• Cyber Systems Exploitation

    MIT Lincoln Laboratory (Lexington, MA)
    …Government sponsors is considered essential to the success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as ... Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We...a Cyber System Exploitation Researcher , you'll be leading the development… more
    MIT Lincoln Laboratory (10/16/24)
    - Related Jobs
  • Integrated Cyber Exploitation

    MIT Lincoln Laboratory (Fort Meade, MD)
    …lifecycle of offensive cyber operations, from the reverse engineering and exploitation of software and hardware systems to providing technical subject matter ... System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and… more
    MIT Lincoln Laboratory (10/08/24)
    - Related Jobs
  • CO-OP Student ( Cyber System…

    MIT Lincoln Laboratory (Lexington, MA)
    … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... our operational partners in the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems can be corrected,… more
    MIT Lincoln Laboratory (09/12/24)
    - Related Jobs
  • Cyber Exploitation Specialist

    Intrepid Solutions and Services (Aberdeen Proving Ground, MD)
    …of new and emerging technologies. We're seeking an early to mid-level career Cyber Exploitation Specialist to support our Customer's mission out at Aberdeen ... **Overview** Darkblade Systems , an Intrepid Solutions company, is a trusted...other emerging technologies. + Areas of technical interest include cyber vulnerability assessment, hardware and software reverse engineering, and… more
    Intrepid Solutions and Services (08/29/24)
    - Related Jobs
  • CO-OP Student ( Cyber System…

    MIT Lincoln Laboratory (Lexington, MA)
    … System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation . We develop and ... the US government. We look for, find, and demonstrate cyber vulnerabilities so that vulnerabilities in US systems...essential to the success of their missions. As a Cyber System Exploitation Co-Op, you will work… more
    MIT Lincoln Laboratory (09/12/24)
    - Related Jobs
  • Sr. Exploitation Vulnerability SME

    Parsons Corporation (Fort George G Meade, MD)
    …efforts. + Mentor junior team members and develop and deliver training programs on exploitation and offensive cyber techniques. + Assist in the analysis of ... of 10 years of industry experience with 3 years of experience in offensive cyber operations, exploitation , and or a related field. + In-depth knowledge of… more
    Parsons Corporation (08/27/24)
    - Related Jobs
  • Reverse Engineer and Vulnerability…

    MIT Lincoln Laboratory (Lexington, MA)
    …have one thing in common: they interface the digital and physical domains. The Cyber -Physical Systems Group conducts research to understand the cybersecurity ... Researcher , you will develop novel capabilities against cyber -physical systems . The scope of your work... systems . The scope of your work in cyber -physical research and development will include demonstrating… more
    MIT Lincoln Laboratory (10/19/24)
    - Related Jobs
  • Exploitation Analyst

    Deloitte (Baltimore, MD)
    Are you looking to elevate your cyber career? Your technical skills? Your opportunity for growth? Deloitte's Government and Public Services Cyber Practice (GPS ... Practice) is the place for you! Our GPS Cyber Practice helps organizations create a cyber ...and elevate your career. Work you'll do Seeking an Exploitation Analyst to support in intelligence functions, analytics, and… more
    Deloitte (10/02/24)
    - Related Jobs
  • SIGINT Analyst (Digital Network…

    CACI International (Fort Bragg, NC)
    …Group; Defense Strategic Debriefing Course; SOCOM SIGINT Operators Course + Any Cyber PDSI Work Role or Equivalent: Exploitation Analyst; Exploitation ... Analyst; Digital Network Exploitation Analyst; Cyberspace Operator; Expeditionary Cyber Operator; Cyber Capability Developer; Analytic Support Officer -… more
    CACI International (08/27/24)
    - Related Jobs
  • Digital Network Exploitation Analyst 1-4…

    Amentum (Fort Meade, MD)
    …(eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and ... (eg, Telecommunications, Computer Science, Engineering, Mathematics, Physics, Computer Forensics, Cyber Security, IT, or Information Systems , Networking and… more
    Amentum (09/28/24)
    - Related Jobs