- MIT Lincoln Laboratory (Fort Meade, MD)
- …success of their missions. Position Description When you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...the defense of our nation. Your main areas of research will include cyber tool prototyping and… more
- Amentum (Fort Belvoir, VA)
- **Senior TTP Red Cyber Researcher ** This position is located at Ft Belvoir VA at the Defense Threat Reduction Agency as part of Advanced Red Cyber Team ... of researching, identifying, and creatively thinking about novel TTPs that can be integrated into Defense Threat Reduction Agency (DTRA) Cyber Assessment Red… more
- Applied Research Solutions (Dayton, OH)
- **Description** Applied Research Solutions is seeking a full-time Cyber Security Engineer, located at Wright-Patterson AFB, OH support the ISR Crosscutter ... program. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider...(ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology… more
- Southern California Edison (Rosemead, CA)
- **Join the Clean Energy Revolution** Become a Cyber Security Threat Hunt, Senior Specialist at Southern California Edison (SCE) and build a better tomorrow. In this ... job, you'll be a part of the Cyber Threat Hunt and Intelligence team, a sub-team under...will be primarily responsible for not only conducting continuous research on emerging threats and threat actor activity but… more
- Applied Research Solutions (Bedford, MA)
- **Description** Applied Research Solutions is seeking candidates with an advanced cybersecurity skill set for a System Cybersecurity Principal position located at ... Hanscom AFB, in Bedford, Massachusetts. Why Work with us? Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated … more
- Precise Systems, Inc. (Crane, IN)
- …systems. This SW may provide any range of RF capabilities (C-sUAS, EMW, Cyber , SIGINT, etc.) or analytical tools supporting exploitation of the electromagnetic ... with solutions in Digital Transformation, Advanced Engineering, Physical Sciences Research , Platform Lifecycle Support, and Technical Services. Since our… more
- Northrop Grumman (Gilbert, AZ)
- …can help us keep building on our wide portfolio of secure, affordable, integrated , and multi-domain systems and technologies that fuel those missions. By joining in ... work of your career. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide...and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are… more
- Northrop Grumman (Edwards AFB, CA)
- …can help us keep building on our wide portfolio of secure, affordable, integrated , and multi-domain systems and technologies that fuel those missions. By joining in ... work of your career. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide...and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are… more
- Northrop Grumman (Melbourne, FL)
- …can help us keep building on our wide portfolio of secure, affordable, integrated , and multi-domain systems and technologies that fuel those missions. By joining in ... work of your career. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide...and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are… more
- Northrop Grumman (Baltimore, MD)
- …can help us keep building on our wide portfolio of secure, affordable, integrated , and multi-domain systems and technologies that fuel those missions. By joining in ... work of your career. **Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from a wide...and the whole security realm of offense, defense, and exploitation . Thought leadership demands nothing less. If you are… more