- Battelle Memorial Institute (Columbus, OH)
- …you? If you answered yes to these questions, this is the job for you! As a ** Mid - level Vulnerability Researcher ** , you will work with disassemblers and ... apply. **Job Summary** Battelle is currently seeking an aspiring ** Mid - level ** ** Vulnerability Researcher **...using debugging tools + Experience with a disassembler for vulnerability research (Ghidra, IDA Pro, BinaryNinja) +… more
- Cipher Tech Solutions (Vienna, VA)
- …Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be ... familiar with the latest techniques in vulnerability research and demonstrate their ability to...hold a US government security clearance at the TS Level or higher at time of application + Must… more
- Google (New York, NY)
- …at Google (https://careers.google.com/benefits/) . **Responsibilities** + Conduct analysis to assess vulnerability impact and risk through industry research , and ... Security Consultant, Application and Vulnerability Management, Public Sector _corporate_fare_ Google _place_ New York, NY, USA ** Mid ** Experience driving… more
- GliaCell Technologies (Annapolis Junction, MD)
- …security clearance is REQUIRED. Please do not apply if you currently do not possess this level of clearance. Are you a Mid - Level Reverse Engineer who is ... to work with some amazingly talented people Job Description: GliaCell is seeking a Mid - Level Reverse Engineer on one of our subcontracts. This is a full-time… more
- GliaCell Technologies (MD)
- …security clearance is REQUIRED. Please do not apply if you currently do not possess this level of clearance. Are you a Mid - Level Cyber Software Engineer who ... to work with some amazingly talented people Job Description: GliaCell is seeking a Mid - Level Cyber Software Engineer on one of our subcontracts. This is a… more
- General Dynamics Information Technology (Hanover, MD)
- …needed. With your proficiency in grasping and applying new information quickly, the Mid - Level Capabilities Development Engineer will be proficient in C/C++, and ... **Req ID:** RQ207031 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Top Secret...time operating systems. you'll be involved in Protocol Analysis, Vulnerability Assessment, Security Research , Rapid Prototyping of… more
- Huntington Ingalls Industries (Concord, MA)
- …Time/Salaried/Exempt Anticipated Salary Range: $73,553.00 - $110,000.00 Security Clearance: Secret Level of Experience: Mid This opportunity resides with Warfare ... access controls. + Utilize encryption technologies, conduct penetration and vulnerability tests, and explore various security research ...+ Experience & Education: + For a Bachelor's Degree Level : A minimum of 2 years of relevant experience.… more
- ISYS Technologies (Patrick, SC)
- …the space initiatives of our government customers. I2X Technologies is seeking a Mid Level Network Security Engineerto support ongoing activities for a customer ... effectively protect, detect and respond to cyber threats and attack + Research and evaluate network and cyber technologies, performing comparative analysis to… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking an IT Infrastructure… more
- The Boeing Company (Seattle, WA)
- …requirements. + Conduct product security risk assessments, attack surface analyses, and vulnerability evaluations for embedded and IT systems. + Assist in security ... and security technologies to continuously improve security posture. + Support research and development activities that result in innovative solutions to enhance… more
- Vexterra Group (Bethesda, MD)
- …Using knowledge gained through the application of reverse- engineering and other research techniques, engineer low- level C and assembly. Position Requirements: + ... digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify… more
- Amentum (Norfolk, VA)
- …at each level of protocol models. + Skill in interpreting vulnerability scanner results to identify vulnerabilities. + Skill in processing collected data for ... and documentation for DCAT authorization established in DoDI 8585.01. + Research , review, prioritize, and submit operational requirements for acquisition of… more
- Google (Seattle, WA)
- …Science or a related technical field. + Experience with security assessments, vulnerability management, security research , vulnerability investigation or ... Core _corporate_fare_ Google _place_ Kirkland, WA, USA; Seattle, WA, USA ** Mid ** Experience driving progress, solving problems, and mentoring more junior team… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... Response (SIR): enrichment, correlation rules, and automated playbooks. + Vulnerability Response (VR): scanner integrations, remediation workflows, patch group… more
- MUFG (Jersey City, NJ)
- …skills needed to be proficient + Scope and perform penetration testing and vulnerability research of complex proprietary software and hardware for client ... are mitigated and/or remediated within the firm's risk tolerance and service level agreements + Continually research new exploitation/attack techniques against… more
- Noblis (Chantilly, VA)
- …engineering of cyber actor tools and techniques to advance defenses + Conduct vulnerability research against host endpoints and service targets + Implement ... forensics, and software reverse engineering + Exploit development and sophisticated vulnerability research + Advanced network analysis and protocol manipulation… more
- Google (Seattle, WA)
- …Engineer, Abuse and AI VRP _corporate_fare_ Google _place_ Seattle, WA, USA ** Mid ** Experience driving progress, solving problems, and mentoring more junior team ... questions and technical security issues. The Abuse and AI Vulnerability Rewards Program (VRP) is a bug bounty program...+ benefits. Our salary ranges are determined by role, level , and location. Within the range, individual pay is… more
- Google (Mountain View, CA)
- …enterprise environment. **Preferred qualifications:** + Experience with threat modeling, vulnerability research , security reviews, and secure software ... USA; Mountain View, CA, USA; +2 more; +1 more ** Mid ** Experience driving progress, solving problems, and mentoring more...development practices. + Experience in vulnerability discovery and analysis, design auditing, and code-… more
- Leidos (Reston, VA)
- …candidate shall perform the following as part of a larger team:** * Vulnerability research and analysis, reversing engineering threats to determine methods of ... software through application security architecture software evaluations, web application vulnerability assessment penetration testing and fuzzing, malware research… more
- Niagara County Community College (Sanborn, NY)
- …IT security, including system hardening, intrusion detection, network architecture, and vulnerability management. + Proven ability to independently research , ... SUNY standards, and regulatory compliance mandates. + Serve as a senior- level administrator for centralized systems and networks, deploying advanced technologies to… more