for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. You can learn more about our program by accessing the landing page … operating systems. Operating system experience shall be with the identified release or later of any of the following: UNIX, Linux, Windows 7, Windows 10, Windows Server Understanding of network vulnerability analysis and penetration testing with both open-source and commercial tools such as: Nmap, Wireshark, Metasploit, Kali, Burp, etc. Computer hardware and software security analysis including use of commercial … Virtualbox Cloud Computing (i.e. AWS, Azure, Google Cloud, Oracle) Desired: Experience conducting penetration testing and or cyber red team exercises Career experience in exploit dev, malware analysis, digital forensics, vulnerabilityresearch, or web app development/pen testing Career experience working with network technologies such as firewalls, routers, switches Recent experience competing in CTFs or hands-on cyber More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Job Summary Vulnerability Researchers at NightWing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence More ❯
for working on the program and being a part of our team. You'll get paid for cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized certification courses to grow your career. You can learn more about our program by accessing the landing page … operating systems. Operating system experience shall be with the identified release or later of any of the following: UNIX, Linux, Windows 7, Windows 10, Windows Server • Understanding of network vulnerability analysis and penetration testing with both open-source and commercial tools such as: Nmap, Wireshark, Metasploit, Kali, Burp, etc. • Computer hardware and software security analysis including use of commercial … operating systems. Operating system experience shall be with the identified release or later of any of the following: UNIX, Linux, Windows 7, Windows 10, Windows Server • Understanding of network vulnerability analysis and penetration testing with both open-source and commercial tools such as: Nmap, Wireshark, Metasploit, Kali, Burp, etc. • Computer hardware and software security analysis including use of commercial More ❯
business possible. This will be dependent on the kind of role you do and part of the business you work in. About the Candidate An interest and aptitude for vulnerabilityresearch (either from a professional background or by demonstrating an aptitude). A passion for understanding how things work, testing them, pushing them to their limits, and finding More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Vulnerability Researchers at NightWing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence More ❯
STR is hiring a Senior Software Reverse Engineer who has a passion for research and analysis of vulnerabilities in cyber physical systems. Work must be performed onsite. What you'll do: Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems Developing and applying … functionality of target systems Developing innovative cybersecurity solutions Working in multi-discipline teams to tackle challenging problems from a wide variety of technologies to develop innovative cybersecurity solutions Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a variety of challenging targets Documenting, demonstrating, and presenting research Solving real world problems that have an impact on … C/C++, Python, etc. Proficiency in one or more Assembly Languages: x86, ARM, etc. General understanding of reverse engineering fundamentals: memory layout, calling conventions, etc. Nice to haves: Vulnerabilityresearch and analysis Knowledge of weaponizing discovered vulnerabilities into exploits Implant or software patch development Familiarity with binary emulation or vulnerabilityresearch, including tools such as More ❯
a cutting edge growing Cyber Security project that is making a huge impact on the DOD/Intel community? This exciting program includes performing software engineering, reverse engineering, and vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We … enthusiastic to tackle new challenges across the full stack as we continue to push security forward What You'll Be Doing: The ideal candidate will perform Software Engineering and vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Work with customers directly performing full cycle system engineering, gathering requirements and source … code, to technical documentation and specifications. Performing long-term, in-depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation technologies. Engineers are encouraged to be creative and exhaust every technical avenue to uncover weaknesses of the system and exploit them. Performs software development tasks and assists in the design and architecture of software applications individually or as a More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients. Vulnerability Researchers at Nightwing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be able to play both sides of the fence … SCI clearance required Active and transferable U.S. government issued TS/SCI security clearance is required prior to start date. 12+ years of professional experience Experience leading teams performing vulnerabilityresearch and/or CNO capabilities 4 or more of the following desired skills Desired Skills Understanding of OS Internals (i.e. Windows, Linux, Embedded, etc) Extensive Experience with More ❯
to uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you'll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerabilityresearch on complex, real-world targets. Our government customers rely on us to deliver mission-critical security solutions, and we're looking for a Vulnerability Researcher who … Analyze firmware, software protections, and wireless protocols to uncover security flaws. Utilize and develop custom tools to analyze and manipulate software/firmware binaries. Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment. Solve complex technical challenges with no predefined solutions. What You'll Need (Basic Qualifications): Bachelor's (or higher … or equivalent practical experience). Strong experience with C/C++, Python, and Linux command-line tools for debugging, scripting, and reverse engineering tasks. Experience with reverse engineering and vulnerabilityresearch, using tools such as IDA Pro, Binary Ninja, or Ghidra. Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS). Firmware rehosting More ❯
Software Engineer Job Location- Annapolis Junction, MD Overview: Varada Consulting, LLC is seeking a full-time highly skilled Software Engineer with a passion for cyber operations, vulnerabilityresearch, and system exploitation. The ideal candidate will focus on both Offensive Cyber Operations (OCO) and Defensive Cyber Operations (DCO) activities, performing full lifecycle system engineering - from gathering requirements and source … code analysis to technical documentation and customer collaboration. This role involves conducting long-term, in-depth vulnerability assessments using advanced reverse engineering, kernel debugging, and exploitation technologies. Creativity is encouraged as engineers are expected to explore every technical avenue to identify and exploit system weaknesses. In addition to vulnerabilityresearch, the candidate will perform software development tasks … also includes developing production-quality software, improving software development processes, implementing unit and integration tests, and preparing technical reports. Job Duties: • The ideal candidate will perform Software Engineering and vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. • Work with customers directly performing full cycle system engineering, gathering requirements and source More ❯
uncover vulnerabilities in wireless and embedded systems. As part of our elite team of security researchers, you'll work alongside other hardware, software, and network experts, conducting cutting-edge vulnerabilityresearch on complex, real-world targets. Our customers rely on us to deliver mission-critical security solutions, and we're looking for a Senior Software Reverse Engineer who … organized and maintainable. Analyze firmware, software protections, and protocols to uncover security flaws. Utilize and develop custom tools to analyze software/firmware binaries. Collaborate closely with CNO developers, vulnerability researchers, and hardware engineers in a fast-paced, small-team environment. Solve complex technical challenges with no predefined solutions. What You'll Need (Basic Qualifications): Bachelor's (or higher … scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research. Experience with reverse engineering and vulnerabilityresearch, using tools such as IDA Pro, Binary Ninja, or Ghidra. Expertise in one or more of the following: Firmware More ❯
Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and manufacture products and deliver critical services for our clients-whether they are a multi-national corporation, a small start-up or a government agency. We recognize and appreciate the value and contributions of individuals from a wide range of backgrounds and experiences and … Battelle is seeking a Junior Reverse Engineering, Junior Software Engineer in the Chantilly, VA office location. Do you like solving the hardest computing problems in the world, working on research projects you are passionate about, and competitive mini basketball, and bumper pool? Battelle may be the company for you. Battelle Cyber Engineers solve the toughest Computer Science problems in … so our engineers have everything they need to invent new Cyber solutions. Battelle is committed to its employee's professional growth. We encourage new ideas with our large Internal Research and Development (IRAD) program where engineers work on projects, they are passionate about. We have the tools and the mentors you will need to take yourself to the next More ❯
Description • The ideal candidate will perform Software Engineering and vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. • Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications. • Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and More ❯
through intelligence, and support assessments of large-scale weapons systems and other national security operations Duties include, but not limited to: The ideal candidate will perform Software Engineering and vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Work with customers directly performing full cycle system engineering, gathering requirements and source … code, to technical documentation and specifications. Performing long-term, in-depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation technologies. Engineers are encouraged to be creative and exhaust every technical avenue to uncover weaknesses of the system and exploit them. Performs software development tasks and assists in the design and architecture of software applications individually or as a More ❯
to identify and address complex technical challenges. QUALIFICATIONS 1. Strong proficiency in programming languages such as Python, C/C++, and Assembly. Experience with reverse engineering, penetration testing, and vulnerability analysis is preferred. 2. Understanding of networking protocols (TCP/IP, DNS, etc.), operating systems (Linux, Windows), and cyber defense strategies. Familiarity with exploitation frameworks and cybersecurity tools. 3. … Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in vulnerabilityresearch and exploit development BENEFITS That Empower You and Your Family "Your future, your flexibility, your well-being. We invest in you." At Caribou Thunder, we understand that More ❯
to identify and address complex technical challenges. QUALIFICATIONS 1. Strong proficiency in programming languages such as Python, C/C++, and Assembly. Experience with reverse engineering, penetration testing, and vulnerability analysis is preferred. 2. Understanding of networking protocols (TCP/IP, DNS, etc.), operating systems (Linux, Windows), and cyber defense strategies. Familiarity with exploitation frameworks and cybersecurity tools. 3. … Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in vulnerabilityresearch and exploit development BENEFITS That Empower You and Your Family "Your future, your flexibility, your well-being. We invest in you." At Caribou Thunder, we understand that More ❯
to identify and address complex technical challenges. QUALIFICATIONS 1. Strong proficiency in programming languages such as Python, C/C++, and Assembly. Experience with reverse engineering, penetration testing, and vulnerability analysis is preferred. 2. Understanding of networking protocols (TCP/IP, DNS, etc.), operating systems (Linux, Windows), and cyber defense strategies. Familiarity with exploitation frameworks and cybersecurity tools. 3. … Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in vulnerabilityresearch and exploit development BENEFITS That Empower You and Your Family "Your future, your flexibility, your well-being. We invest in you." At Caribou Thunder, we understand that More ❯
Conduct assessments and attacks across various platforms, including Linux, Windows, and macOS. Exploit and manipulate Active Directory environments to assess internal and external threat postures. Perform exploit development and vulnerabilityresearch to identify and validate security flaws. Identify limitations in existing toolsets and develop custom techniques to improve effectiveness and stealth. Script and develop tools in at least More ❯
we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Two Six Technologies is seeking a Principal Vulnerability Researcher with active Top Secret Clearance to join our team in Arlington, Virginia. The team is growing and looking for someone with a reverse engineering and vulnerabilityresearch … talk to you if you actively perform in-depth Linux-based reverse engineering! What you will do: Collaborate with team to align capability development roadmaps and complete transfer of vulnerabilityresearch prototypes into production environments perform reverse engineering and vulnerability analysis, informing operational parameters for complex system Conducting in-depth reverse engineering and vulnerability analysis across … scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research. Experience with reverse engineering and vulnerabilityresearch, using tools such as IDA Pro, Binary Ninja, or Ghidra. Active US Security clearance of Top Secret level and More ❯
Reverse Engineer and Vulnerability Researcher Join our team at Core One! Our mission is to be at the forefront of devising analytical, operational, and technical solutions to our Nation's most complex national security challenges. In order to achieve our mission, Core One values people first! We are committed to recruiting, nurturing, and retaining top talent! We offer a … knowledge. Proficiency with communication and network protocols, hardware bus protocols, and security tools and techniques. If you are enthusiastic about pushing the boundaries of cybersecurity through reverse engineering and vulnerabilityresearch, we encourage you to apply and become a valuable member of our team. Core One is an Equal Opportunity Employer. All qualified applicants will receive consideration for More ❯
management best practices are followed by performers and independent verification and validation entities funded by DARPA. The ideal candidate should possess technical expertise and experience in reverse engineering and vulnerability research. Exemplary candidates will have demonstrated success with learning new subjects and rapidly gaining insights into current and next-generation research and prototyping, preferably with hands-on leadership … of research and development programs in the defense sector. Responsibilities: • Utilize advanced reverse engineering techniques to analyze software, firmware, and hardware for vulnerabilities and potential exploitation vectors. • Develop and execute red teaming engagements, emulating adversary tactics, techniques, and procedures (TTPs) to identify and exploit vulnerabilities in critical systems. • Conduct in-depth vulnerabilityresearch, focusing on emerging threats … concept exploits and tools to demonstrate the impact of identified vulnerabilities and aid in the development of mitigation strategies.• Provide expert technical guidance and recommendations to government stakeholders on vulnerability remediation, secure coding practices, and defensive countermeasures. • Contribute to the development of threat intelligence products, technical reports, and briefings for senior government officials and technical stakeholders. • Stay abreast of More ❯
and data against evolving cyber threats. This role combines technical expertise in both software and hardware to support the design and deployment of defensive cyber measures. The engineer conducts research on current and emerging cyber threats, identifies vulnerabilities, and ensures that development environments and operational systems remain resilient against cyber exploits. This role will support the NRO cyber operations … group or Industrial Control Systems group at each site by working with the Information Security Offices. Primary Responsibilities Research and analyze cyber threat trends, vulnerabilities, and exploits to proactively identify risks to critical mission systems. Design and implement defensive cyber security solutions to protect data, networks, and applications from unauthorized access, modification, or destruction. Perform vulnerability assessments, penetration … experience. Proven experience in application development, using programming and scripting languages such as Python, C/C++, Assembly, or Java. Demonstrated proficiency in both offensive and defensive cybersecurity, including: Vulnerabilityresearch, reverse engineering, and malware analysis Code analysis, code manipulation, and payload development Defensive tool development, threat detection, and incident response Working knowledge of web application vulnerabilityMore ❯
thinking, and treating one another like family. Located in Columbia, Maryland, our small business develops cutting-edge engineering solutions to protect our nation's assets. Our team specializes in vulnerability analysis and research, system emulation, software engineering, reverse engineering, embedded development, and cyber security. We are seeking several Cyber Capability Engineer to join our diverse team of engineers … requirements - Monitor system performance and resource usage, analyze logs, and gather all reportable content - Develop technical specifications, flowcharts, and system diagrams to summarize findings from analysis - Conduct in-depth vulnerabilityresearch and analysis using tools such as Ghidra, BinaryNinja, Metasploit - Document detailed reports on discovered vulnerabilities - Design, develop, and test proof-of-concept cyber capabilities to demonstrate feasibility More ❯
assembly languages (x86, ARM, etc) Expertise in one or more scripting languages (e.g., Python or Ruby) Software development experience in C/C++ Detailed understanding of and experience in VulnerabilityResearch (VR)/Reverse Engineering (RE) Proficiency with disassemblers/debuggers (e.g., IDA Pro, GDB, Windbg) Bachelors degree plus 12 years of technical experience. Additional experience may be More ❯
o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o VulnerabilityResearch • Identify, analyze, and document software vulnerabilities. • Collaborate with team members to develop mitigations and workarounds for discovered vulnerabilities. o System and Network Analysis: • Conduct network traffic analysis … Participate in design and code reviews to ensure adherence to best practices and standards. o Documentation: • Prepare detailed technical documentation and reports, including user guides, system design documents, and vulnerability assessments. • Ensure all documentation is clear, concise, and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o More ❯