• Mobile Vulnerability

    GliaCell Technologies (Annapolis Junction, MD)
    Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
    GliaCell Technologies (01/01/25)
    - Related Jobs
  • Cyber Systems Exploitation Researcher

    MIT Lincoln Laboratory (Lexington, MA)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/14/24)
    - Related Jobs
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (12/14/24)
    - Related Jobs
  • Integrated Cyber Exploitation Researcher

    MIT Lincoln Laboratory (Fort Meade, MD)
    The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
    MIT Lincoln Laboratory (12/14/24)
    - Related Jobs
  • Mobile Security Researcher 4

    ARSIEM (Annapolis Junction, MD)
    research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
    ARSIEM (01/28/25)
    - Related Jobs
  • Cybersecurity Researcher - In the Cyber…

    Sandia National Laboratories (Albuquerque, NM)
    …or more of the following: vulnerability research , system vulnerability assessments, high consequence high trust systems, mobile systems, embedded ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...engage in work across the technology spectrum including embedded, mobile , desktop, enterprise, and cloud systems, as well as… more
    Sandia National Laboratories (02/05/25)
    - Related Jobs
  • Early Career Cybersecurity Researcher -…

    Sandia National Laboratories (Albuquerque, NM)
    …or more of the following: vulnerability research , system vulnerability assessment high consequence high trust systems, mobile systems, embedded systems, ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...engage in work across the technology spectrum including embedded, mobile , desktop, enterprise, and cloud systems, as well as… more
    Sandia National Laboratories (01/31/25)
    - Related Jobs
  • Threat Researcher

    CACI International (Aberdeen Proving Ground, MD)
    Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
    CACI International (11/23/24)
    - Related Jobs
  • Group 59--Summer Research Program (Cyber…

    MIT Lincoln Laboratory (Lexington, MA)
    …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
    MIT Lincoln Laboratory (11/12/24)
    - Related Jobs
  • Vulnerability Management Specialist…

    Guidehouse (Arlington, VA)
    …to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be employed ... **:** Ability to Obtain Public Trust Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the establishment… more
    Guidehouse (01/09/25)
    - Related Jobs