full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … file-system artifacts (browser histories, account usage and USB histories, etc.) - Creating forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis - Performing all-source research for similar or related network events or incidents. Required Skills: - U.S. Citizenship - Must have an active TS/SCI clearance - Must be able to obtain DHS Suitability - 2+ years More ❯
Columbia, MD Clearance & Citizenship Requirements: - TS/SCI with polygraph is required - Due to these clearance requirements, US citizenship is also required Responsibilities Include: - Perform traditional System Engineering and Vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities - Activities are focused on analyzing large-scale weapon systems, breaking the systems down … of security requirements and capabilities - Familiarity with weapons system/space-based systems/embedded systems/tactical networks development, sustainment, and security operations is a plus - Experience in vulnerability discovery, and analysis tools, fuzzing tools, and dynamic system analysis Application Process: - All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or national More ❯
supporting development on or analysis of Mobile devices • Strong proficiency in C programming • Experience doing reverse engineering on diverse architectures It would be great if candidates had: • Experience with vulnerabilityresearch Clearance: • TS/SCI clearance with FS polygraph is required. InterImage Benefit Snapshot: • 401K: up to 3% discretionary profit sharing contribution + 100% match on the 1st More ❯
providing a decisive advantage to the warfighter. Come be a part of our mission! Northrop Grumman Mission Systems is seeking a Software Engineer or Principal Software Engineer: Vuln erability Research - Reverse Engineering to join our team in San Antonio, Texas, where you'll get to lead the development of solutions to national security threats with products that may involve … kernel development, reverse engineering or vulnerabilityresearch of network and communication systems. Essential Functions: Designs, develops, documents, tests and debugs low level software and systems that contain logical solutions. Conducts multidisciplinary research and collaborates with equipment designers and/or hardware engineers in the planning, design, development, and utilization of electronic data processing systems for product and … be substituted in lieu of a degree. US Citizenship with active DoD Secret clearance and ability to obtain and maintain a Top-Secret clearance Experience in reverse engineering or vulnerability analysis. Demonstrated software programming experience in C/C++. Familiarity with disassemblers such as IDA Pro, BinaryNinja, or others. Preferred Qualifications: Understanding of secure/insecure programming concepts (format More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Solution Architect, you will work with business development and other subject matter experts to develop optimal and differentiated Leidos solutions to be delivered on programs, in proposals, or on research and development projects. In addition to developing solutions, you will help prospective customers and partners understand the value and benefits of the Leidos solution, explain technical features and transformation …/proposals •Leverage Technical expertise to help drive technology innovation proposed solutions, R&D, and into customer mission space. •Enhance Leidos best practices, lessons learned, and technological approaches to research, design, and develop innovative solutions to support operational missions •Partner with the Business Development team to support new business strategies, including the development of technical solutions, basis of estimates … Cybersecurity, Artificial Intelligence (AI), Machine Learning (ML), Deep Learning, communications, signals intelligence, cloud and IT infrastructure. •Experience in cybersecurity processes operational environments to include areas of cyber network defense, vulnerabilityresearch, threat analysis, threat hunting, systems security architecture and design. •Prior experience as lead SA on a proposal •Experience having worked successful partnerships with suppliers on proposals •Understanding More ❯
and maintains full spectrum cyber solutions Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations Provides DevOps solutions enabling software quality assurance for vulnerabilityresearch, reverse engineering, penetration testing (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements The ideal candidate will possess the following More ❯
be part of a cutting edge growing Cyber Security project making a huge impact on the DOD/Intel community? This exciting role includes performing traditional System Engineering and Vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support assessments of large scale weapons systems and other national security operations! Work … with DoD tactical networking Experience with Systems Theoretic Process Analysis (STPA) or similar process Knowledge of hardware, software, supply chain, systems vulnerabilities, anti-tamper and exploitation approaches Experience in vulnerability discovery, and analysis tools, fuzzing tools, and dynamic system analysis Relevant Certification: DAWIA Level 3 SPRD&E - any specialty Security Clearance Requirement: An active Top Secret SCI w/ More ❯
red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. - Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerabilityresearch, or software exploit development. - 3-5 years development industry experience. - Experience in the development of Windows kernel modules. - Strong familiarity with Windows Active Directory. - Experience developing exploits More ❯
Support mission and training events by creating new technical and non-technical solutions using an interdisciplinary approach to actively, and passively expose and exploit information system vulnerabilities. Exploitation and vulnerabilityresearch, tool design and development (software/application/scripting/coding), support of Red Team operations, test lab configuration and administration, and other duties as assigned. Experience More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … Drafting summaries of ongoing operations and be able to provide oral presentations for various levels of leadership. - Maintaining knowledge objects in system of record consistently and professionally. - Threat and vulnerability management to recognize and categorize types of vulnerabilities, threat actors, and different operational threat environments, and associated attacks (MITRE ATT&CK framework). - Knowledgeable of network security monitoring and More ❯
hungry to support an amazing mission, work as a team to leverage your skills to make a difference, and learn from/collaborate with our existing embedded development/vulnerabilityresearch (VR)/RE subject matter experts, we have the perfect position for you to help start a new stage of your career at Parsons! You'll get … experience with a Master's) Experience supporting development on or analysis of mobile devices E xperience with Reverse Engineering Experience with C programming language Desired Qualifications: E xperience with VulnerabilityResearch Security Clearance Requirement: An active Top Secret SCI w/Polygraph security clearance is required for this position. This position is part of our Federal Solutions team. More ❯
is an experienced career opportunity to contribute to a cutting-edge cybersecurity project that significantly impacts the DOD/Intel community. You will engage in traditional systems engineering and vulnerabilityresearch, with a focus on Offensive Cyber Operations (OCO) and Defensive Cyber Operations (DCO), supporting assessments of large-scale weapons systems and critical national security operations. Responsibilities of … the Systems Engineer IV: Conduct cybersecurity assessments of large-scale DOD systems, utilizing an OCO mindset to execute DCO activities. Perform in-depth, long-term vulnerability assessments, applying systems engineering principles and analyzing available information, including architecture diagrams, build specifications, design documentation, and systems architecture. Execute independent verification and validation of security requirements and capabilities, integrating systems resiliency and More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … and commercial markets. Job Summary: Nightwing is seeking a highly motivated and experienced Civil/Structural Engineer to join our research & development and mission support program. This is an exceptional opportunity for a skilled and experienced engineer to join a highly talented muti-disciplinary team and contribute to cutting-edge technological advancements to an impactful program. Job Duties: As … a Structural Engineer at Nightwing, you will join a multidisciplinary team engaged in research and development and mission support. The core of this role centers on conducting structural analyses and generating detailed designs, collaborating closely with civil, mechanical, and electrical engineering professionals to produce effective solutions. This position requires working with a range of materials, including composites, coordinating and More ❯
healthcare (including family), 6 weeks PTO/holidays, 8% 401k, and more. If you are fully-cleared and work in Software Engineering, Data Science, Cyber/CNO/CNE, VulnerabilityResearch, or Cloud/Systems Infrastructure projects, our client likely has multiple efforts that would interest you. They are seeking a Software Engineer to join their team. Relevant More ❯
business possible. This will be dependent on the kind of role you do and part of the business you work in. About the Candidate An interest and aptitude for vulnerabilityresearch (either from a professional background or by demonstrating an aptitude). A ... More ❯
business possible. This will be dependent on the kind of role you do and part of the business you work in. About the Candidate An interest and aptitude for vulnerabilityresearch (either from a professional background or by demonstrating an aptitude) click apply for full job details More ❯
to apply quickly in order to maximise your chances of being considered for an interview Read the complete job description below. About the Candidate An interest and aptitude for vulnerabilityresearch (either from a professional background or by demonstrating an aptitude). A ... JBLK1_UKTJ More ❯
systems engineering expertise and technical program management to support the DARPA and U.S. Cyber Command program interests, ensuring alignment with the mission to accelerate delivery of cyber technologies from research to operational use. Cross-Agency Collaboration : Coordinate among DARPA, U.S. Cyber Command, and the Orion Consortium to facilitate seamless collaboration between research teams and operational users for joint … B.S. at minimum in computer science, computer engineering, systems engineering or related field. Experience working in cyber operations, cyber/systems security, system integration, software development, and/or vulnerability research. Experience working with U.S. Cyber Command and experience and knowledge working with various Service Cyber Components (i.e., ARCYBER, AFCYBER, MARFORCYBER, FLTCYBER) is a plus. Knowledge and experience working … adapt to changing priorities and handle multiple tasks simultaneously. Deeply embraces and understands the "SETA mentality" of keeping programs progressing, working within an agency like DARPA, and communicating among research teams and transition partners. TS/SCI highly preferred. CLEARANCE: Top Secret clearance or higher (must have a current TS and be SCI-eligible at a minimum More ❯
risks by partnering with service teams. Perform design review, threat modeling, security review, penetration testing, and red teaming on production systems for our services. Scope and perform penetration testing & vulnerabilityresearch of complex proprietary software and hardware for our services. Work closely with the Amazon Security teams to develop large scale, cutting edge, testing, monitoring, remediation, and analytics More ❯
for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. You can learn more about our program by accessing the landing page … network with other technical and operational elements. Desired : • Government certification or equivalent experience recognized by client. • Prior experience working with client mission partners. • Software engineering background or familiarity with vulnerability research. • Self-motivated, creative problem solver. • Can handle working multiple projects at once, with minimal guidance. • Extensive travel experience O/CONUS in support of operations. - What You Can More ❯