- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... In lieu of a Bachelor's degree, an additional four ( 4 ) years of experience with a high school diploma/GED...role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... and achieving required risk management objectives for the organization Qualifications: Four ( 4 ) years of experience as an IT Risk Assessor, System Security Engineer,… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... its principles. In lieu of a Bachelor's degree, four ( 4 ) additional years of Functional Analyst experience may be...role form the foundation of our compensation structure. Market Research and Industry Benchmarks : We conduct regular analysis… more
- Columbia Technology Partners (Annapolis Junction, MD)
- …security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our ... a wide range of audiences Coordinate layout and design of documents Research highly technical subject matter, organize information from multiples sources, and… more
- ARSIEM (Annapolis Junction, MD)
- …to have an impact on every client you work with. ARSIEM is currently looking for a Mobile System Researcher 4 . The position will support one of our ... Government clients in Annapolis Junction, MD. Responsibilities + Perform vulnerability research into mobile technologies....developers + + Labor Category Requirements - CNO Analyst/Programmer 4 + Minimum sixteen (16) years of experience in… more
- BigBear.ai (Annapolis Junction, MD)
- …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... with cross-functional teams of analysts, operators, dataflow experts, and mobile engineers to modernize systems while building scalable, automated...experience, plus a BS in a technical discipline or 4 additional yrs. in place of BS + Clearance:… more
- University of Michigan (Ann Arbor, MI)
- Research Data Security Analyst Intermediate Apply Now **How to Apply** A cover letter and resume are important submissions for the hiring team to get a sense of your ... University of Michigan has an exciting opportunity for a Research Data Security Analyst Intermediate to join the IT...website: http://its.umich.edu/ Positions that are eligible for hybrid or mobile /remote work mode are at the discretion of the… more
- Medtronic (Mounds View, MN)
- …everything we do. In-person exchanges are invaluable to our work. We are working onsite 4 days per week as part of our commitment to fostering a culture of ... customer requirement tracking. + Oversee security monitoring, incident response, vulnerability assessments, mitigation implementation, and product-level intrusion detection activities.… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- Meta (New York, NY)
- …learning, automation, and intelligent systems to revolutionize how we approach vulnerability research and secure software development. Product Security Engineers ... wide range of projects in PHP, Python, Perl, Ruby, etc. Mobile Security: focused on securing an ecosystem of ...to scale security consistently across all products. 3. AI-Assisted Research and Mitigation: research , develop, and apply… more
- Meta (Bellevue, WA)
- …Security Engineer, Intern Responsibilities: 1. Perform security assessments consisting of vulnerability research and exploitation against both the unique systems ... source code review, fuzzing and/or analysis, reverse engineering, exploit development and/or vulnerability research 9. Familiarity of the attack lifecycle, and… more
- Medtronic (Minneapolis, MN)
- …of Material (SBOM) development and maintenance for the purposes of vulnerability monitoring. + Possess an understanding of non-probabilistic scoring methodologies ... for security threats like common vulnerability scoring system (CVSS) and apply appropriately. + Document...invaluable to our work. We're working a minimum of ** 4 ** days a week onsite as part of our… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Bank of America (Seattle, WA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... methods to evolving and emerging threats. Key responsibilities include performing research , understanding the bank's security policies, working with the appropriate… more
- United Airlines (Chicago, IL)
- …by evaluating business strategies, pain points, and use cases + Plan, research , and design robust cybersecurity architectures for any IT project + Regularly ... security techniques and tools like content filtering, application firewalls, vulnerability scanners, EDR, forensics software, incident response, SIEM, SOAR, NAC,… more
- Palo Alto Networks (Fort Meade, MD)
- …**Your Impact** + Assist in development of internal infrastructure design for research , development, and testing focused on offensive security + Conducts periodic ... engineering support for the sustainment of information technology systems ( mobile application testing, penetration testing, application, security, and hardware… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply ... perform discovery and target technology analysis of digital network and mobile communications. Digital Network Exploitation Analysts are hired into positions… more
- MUFG (Tempe, AZ)
- …**The working hours for this role in the will be 3pm - 1am EST 4 days per week (Sunday-Wednesday)** **Job Summary** In this role you will focus on researching ... programs throughout multiple environments. You will perform analysis based on this research to determine the risk to the organization and take appropriate actions… more
- Meta (Santa Fe, NM)
- …be relied upon to provide engineering and product teams with the web, mobile , or native code security expertise necessary to make informed product decisions. Come ... to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4 . BS or MS in Computer Science or a related field, or… more