- ARSIEM (Fort Meade, MD)
- … Vulnerability Researcher Responsibilities + Provide engineering and vulnerability research results related to hardware components, software applications, ... Vulnerability Researcher Responsibilities + Provide engineering and vulnerability research results related to hardware components, software applications,… more
- Battelle Memorial Institute (Columbus, OH)
- …to apply. **Job Summary** Battelle is currently seeking an aspiring **Early Career Vulnerability Researcher ** to work in our **Columbus, OH** location. Do you ... enjoy conducting vulnerability research from scratch? Do you have...is the job for you! As an early career Vulnerability Researcher , you will work with a… more
- Palo Alto Networks (Santa Clara, CA)
- …no telling what door they'll knock on next. As a Principal Product Security Researcher , you will be helping Palo Alto Networks in a high visibility and impactful ... + Advance the state of the art in security research and bug hunting by developing novel methods for... and bug hunting by developing novel methods for vulnerability discovery + Evaluate the security of Palo Alto… more
- System One (Annapolis Junction, MD)
- We have a Direct Hire position open for a SME Mobile Vulnerability Researcher . Clearance Level: Top Secret/SCI with Full Scope Polygraph Onsite - Annapolis ... Position Overview: The candidate will be working on a team performing vulnerability research against mobile technologies. The candidate must be familiar with the… more
- Cromulence LLC (Melbourne, FL)
- Cromulence is looking for a Vulnerability Researcher (VR) to support advanced research and development contracts. The successful candidate will be capable of ... in Computer Network Operations Tools, Cybersecurity Competitions, advanced Program Analysis Research & Development, and Vulnerability Research . Cromulence,… more
- Cromulence LLC (Melbourne, FL)
- Cromulence is looking for a Principal Vulnerability Researcher (VR) to support advanced research and development contracts. A successful candidate will be ... in Computer Network Operations Tools, Cybersecurity Competitions, advanced Program Analysis Research & Development, and Vulnerability Research . Cromulence,… more
- Nightwing (Indialantic, FL)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence,… more
- Nightwing (San Antonio, TX)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... + 12+ years of professional experience + Experience leading teams performing vulnerability research and/or CNO capabilities + 4 or more of the following desired… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... below Desired Skills: Understanding of OS Internals (any major OS) Experience with Vulnerability Research Experience reading or writing assembly (x86, x64, ARM,… more
- Nightwing (San Antonio, TX)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... complex problems, and deliver exceptional results for our clients. Job Summary Vulnerability Researchers at NightWing CODEX analyze systems to understand how they… more
- Nightwing (San Antonio, TX)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... solve complex problems, and deliver exceptional results for our clients. Vulnerability Researchers at NightWing CODEX analyze systems to understand how they… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... challenges. The team comprises engineers of multiple disciplines including vulnerability research , reverse engineering, CNO/CNE development, hardware emulation,… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis… more
- BigBear.ai (Columbia, MD)
- …architecture design. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices, ... Overview BigBear.ai is seeking a Software Researcher to identify flaws in software and software...What you will do Demonstrate the latest techniques in vulnerability research and demonstrate their ability to… more
- BigBear.ai (Columbia, MD)
- … Researcher . The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. What ... you will do Familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Write codes in C, Python, and… more
- CACI International (Aberdeen Proving Ground, MD)
- Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
- Sandia National Laboratories (Albuquerque, NM)
- …(OT and IT) protocols. + Experience with one or more of the following: vulnerability research , system vulnerability assessment high consequence high trust ... worldwide + Extraordinary co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and enrichment opportunities +… more
- Sandia National Laboratories (Albuquerque, NM)
- …and network protocols, + Experience with one or more of the following: vulnerability research , system vulnerability assessments, high consequence high trust ... worldwide + Extraordinary co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and enrichment opportunities +… more
- ARSIEM (Annapolis Junction, MD)
- … research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... with. ARSIEM is currently looking for a Mobile Security Researcher . The position will support one of our...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
Related Job Searches:
Linux Vulnerability Researcher,
Mobile Vulnerability Researcher,
Researcher,
Reverse Engineer Vulnerability Researcher,
Senior Vulnerability Researcher,
Software Vulnerability Researcher,
Sr Cyber Vulnerability Researcher,
Vulnerability,
Vulnerability Researcher Onsite,
Vulnerability Researcher Penetration Testing