• Grp 59 - Cyber System

    MIT Lincoln Laboratory (Lexington, MA)
    …is considered essential to the success of their missions. Position Description Grp 59 - Cyber System Exploitation CO-OP (July-December, 2024) As a Cyber ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
    MIT Lincoln Laboratory (05/08/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …US Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation...team as a Cyber System Exploitation Researcher , you'll be… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • Grp 59 - Cyber System

    MIT Lincoln Laboratory (Lexington, MA)
    …our US Government sponsors is considered essential to the success of their missions. As a Cyber System Exploitation Co-Op, you will work with a team of ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop… more
    MIT Lincoln Laboratory (05/08/24)
    - Save Job - Related Jobs - Block Source
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop ... cyber operations, from the reverse engineering and exploitation of software and hardware systems to...matter expertise to operational planners. Your main areas of research will include cyber tool prototyping, technical… more
    MIT Lincoln Laboratory (04/10/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Test Exploitation Sr

    Lockheed Martin (Fort Worth, TX)
    …equipment with business area administrators * Leading and conducting white hat exploitation and penetration testing, research , and development to support the ... Perl, Ruby, Bash, Grep/Sed/Awk, etc\) including work on offensive cyber tools * of Operating System knowledge...experience in various Windows and Linux, OS configuration, file system structures, OS components, mobile operating systems more
    Lockheed Martin (06/01/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Test Exploitation Developer

    Adapt Forward (North Charleston, SC)
    …software, hardware procurement and classified development necessary to execute test cases for cyber events of DoD Systems . The selected candidate will also ... support penetration testing, event development and mission based cyber risk assessments for DoD systems . Qualifications: * US Citizen * TS with SCI Clearance… more
    Adapt Forward (03/07/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Software Engineer Sr (Embedded…

    Lockheed Martin (Grand Prairie, TX)
    …in a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system engineers ... and the ability to work with Cyber Exploitation Engineers, Cyber System Security...solutions and tools based on mission requirements * Embedded Systems knowledge to conduct research to evaluate… more
    Lockheed Martin (05/16/24)
    - Save Job - Related Jobs - Block Source
  • Lead Cyber Operations Infrastructure…

    The MITRE Corporation (Bedford, MA)
    …Summary: Do you have a Cyber Warfare Operations background or Cyber / Digital Network Exploitation Analyst and an interest in Operational Technology ... coupled with significant experience in critical infrastructure environments. + Offensive Cyber Operations: Conduct research and development of innovative … more
    The MITRE Corporation (05/20/24)
    - Save Job - Related Jobs - Block Source
  • Senior SIGINT & Cyber Analyst

    CACI International (Fort Meade, MD)
    …a bridging infrastructure between SIGINT/ CYBER and SOCOM entities, merging SIGINT/ CYBER systems capabilities and the integration of new systems ... Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation more
    CACI International (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Detection Engineer

    Leidos (Ashburn, VA)
    …(Certified Professional) + OSCE (Certified Expert) + OSWP (Wireless Professional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional + ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (05/29/24)
    - Save Job - Related Jobs - Block Source
  • Cyber Countermeasures Engineer

    Leidos (Ashburn, VA)
    …OSCP (CertifiedProfessional) + OSCE (Certified Expert) + OSWP (WirelessProfessional) + OSEE ( Exploitation Expert) + CCFP - Certified Cyber Forensics Professional ... a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective… more
    Leidos (04/02/24)
    - Save Job - Related Jobs - Block Source
  • FAST Labs Technology Development Director - RF…

    BAE Systems (Merrimack, NH)
    …will drive disruptive RF Exploitation Solutions technologies and capabilities from research and development efforts into BAE Systems Business Areas products ... aerospace and defense industry s most difficult problems. Through research and development (R&D) programs funded by science and...the areas of RF electronic warfare, advanced electronics and cyber . BAE Systems FAST Labs - RF,… more
    BAE Systems (03/03/24)
    - Save Job - Related Jobs - Block Source
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …technology development thrusts include unconventional methods of system exploitation , testbed development and introspection, and gaining cyber intelligence ... common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work… more
    MIT Lincoln Laboratory (04/17/24)
    - Save Job - Related Jobs - Block Source
  • IT Cybersecurity Specialist (Infosec) (Title 32)

    Air National Guard Units (Oklahoma City, OK)
    …the better techniques needed to secure computer systems and to protect cyber key terrains from exploitation of information within these cyberspace systems ... to the security posture by attending courses, conferences, seminars, online research , and information sharing between other Cyber Security/Information Security… more
    Air National Guard Units (05/23/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analyst

    BlueHalo, LLC (Annapolis Junction, MD)
    …career. You'd like to do this + Conduct in-depth target analysis and research + Develop innovative tradecraft, exploitation techniques, and concepts of operation ... make this impact now. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As...is required You could also have this: + Open-source research background + Experience using learning management systems more
    BlueHalo, LLC (04/11/24)
    - Save Job - Related Jobs - Block Source
  • Computer Network Exploitation Analyst

    BigBear.ai (Columbia, MD)
    …and technical expertise to understand information found in SIGINT and cybersecurity systems and facilitate the exploitation of digital networks. Working closely ... mission forward. What you will do Conduct in-depth target analysis and research . Develop innovative tradecraft, exploitation techniques, and concepts of… more
    BigBear.ai (05/10/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst

    CACI International (Chantilly, VA)
    …analysis and reverse engineering in support of incident response, investigative analysis, and research on existing and emerging cyber threats. You will support ... Digital Network Exploitation Analyst Job Category: Engineering Time Type: Full...to stretch your skills and knowledge in the Offensive Cyber domain? You will get to work with an… more
    CACI International (05/25/24)
    - Save Job - Related Jobs - Block Source
  • Senior Security Intel Engineer, Vulnerability…

    Amazon (Arlington, VA)
    …is seeking an innovative Senior Security Intel Engineer to join the Vulnerability and Exploitation Threat Intelligence (VEX TI) team as a part of Amazon Cyber ... and report timely, accurate, and actionable threat intelligence. ACTI delivers cyber threat intelligence to Amazon and AWS leadership, service teams, partners,… more
    Amazon (04/30/24)
    - Save Job - Related Jobs - Block Source
  • Digital Network Exploitation Analyst…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... Amentum is seeking multiple Digital Network Exploitation Analyst (DNEA) to perform technical analysis of metadata and content to ensure target continuity, to… more
    Amentum (03/31/24)
    - Save Job - Related Jobs - Block Source
  • Senior Data Scientist 3 - AI-Enabled Signal…

    Pacific Northwest National Laboratory (Richland, WA)
    …to sophisticated technologies and materials, the threats grow more dynamic and complex-from cyber and nuclear to chemical and biological weapons of mass effect and ... algorithms, and tools-are enabling stronger, more resilient technologies and systems to safeguard national security. Coupled with decades of...Do you want to create a legacy of meaningful research for the greater good? Do you want to… more
    Pacific Northwest National Laboratory (05/26/24)
    - Save Job - Related Jobs - Block Source