- GliaCell Technologies (Annapolis Junction, MD)
- Are you a Mobile Vulnerability Researcher who...You will be working on a new team performing vulnerability research against mobile technologies. ... amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher on one...You must be familiar with the latest techniques in vulnerability research and demonstrate your ability to… more
- MIT Lincoln Laboratory (Lexington, MA)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... success of their missions. Job Description Cyber System Exploitation Researcher When you join our team as a Cyber...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- MIT Lincoln Laboratory (Fort Meade, MD)
- The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... System Internals + Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment + Statistics and… more
- ARSIEM (Annapolis Junction, MD)
- …research against mobile technologies. + Know the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The ... you work with. ARSIEM is currently looking for a Mobile Security Researcher . The position will...candidate must be extremely detail oriented when + Document research with detail. + Write code in C, Python,… more
- Leidos (Columbia, MD)
- …below. **5G Core Experience:** + Operating a multi-site 5G system and supporting Vulnerability Research and Operations + Experience setting up, configuring, and ... Analytics Business Area (CABA) is seeking an enthusiastic Cyber Researcher & Developer to join a diverse team of...and firewalls * Researching 5G network slicing implementation and vulnerability research * Utilization of RF Testing,… more
- MIT Lincoln Laboratory (Lexington, MA)
- …The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation. We develop ... the defense of our nation. Your main areas of research will include cyber tool prototyping and technical analysis...+ Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More + Vulnerability Assessment… more
- Centene Corporation (Raleigh, NC)
- …on workplace flexibility. **Position Purpose:** Leads the organization's vulnerability management infrastructure and processes. Works with key stakeholders ... of vulnerabilities. Identifies systemic security issues based on the analysis of vulnerability and configuration data. Performs impact and risk assessments based on … more
- Palo Alto Networks (San Francisco, CA)
- …teams or as a security analyst + Experience contributing to public vulnerability research , submitting CVEs or creating proof-of-concept exploits **The Team** ... Learning team on AI focused projects focused on scalability and quality. We conduct vulnerability research on both known and emerging exploits, ensuring we stay… more
- MIT Lincoln Laboratory (Lexington, MA)
- …using various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile , or advanced computing systems + ... affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena… more
- Moses/Weitzman Health System (Middletown, CT)
- …determinants of health like housing insecurity, food insecurity, and economic vulnerability . + Coordinate equipment transports with CHC Facilities department as ... poor and diverse populations, and is home to programs focusing on education, research , and process improvement support for safety net providers. The system delivers… more