- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... you join our team as a Cyber System Exploitation Researcher , you'll be contributing to the development of cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Sandia National Laboratories (Albuquerque, NM)
- …or more of the following: vulnerability research , system vulnerability assessments, high consequence high trust systems, mobile systems, embedded ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...engage in work across the technology spectrum including embedded, mobile , desktop, enterprise, and cloud systems, as well as… more
- Sandia National Laboratories (Albuquerque, NM)
- …or more of the following: vulnerability research , system vulnerability assessment high consequence high trust systems, mobile systems, embedded systems, ... co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and...engage in work across the technology spectrum including embedded, mobile , desktop, enterprise, and cloud systems, as well as… more
- CACI International (Aberdeen Proving Ground, MD)
- Threat Researcher Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... * * * CACI is looking for an Threat Researcher to join our exploitation team at Aberdeen Proving...those provide by NIST and CNSS + Experience performing vulnerability assessments + Experience with using Linux for exploitation… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- Guidehouse (Arlington, VA)
- …to include endpoints, mobile devices, cloud infrastructure, and more. + Research new vulnerability capabilities and recommend solutions that can be employed ... **:** Ability to Obtain Public Trust Support maturing and improving vulnerability management processes. Provide technical expertise and assist with the establishment… more