Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
benefits, and our $25,000 referral program. THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
Description The DarkStar Group, a GRVTY Company is seeking a Mobile Vulnerability Researcher with a TS/SCI + Poly clearance (applicable to this customer) to join one of our top projects in Annapolis Junction, MD. Below is an overview of the project, as well as information on our company, our benefits, and our $25,000 referral program. THE … PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is some of the most impactful work in the … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for computer security Scope and execute security assessments and vulnerabilityresearch Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses Collaborate with engineering teams … Electrical Engineering) 15+ years of relevant experience in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerabilityresearch and exploit development – leading groups of 5 -10 engineers past experience required Understanding of operating systems, CPU instruction sets and their associated security designs Understanding of exploit … e.g. IDA Pro/Ghidra/Frida) Fuzzing (e.g. Jazzer/AFL/Peach) Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proven experience with security research including any published CVEs Experience developing proof of concept exploits bypassing modern exploit mitigations Active participant or organiser of Capture The Flag competitions Knowledge of common vulnerabilities in different More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
Are you a passionate security researcher with experience assessing large, complex software products? We are looking for talented individuals who are excited about security research and developing creative solutions for some of Oracle’s most critical customers. Finding and combining bugs to create new attacks is essential in this role. Who We Are We are a world-class team … writing a fuzzer for an undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerabilityresearch across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools … one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability management, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Job … We distribute our system as a cloud native application that runs on AWS as well as self-managed clouds for on-prem and offline deployments. Our solutions for automating vulnerability discovery and remediation leverages best-of-art techniques built on modern open source software and numerous KUDU proprietary technologies. We are looking for a Software Engineer with strong backend … operations support. While the position focuses on backend services, familiarity with frontend development is beneficial. You will collaborate with various teams, including R&D specialists in reverse engineering and vulnerabilityresearch, to ensure the platform effectively integrates novel analysis techniques. Responsibilities: Software Development: Design, implement, and maintain scalable backend microservices, primarily in Python Develop and integrate REST APIs More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Job … We distribute our system as a cloud native application that runs on AWS as well as self-managed clouds for on-prem and offline deployments. Our solutions for automating vulnerability discovery and remediation leverages best-of-art techniques built on modern open source software and numerous KUDU proprietary technologies. We are looking for a Software Engineer with strong backend … operations support. While the position focuses on backend services, familiarity with frontend development is beneficial. You will collaborate with various teams, including R&D specialists in reverse engineering and vulnerabilityresearch, to ensure the platform effectively integrates novel analysis techniques. Responsibilities: Software Development: Design, implement, and maintain scalable backend microservices, primarily in Python Develop and integrate REST APIs More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
benefits, and our $25,000 referral program. THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we … candidate will be working independently as a Software Researcher to identify flaws in software and software architecture design. Additionally, the candidate must be familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices. The candidate must be extremely detail oriented when documenting their research. Often, the candidate will be required to write More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … of hardware front ends for observing and generating real-world signals Nice-to-have Qualifications: Software development experience in Python and/or C/C++ Knowledge of software vulnerability classes, vulnerabilityresearch technique Experience with hardware or software reverse engineering Experience with real-time embedded systems Benefits We Provide Equity at a company that is doing More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
From Day One, you will be launched into a realm of thrilling new challenges where you'll be able to leverage your knowledge of OS security features, reverse engineering, vulnerability analysis, networking, firmware, kernel-level development, OS platform internals, etc. Basic Qualifications: - Experience performing Software Development and writing in software languages such as: C, C++, python, Assembly - Demonstrated experience … kernel architecture in operating systems such as: Windows, Linux, MacOS, iOS and Android - Software development experience including design, implementation, testing, analysis and debugging supporting CNO/CNE. - Experience in vulnerabilityresearch and applying various analysis techniques - Experience in reverse engineering in various architectures (i.e. x86, ARM) - Demonstrated in-depth understanding of low level operating systems development and API More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Breakpoint Labs, LLC
security operations center analysis, defensive cyber operations, or offensive cyber operations. (desired, not required) - Experience in malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerabilityresearch, or software exploit development. (desired, not required) Offensive Security professional certifications (desired, not required) - Red Team Apprentice Course (RTAC) - Red Team Journeyman Course (RTJC) - Certified Red Team More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer … If you have a TS or higher, it's time to learn why our client is a leading employer for cyber engineers in norther Virginia. They are seeking a Vulnerability Researcher to join their team. Relevant qualifications: -Experience with reverse engineering -Experience with assembly languages (x86, ARM, etc.) -Experience with Python -Experience with debuggers and decompilers Desired: -Experience with More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
Vulnerability Researcher - Job Description Who We Are: Kudu Dynamics is a Leido's owned company, forged out of a decade of experience in computer networks and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and missions … Experience with modern exploitation techniques and mitigations (ASLR, DEP/NX, etc). Experience with modern static or dynamic program analysis techniques Key Responsibilities: Reverse engineering, system understanding, and vulnerability discovery against open and closed-source software products. Conducting experiments on an array of representative products and systems. Critically analyzing, interpreting, and communicating experimental results. Developing software tools to More ❯
Columbia, Maryland, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Development of new microservices, primarily in Python, to automate the vulnerability discovery process Develop/refine system emulation of IoT devices Use the Aggressor system to generate new potential vulnerabilities from More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Kudu Dynamics, LLC
operations and staffed with talent who have built, overseen, and enhanced capabilities through out the entire USG arsenal. Our team of hackers and engineers has experience spanning centuries of research, development, and operations missions across desktop, mobile, IoT, and embedded platforms. Hackers of more than just engineering domains, we have exploited IRS regulations to become an ESOP which is … multiple server products to develop a capability framework and technique plugins for that framework. The candidate will be part of a small, agile team that quickly adapts and applies research knowledge to demonstrate capabilities, from initial analysis of target systems up to developing tools to demonstrate the discoveries of the investigation. Required Qualifications: US citizenship and an active Top … managing automated build and test pipelines Key Responsibilities: Able to work in a small team to design new features/components. Participate in all aspects of the development lifecycle: research, design, develop, test, source control, build, troubleshooting/support, and performance measurement. Taking research findings and building framework plugins to demonstrate concepts Maintaining an automated pipeline for testing More ❯
engineering tools and techniques Desired Skills (Optional) Experience with IDA Pro, Ghidra, or similar reverse engineering tools Familiarity with Android internals and security mechanisms Understanding of exploit development or vulnerabilityresearch Ability to work in a fast-paced, mission-driven environment More ❯
from multiple industries to improve their solutions by tackling the root cause of the issues and find innovative solutions to modern challenges. You will have the opportunity to conduct research on latest developments in cybersecurity technologies and threats and understand how this is impacting and changing the Siemens' environment. What you need to make real what matters. Strong academic … software security, EDR and antivirus evasion, C2 setup, automation and scaling of security testing, Active Directory attacks, etc. Demonstrated experience in capture the flag (CTFs) events, bug hunting or vulnerabilityresearch (CVEs) is a plus. You demonstrate an international mindset and are open to travelling and working in a diverse team. You have a great attitude, curiosity, and More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
The DarkStar Group
benefits, and our $25,000 referral program. THE PROJECT The DarkStar Group's team conducts R&D and prototyping of new CNO capabilities for our customer. The work involves VulnerabilityResearch, Exploit Development, CNO tool development and enhancement, and infrastructure support (DevOps) for access operations. Platforms involved include iOS, Android, MacOS, Linux, Windows, and other environments. This is … green-badgers: the team is highly-competent, and the Branch and Section Leads do an excellent job of shielding the engineers from any organizational politics. This team regularly needs Vulnerability Researchers, Exploit Developers, CNO Tool Developers, Reverse Engineers, and other types of technologists. While roles open and close, the program Lead's attitude is "find us good people; we More ❯
sector to maintain resiliency and security. Read more about UKTL here ! Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK's world class Telecoms infrastructure grows More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerabilityresearch, or software exploit development. WHAT YOU'LL NEED TO SUCCEED: Required Experience: 5+ years of related experience Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
SRC
Our client is a growing Cyber company that provides VulnerabilityResearch, CNO Development, and other engineering services to the federal government and commercial clients. They were founded by an engineer to provide a flexible environment to support national security efforts and solve critical problems for their clients. The work is the focus here and our client goes out … are seeking a Reverse Engineer to join their team with firmware RE experience. Relevant qualifications: -Firmware reverse engineering experience -Experience with related tools (Ghidra, IDA Pro, etc.) -Experience with vulnerabilityresearch -Ability to work independently and produce results for the customer Desired: -Experience with C/C++ -Experience with hardware -Experience with CNO efforts -RF experience This is More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
SRC
Our client is a growing Cyber company that provides VulnerabilityResearch, CNO Development, and other engineering services to the federal government and commercial clients. They were founded by an engineer to provide a flexible environment to support national security efforts and solve critical problems for their clients. The work is the focus here and our client goes out … are seeking a Reverse Engineer to join their team with firmware RE experience. Relevant qualifications: -Firmware reverse engineering experience -Experience with related tools (Ghidra, IDA Pro, etc.) -Experience with vulnerabilityresearch -Ability to work independently and produce results for the customer Desired: -Experience with C/C++ -Experience with hardware -Experience with CNO efforts -RF experience This is More ❯