- MIT Lincoln Laboratory (Lexington, MA)
- …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
- Lockheed Martin (Eglin AFB, FL)
- …exercises at the National Cyber Range Complex in Eglin AFB FL\. As the Cyber Test Exploitation , you will play a critical role in ensuring the quality and ... **Description:** **WHAT WE'RE DOING** Lockheed Martin, Cyber & Intelligence invites you to step up...following: *Penetration Testing of modern Windows and Linux operating systems and IP based networks\. * Exploit and malware… more
- Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
- …of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out at Aberdeen ... **Overview** Darkblade Systems , an Intrepid Solutions company, is a trusted...other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
- Parsons Corporation (Fort George G Meade, MD)
- …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
- Deloitte (Baltimore, MD)
- Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
- Amentum (Fort Meade, MD)
- …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
- Battelle Memorial Institute (Columbus, OH)
- …with one or more debuggers (WinDbg, OllyDbg, gdb) + Experience with vulnerability research on one or more operating systems : Android, iOS, Windows, Linux, ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and...MacOS, VxWorks, QNX, RTOSs, or other custom operating systems + Knowledge of advanced exploitation techniques… more