- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... associated with each role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis of market trends… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... associated with each role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis of market trends… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... associated with each role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis of market trends… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... associated with each role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis of market trends… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... associated with each role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis of market trends… more
- ARSIEM (Annapolis Junction, MD)
- …one of our Government clients in Annapolis Junction, MD. Responsibilities + Perform vulnerability research into mobile technologies. + Demonstrate the latest ... you work with. ARSIEM is currently looking for a Mobile System Researcher 4 . The position...techniques and best practices in vulnerability research . + Produce… more
- JPMorgan Chase (Wilmington, DE)
- …seeking a dedicated vulnerability researcher to engage in advanced vulnerability analysis and research , addressing the complex demands of our mission. In ... As an Vulnerability Researcher - Assessments & Exercises...groups that share threat intelligence analytics + Conduct in-depth vulnerability research and exploit development across a… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- BigBear.ai (Annapolis Junction, MD)
- …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated solutions… more
- Palo Alto Networks (Santa Clara, CA)
- …Nmap, Burp Suite, Wireshark, etc. + Experience contributing to public vulnerability research , submitting CVEs or creating proof-of-concept exploits. **Nice ... team is expanding, and we're looking for a Staff Researcher Analyst to join our team. At Cortex, we...vulnerabilities using the XSIAM platform. **Your Impact** + Conduct vulnerability assessment research and testing, enhance automation… more
- EchoStar (Littleton, CO)
- …television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products. Today, our brands include Boost Mobile ... the status quo and reimagine capabilities across industries. Whether through research and development, technology innovation or solution engineering, our team… more
- Node.Digital (Arlington, VA)
- Cybersecurity Vulnerability Analyst Location: Arlington, VA Must have an active Top Secret Security Clearance Node is supporting a US Government customer to provide ... cybersecurity vulnerability analysis support to reduce the prevalence and impact...and application security threats and vulnerabilities (eg, buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Citigroup (Tampa, FL)
- …sorts of technologies on an enterprise-scale, so hunger for knowledge and research is greatly appreciated and rewarded. Technology is constantly evolving, and Citi ... of Citi owned or 3rd party SaaS applications (Web, Mobile , Thick Client, and APIs) leveraging a wide array...writing and presentation skills to report and articulate the vulnerability assessment results to any audience. + Contribute to… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Palm Bay, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **CODEX Culture** Our organization… more
- University of Michigan (Ann Arbor, MI)
- Research Fellow - Michigan Psychoneuroimmunology Lab Apply Now **How to Apply** The Department of Psychology at the University of Michigan invites applications for a ... postdoctoral research fellow in the Michigan Psychoneuroimmunology Lab (https://sites.lsa.umich.edu/pni/) (PI:...the neurobiological and behavioral mechanisms that underlie resilience and vulnerability to disease. The lab utilizes a range of… more
- University of Michigan (Ann Arbor, MI)
- Research Area Specialist Assoc Apply Now **How to Apply** To be considered for the position, you will need to provide all elements of the following as a single ... programming languages (eg Stata, SAS, Matlab, ArcGIS) Your prior experience as a research assistant, in the private sector, and/or with independent research … more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more