts into BAE Systems Business Area...job specifics. **FAST Labs - Technical Innovation Lead - Cyber /RF Systems ** **115518BR** EEO Career Site Equal… more
    BAE Systems (09/09/25)
    - Save Job - Related Jobs - Block Source
  • Group 05-51 | SRP Intern | Cyber -Physical…

    MIT Lincoln Laboratory (Lexington, MA)
    …their logical processing affects, and is affected by, the physical world. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... prototypes for the Department of Defense, intelligence community, and federal agencies. The Cyber Physical Systems Group tackles key problems in the convergence… more
    MIT Lincoln Laboratory (09/17/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Software Engineer Sr (Embedded)

    Lockheed Martin (Grand Prairie, TX)
    …of challenges in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
    Lockheed Martin (08/13/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Intel Lead

    Leidos (Bluemont, VA)
    …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to FEMA networks and its regions through monitoring, intrusion… more
    Leidos (08/20/25)
    - Save Job - Related Jobs - Block Source
  • ​​ Cyber Threat Intel Analyst​

    Leidos (Ashburn, VA)
    …Center during incident response and threat intelligence activities that includes cyber threat analysis support, research , recommending relevant remediation and ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (07/23/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Threat Hunt Analyst​

    Leidos (Ashburn, VA)
    …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (08/14/25)
    - Save Job - Related Jobs - Block Source
  • ​​ Cyber Detection Engineer ​

    Leidos (Ashburn, VA)
    …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (08/15/25)
    - Save Job - Related Jobs - Block Source
  • ​​Insider Threat & Cyber Forensics SME​

    Leidos (Ashburn, VA)
    …GREM - Reverse Engineering Malware + GISF - SecurityFundamentals + GXPN - Exploit Researcher and Advanced PenetrationTester + GCTI - Cyber Threat Intelligence + ... OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional… more
    Leidos (08/08/25)
    - Save Job - Related Jobs - Block Source
  • Red Cell Cyber Analyst

    Amentum (Fort Belvoir, VA)
    exploitation for key telecommunications networks. + Analyze and characterize cyber systems and conduct analysis appropriate to the program, identify ... The Red Cell Cyber Analyst shall: + Characterize the adversary's cyber capabilities. Research the structure, ideology, intentions, tactics, and capabilities… more
    Amentum (08/20/25)
    - Save Job - Related Jobs - Block Source
  • Full Spectrum Cyber Capability…

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber Physical Systems Group tackles key problems in the convergence of cybersecurity and the physical world in an interdisciplinary research and ... an experienced Full Spectrum Cyber Capability and Operations Expert to join our Cyber Physical Systems group within the Cyber Security and Information… more
    MIT Lincoln Laboratory (08/14/25)
    - Save Job - Related Jobs - Block Source