RTOS) Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust Experience with developing CNO specific software in Linux/Windows/Embedded applications Experience with VulnerabilityResearch and Exploit development Knowledge of end-to-end SIGINT collection and analysis systems Experience with production CNO capabilities and operations Experience/Education 6 yrs., B.S. in More ❯
of network protocols (e.g., TCP/IP), and analysis of network traffic (e.g., Wireshark). Experience developing CNO specific software in Linux/Windows/Embedded applications. Experience with VulnerabilityResearch and Exploit development. Familiarity with CNO capabilities and operations. Education/Experience: 12 yrs., B.S. or 10 yrs. w/M.S., 4 yrs. of additional SWE experience More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil More ❯
with software development processes and lifecycles to include Agile development. Experience with network sockets programming and packet-level understanding of IP, TCP and application-level protocols. Reverse Engineering/Vulnerability research. Mobile/Embedded Development. More ❯
ManTech seeks a motivated, career and customer-oriented Junior Vulnerability Assessment Analyst to join our team in the DC, Maryland, and Virginia (DMV) area. The Vulnerability Assessment Analyst contributes to technical vulnerability assessments of applications and infrastructure, vulnerabilityresearch, and generation of assessment reports. The individual contributes to the selection of appropriate technical tests, network … or vulnerability scan tools, and/or pen testing tools based on review of requirements and purpose; lists all steps involved for executing selected test(s) and coaches others in the use of advanced research, development, or scan tools and the analysis of comparative findings between proposed and current technologies. Responsibilities include, but are not limited to: Assist … Senior Analysts in conducting vulnerability assessments, including data analysis, and reporting; write assessment reports, investigate computer attacks, and extract data from electronic systems Learn and apply the MITRE ATT&CK framework and other techniques to identify, assess, and address cyber threats and vulnerabilities; conduct technical analysis against target systems and networks, identify vulnerabilities, and support the development of new More ❯
SECURITY RESEARCHER (367) - MARYLAND - URGENT Job Type: Full-time Clearance Level: TS/SCI with POLY Work Arrangement: On-site Job Location: Laurel MD Salary: 120K Background Performing security research against Windows technologies Familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices Extremely detail oriented when documenting their Required to … write code in C, Python, and Assembly to demonstrate ability to control the flaws research Requirements Understanding of Windows Kernel and device derivers Experience reading and writing assembly (x86/x64) Extensive experience with debuggers (WinDBG, etc.) Working as a team with researchers and developers Preferred Strong C, Python, and ASM development experience More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
SRC
Our client is a growing Cyber company that provides VulnerabilityResearch, CNO Development, and other engineering services to the federal government and commercial clients. They were founded by an engineer to provide a flexible environment to support national security efforts and solve critical problems for their clients. The work is the focus here and our client goes out … are seeking a Reverse Engineer to join their team with firmware RE experience. Relevant qualifications: -Firmware reverse engineering experience -Experience with related tools (Ghidra, IDA Pro, etc.) -Experience with vulnerabilityresearch -Ability to work independently and produce results for the customer Desired: -Experience with C/C++ -Experience with hardware -Experience with CNO efforts -RF experience This is More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
SRC
Our client is a growing Cyber company that provides VulnerabilityResearch, CNO Development, and other engineering services to the federal government and commercial clients. They were founded by an engineer to provide a flexible environment to support national security efforts and solve critical problems for their clients. The work is the focus here and our client goes out … are seeking a Reverse Engineer to join their team with firmware RE experience. Relevant qualifications: -Firmware reverse engineering experience -Experience with related tools (Ghidra, IDA Pro, etc.) -Experience with vulnerabilityresearch -Ability to work independently and produce results for the customer Desired: -Experience with C/C++ -Experience with hardware -Experience with CNO efforts -RF experience This is More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
SRC
Our client is a growing Cyber company that provides VulnerabilityResearch, CNO Development, and other engineering services to the federal government and commercial clients. They were founded by an engineer to provide a flexible environment to support national security efforts and solve critical problems for their clients. The work is the focus here and our client goes out … are seeking a Reverse Engineer to join their team with firmware RE experience. Relevant qualifications: -Firmware reverse engineering experience -Experience with related tools (Ghidra, IDA Pro, etc.) -Experience with vulnerabilityresearch -Ability to work independently and produce results for the customer Desired: -Experience with C/C++ -Experience with hardware -Experience with CNO efforts -RF experience This is More ❯
application of multi-disciplinary analytic skills to support multiple clients within the Department of Defense (DoD). These clients include the Office of the Under Secretary of Defense for Research and Engineering (OUSD(R&E , Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S , DARPA, the Joint Staff, and USINDOPACOM. SPA provides critical decision … technological superiority and enabling the delivery and sustainment of secure, resilient, and preeminent capabilities to the warfighter quickly and cost effectively. Our team of experienced military, technical, and operations research analysts is skilled in evaluating military problems, identifying the driving factors, devising innovative approaches, collecting applicable data, developing necessary software tools, and performing thorough and timely assessments to inform … SPA has a near-term need for a Cyber Technology Transition Support Analyst (SETA) to provide onsite support in Arlington, VA. Responsibilities The candidate will provide Reverse Engineering and VulnerabilityResearch expertise to help DARPA identify and implement compelling Cyber Offensive & Defensive solutions for the battlefield. Assist with strategic coordination of Cyber and Crypto efforts from the ground More ❯
find your next, right now. We've got what you're looking for. Job Description: Are you looking to make great use of your Android reverse engineering (RE) and vulnerabilityresearch (VR) skills, while continuing to sharpen them? If you're hungry to support an amazing mission, work as a team to leverage your skills to make a … difference, and learn from/collaborate with our existing Android/vulnerabilityresearch/reverse engineering subject matter experts, we have the perfect position for you to help start a new stage of your career at Parsons! You'll get the opportunity to do RE, VR, and prototype development to support a critical customer mission and develop much … help better protect our country. What Skills You'll Bring: TS/SCI w/Polygraph is required 5+ years of software engineering (C, Python)/reverse engineering/vulnerabilityresearch experience (or 3 years' experience with a Master's Degree) Experience with Reverse Engineering Experience with VulnerabilityResearch Experience with Android development/analysis Security More ❯
your next, right now. We've got what you're looking for. Job Description: Are you looking to make great use of your Network Devices reverse engineering (RE) and vulnerabilityresearch (VR) skills, while continuing to sharpen them? If you're hungry to support an amazing mission, work as a team to leverage your skills to make a … difference and learn from/collaborate with our existing Network Devices/vulnerabilityresearch/reverse engineering subject matter experts, we have the perfect position for you to help start a new stage of your career at Parsons! You'll get the opportunity to do RE, VR, and prototype development to support a critical customer mission and develop … help better protect our country. What Skills You'll Bring: TS/SCI w/Polygraph is required 5+ years of software engineering (C, Python)/reverse engineering/vulnerabilityresearch experience (or 3 years' experience with a Master's Degree) Experience with Reverse Engineering Experience with VulnerabilityResearch Security Clearance Requirement: An active Top Secret More ❯
on our client's mobile team. Experience supporting development on or analysis of Mobile devices Strong proficiency in C programming Experience doing reverse engineering on diverse architectures Experience with vulnerabilityresearch Salaries from 225K to 275K, TS/SCI FS poly required, Annapolis Junction. More ❯
Overview BigBear.ai is seeking a Windows Researcher. The candidate must be familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices. What you will do Familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices. Write codes in C, Python, and Assembly to demonstrate More ❯
Job Description: Parsons is looking for an amazingly talented CNO Developer to join our team! In this role you will get to make great use of your reverse engineering , vulnerabilityresearch , and embedded development skills. Imagine Next with Parsons! What You'll Be Doing: You'll get the opportunity to showcase reverse engineering, vulnerabilityresearch, and … programming language Experience within a CNO Development environment Real time OS experience What Desired Skills You'll Bring: Expertise with development on or analysis of mobile devices 3+ years vulnerabilityresearch experience Security Clearance Requirement: An active Top Secret SCI w/Polygraph security clearance is required for this position. This position is part of our Federal Solutions More ❯
your marketability? Parsons is proud to support the Intelligence Community with cutting edge solutions to new challenges in the Computer Network Operations arena. Our mission is to provide critical vulnerabilityresearch and exploitation development on Android mobile device platforms. Our team in Northern Virginia is currently seeking candidates with experience in CNO development and remote access through exploitation … customer in the intelligence community. The ideal candidate for this role will be someone who has performed CNO development and has an understanding of Android development. Relevant experience with vulnerabilityresearch and working with existing toolchains and weaponizing bugs. This work will focus on taking proof of concepts (POC) and fitting them into the framework as well as … MIPS) Experience with exploitation development, weaponization and integration Must have minimum of 5 years of CNO (Computer Network Operations) development experience Experience with remote access through exploitation Experience with VulnerabilityResearch Understanding of network protocols such as TCP/IP Security Clearance Requirement: An active Top Secret security clearance is required for this position. This position is part More ❯
in the development and analysis of anti-tamper/protective technologies, IC failure analysis, reverse engineering, full spectrum cyber operations, and cyber tool development and solutions. Additionally, MTO conducts vulnerabilityresearch to preclude hardware exploitation, side-channel attacks, and fault-injection attacks. MTO is advancing the state-of-the-art for the Department of Defense, building out a … development, and authoring enhanced whitepapers contributing to the establishment of capabilities and processes necessary to convert low TRL S&T developments into low to mid-volume production products other research and development tasks in the microelectronic security field The candidate must proficiently interact with a variety of personnel to succeed in this role: MTO Operations Manager & Division Managers MTO … Experience with cryptographic algorithms and applications, and knowledge of post-quantum crypto Real-time OS experience Ability and willingness to mentor junior technical personnel Expertise in Hardware Security/VulnerabilityResearch, including nation-state level reverse-engineering threat vectors Hands-on electronics and/or microelectronics laboratory experience Knowledge of semiconductor device physics Semiconductor Failure Analysis tools & techniques More ❯
bypassing mitigations and conduct dynamic analysis. What You'll Be Doing: Offensive capability development Will develop exploits, shellcode, and bypassing mitigations Conduct dynamic analysis Malware development, analysis and software vulnerabilityresearch What Required Skills You'll Bring: Must have 8 years of experience overall Active TS/SCI Clearance 3+ years as a software developer Proficient in C … red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operation Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerabilityresearch, or software exploit development 3-5 years development industry experience Experience in the development of Windows kernel modules Strong familiarity with Windows Active Directory Experience developing exploits More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil … file-system artifacts (browser histories, account usage and USB histories, etc.) - Creating forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis - Performing all-source research for similar or related network events or incidents. Required Skills: - U.S. Citizenship - Must have an active TS/SCI clearance - Must be able to obtain DHS Suitability - 2+ years More ❯
Columbia, MD Clearance & Citizenship Requirements: - TS/SCI with polygraph is required - Due to these clearance requirements, US citizenship is also required Responsibilities Include: - Perform traditional System Engineering and Vulnerabilityresearch with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities - Activities are focused on analyzing large-scale weapon systems, breaking the systems down … of security requirements and capabilities - Familiarity with weapons system/space-based systems/embedded systems/tactical networks development, sustainment, and security operations is a plus - Experience in vulnerability discovery, and analysis tools, fuzzing tools, and dynamic system analysis Application Process: - All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or national More ❯
supporting development on or analysis of Mobile devices • Strong proficiency in C programming • Experience doing reverse engineering on diverse architectures It would be great if candidates had: • Experience with vulnerabilityresearch Clearance: • TS/SCI clearance with FS polygraph is required. InterImage Benefit Snapshot: • 401K: up to 3% discretionary profit sharing contribution + 100% match on the 1st More ❯
providing a decisive advantage to the warfighter. Come be a part of our mission! Northrop Grumman Mission Systems is seeking a Software Engineer or Principal Software Engineer: Vuln erability Research - Reverse Engineering to join our team in San Antonio, Texas, where you'll get to lead the development of solutions to national security threats with products that may involve … kernel development, reverse engineering or vulnerabilityresearch of network and communication systems. Essential Functions: Designs, develops, documents, tests and debugs low level software and systems that contain logical solutions. Conducts multidisciplinary research and collaborates with equipment designers and/or hardware engineers in the planning, design, development, and utilization of electronic data processing systems for product and … be substituted in lieu of a degree. US Citizenship with active DoD Secret clearance and ability to obtain and maintain a Top-Secret clearance Experience in reverse engineering or vulnerability analysis. Demonstrated software programming experience in C/C++. Familiarity with disassemblers such as IDA Pro, BinaryNinja, or others. Preferred Qualifications: Understanding of secure/insecure programming concepts (format More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in VulnerabilityResearch, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯