• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
    MIT Lincoln Laboratory (12/14/24)
    - Related Jobs
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
    MIT Lincoln Laboratory (12/14/24)
    - Related Jobs
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
    MIT Lincoln Laboratory (12/14/24)
    - Related Jobs
  • Cyber Test Exploitation

    Lockheed Martin (Eglin AFB, FL)
    …exercises at the National Cyber Range Complex in Eglin AFB FL\. As the Cyber Test Exploitation , you will play a critical role in ensuring the quality and ... **Description:** **WHAT WE'RE DOING** Lockheed Martin, Cyber & Intelligence invites you to step up...following: *Penetration Testing of modern Windows and Linux operating systems and IP based networks\. * Exploit and malware… more
    Lockheed Martin (01/15/25)
    - Related Jobs
  • Cyber Exploitation Specialist

    Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
    …of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out at Aberdeen ... **Overview** Darkblade Systems , an Intrepid Solutions company, is a trusted...other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and… more
    Intrepid Solutions and Services (11/28/24)
    - Related Jobs
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
    MIT Lincoln Laboratory (01/17/25)
    - Related Jobs
  • Sr. Exploitation Vulnerability SME

    Parsons Corporation (Fort George G Meade, MD)
    …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
    Parsons Corporation (12/03/24)
    - Related Jobs
  • Exploitation Analyst

    Deloitte (Baltimore, MD)
    Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
    Deloitte (12/31/24)
    - Related Jobs
  • Digital Network Exploitation Analyst 1-4…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
    Amentum (12/28/24)
    - Related Jobs
  • Junior Vulnerability Researcher

    Battelle Memorial Institute (Columbus, OH)
    …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more
    Battelle Memorial Institute (01/28/25)
    - Related Jobs