exploit development Create and develop novel security applications for embedded systems Quickly isolate areas of interest in large complex systems Rapidly prototype new technologies to exploit target systems Perform vulnerabilityresearch on hardened systems What Required Skills You'll Bring: Must have a Top Secret or Higher Clearance BS degree win Computer Science/Information Sciences or related More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil More ❯
ManTech seeks a motivated, career and customer-oriented Senior Vulnerability Assessment Analyst to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will contribute to technical vulnerability assessments of applications and infrastructure, vulnerabilityresearch, and generation of assessment reports. The individual contributes to the selection of appropriate technical tests, network … or vulnerability scan tools, and/or pen testing tools based on review of requirements and purpose; lists all steps involved for executing selected test(s) and coaches others in the use of advanced research, development, or scan tools and the analysis of comparative findings between proposed and current technologies. You will coordinate or lead teams to conducts … ethical tests, network scans, and/or vulnerability scans that support the evaluation of information safeguard effectiveness, conducting reconnaissance, target assessment, target selection, and vulnerability research. Using COTS tools you will conduct or lead teams to conduct vulnerability assessments, analyzes results, identifies exploitable vulnerabilities, and verifies vulnerabilities through manual assessment Responsibilities include, but are not limited to More ❯
Job Number: R Vulnerability Researcher Key Role: Provide network security research to identify and exploit u nk nown vulnerabilities in code to support our cyber business. Create custom fuzzing sof tware to enumerate and differentiate our delivery. Provide cyber and SIGINT exploitation of large-scale networks and the data riding on them to uncover u nk nown and … competencies. Basic Qualifications: 4+ years of experience with software development, including reading and writing C/C++ and x86/x86_64 assembly languages 3+ years of experience performing vulnerabilityresearch or network vulnerability assessments to discover vulnerabilities in modern software Experience with Windows internals, including system architectures, data structures, processes, and security model Experience performing dynamic … Qualifications: Experience performing exploit development and network analysis Experience creating, developing, or modifying large software solutions as part of a team Ability to create custom fuzzing harnesses to support vulnerabilityresearch efforts Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Science, Technology, Engineering, or Mathematics preferred; Master's degree in Computer Science, Computer Engineering, Electrical Engineering More ❯
Where you can find your next, right now. We've got what you're looking for. Job Description: Parsons is seeking a highly talented and driven Reverse Engineer/Vulnerability Researcher to join our team. As a key member of our team, you will have the opportunity to work on fascinating projects with some of the best professionals in … the industry, exploring the boundaries of vulnerability research. This is an on-site position in Annapolis Junction, MD. Responsibilities: Use reverse engineering techniques to delve into the inner workings of various systems and software to uncover security vulnerabilities Develop proof-of-concept exploits that showcase the impact of vulnerabilities Collaborate with cross-functional teams to ensure products are effective … required Bachelor's or Master's degree in Computer Science, Information Security, or a related field (can be waived) A minimum of 2 years of hands-on experience in vulnerabilityresearch and reverse engineering Experience developing exploits and payloads Strong understanding of low-level systems, software design, and security practices Proficiency in programming languages such as C, Python More ❯
sector to maintain resiliency and security. Read more about UKTL here ! Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK's world class Telecoms infrastructure grows More ❯
Mindbank is hiring motivated individuals, from junior to senior levels, to work in a dynamic environment with a team of Cyber Engineers in reverse engineering, vulnerabilityresearch, prototyping, design, development, integration, and test tasks to develop capabilities against various networking devices. This work will leverage your ability to deconstruct a variety of hardware and software, focusing on network … vulnerabilities discovered. In this job you will have an opportunity to work with a dynamic team of cyber researchers and engineers through all stages of the product lifecycle-from vulnerabilityresearch to development and test. Job Responsibilities: • Perform reverse engineering, vulnerability analysis, exploit dev, and capability dev in support of operations and capabilities directorates. • Be flexible, and … C++, and/or Python; • Minimum five (5) years of experience programming cyber tools and/or techniques for the US Government or commercial sector • Experience performing open-source research & vulnerability analysis • Experience utilizing reverse engineering tools such as IDA Pro and/or Ghidra to analyze firmware of embedded devices • Proficiency in network protocols, routers, and network More ❯
Job Title: MOBILE SECURITY RESEARCHER - MARYLAND - URGENT Job Type: Full-time Clearance Level: TS/SCI with POLY Work Arrangement: On-site Job Location: Laurel MD Background Perform security research against mobile technologies Familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices Must be extremely detail oriented when documenting their … research Required to write code in C, Python, and Assembly to demonstrate ability to control the flaws Requirements Strong C, Python, and ASM development experience Experience reading and writing assembly (x86/x64) Extensive experience with debuggers (ADB, GDB, etc.) Working as a team with researchers and developers Preferred Understanding of Linux Kernel and device derivers More ❯
TYPE: Direct Hire Job Overview: Mindbank is hiring a motivated Computer Network Operations (CNO), to work in a dynamic environment with a team of Cyber Engineers in reverse engineering, vulnerabilityresearch, prototyping, design, development, integration, and test tasks to develop capabilities against various networking devices. This work will leverage your ability to deconstruct a variety of hardware and … vulnerabilities discovered. In this job you will have an opportunity to work with a dynamic team of cyber researchers and engineers through all stages of the product lifecycle-from vulnerabilityresearch to development and test. Job Responsibilities: • Perform reverse engineering, vulnerability analysis, exploit dev, and capability dev in support of operations and capabilities directorates. • Be flexible, and … C++, and/or Python • Minimum five (5) years of experience programming cyber tools and/or techniques for the US Government or commercial sector • Experience performing open-source research & vulnerability analysis • Experience utilizing reverse engineering tools such as IDA Pro and/or Ghidra to analyze firmware of embedded devices • Proficiency in network protocols, routers, and network More ❯
Overview BigBear.ai is seeking a Software Researcher to identify flaws in software and software architecture design. The candidate must be familiar with the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices, must be extremely detail oriented when documenting their research, and will need to understand distributed architectures and protocol analysis between disaraprate … components. What you will do Demonstrate the latest techniques in vulnerabilityresearch and demonstrate their ability to follow best practices. Write code in C, Python, and Assembly to demonstrate ability to control the flaws Distribute architectures and protocol analysis between disaraprate components. What you need to have Bachelor's Degree and six (6) years' experience in computer science … GDB, ADB, BDI, etc.) Experience with dynamic and static binary analysis, fuzzing techniques, and source code auditing Strong C, Python, and ASM development experience Demonstrated ability to self-drive research tasking Motivated to learn complex systems Working as a team with researchers and developers What we'd like you to have N/A About BigBear.ai BigBear.ai is a More ❯
Boulder, Colorado, United States Hybrid / WFH Options
Kudu Dynamics LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
Aurora, Colorado, United States Hybrid / WFH Options
Kudu Dynamics LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerabilityresearch, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerabilityresearch, reverse engineering, penetration testing (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware … software, networks, cloud, etc.) to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. Required Skills: • Minimum of 3 years Software Engineering experience, or related field • Python Coding and Development • Gitlab/GitHub Continuous Integration & Continuous Development • (CI/CD) Implementation and Application • Bachelor's degree from an accredited college in More ❯
application of multi-disciplinary analytic skills to support multiple clients within the Department of Defense (DoD). These clients include the Office of the Under Secretary of Defense for Research and Engineering (OUSD(R&E , Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S , DARPA, the Joint Staff, and USINDOPACOM. SPA provides critical decision … technological superiority and enabling the delivery and sustainment of secure, resilient, and preeminent capabilities to the warfighter quickly and cost effectively. Our team of experienced military, technical, and operations research analysts is skilled in evaluating military problems, identifying the driving factors, devising innovative approaches, collecting applicable data, developing necessary software tools, and performing thorough and timely assessments to inform … support out of Arlington, VA. Responsibilities The Technical SETA (Engineer/Scientist/Mathematician) will support DARPA I2O with high assurance, high confidence, or zero-defect software and systems research and development for true mission critical solutions. The candidate will connect modern DevSecOps development processes and traditional mathematical modeling oriented "Formal Methods," applied to the specification, development, and verification More ❯
Analytics Group (STAG) is seeking an experienced capability developer with a focus on Windows and reverse engineering in a Windows environment to support a DoD customer. You will conduct vulnerability analysis and capability development on Windows-based software to determine leads and possible offensive opportunities for the customer. Our ideal candidate will leverage their experience to understand the specific … with established Department of Defense (DoD) policies, procedures, and requirements. Job Description: In this role, you will analyze highly complex and diverse mission areas that require innovative solutions through vulnerability assessments and capability development. Additionally, you will conduct the following duties: • Reverse engineer Windows-based or Linux platforms. • Produce and modify software systems in C/C Python. • Direct … include proactivity, initiative, creativity, and open-mindedness. • Establish and maintain relationships with IC/DoD partners on a daily basis, ensuring effective and efficient progress on projects. • Conduct operational research from various sources/metadata to identify, develop, and find mission-related targets. • Develop tailored access and exploitation strategies against targets of interest. • Create weaponeering solutions with known capabilities More ❯
winning cyber services contracts. We are driven by impactful and innovative projects that contribute directly to safeguarding our country and our strategic partners. Our teams are engaged in advanced vulnerabilityresearch and cyber solutions that meet the complex demands of our mission. With offices in Northern Virginia, Melbourne, Florida, Tel Aviv, Israel, and other locations, we are expanding … network within DoD and proven ability to collaborate with industry peers. Must possess an active TS/SCI clearance Preferred Qualifications: Experience developing and marketing offensive cyber solutions including vulnerabilityresearch and reverse engineering. Strong network within the USIC Prior experience working within or directly supporting DoD and USIC. Familiarity with Government-Wide Acquisition Contracts (GWACs), IDIQs, OTAs More ❯
Windows environments. What You'll Be Doing: Offensive capability development Program in C and C# and BOFs Work in a Scrm/Agile Environment Malware development, analysis and software vulnerabilityresearch What Required Skills You'll Bring: Active TS/SCI Clearance Must be proficient in offensive capability development for Windows environments. Proficient in C and C# and … red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerabilityresearch, or software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester More ❯
. Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with VulnerabilityResearch and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. More ❯
. Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with VulnerabilityResearch and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. More ❯
physical, logical, and electronic protection of data, including cloud, corporate, web application, access control, intrusion detection/prevention, virus protection, and more, as well as Digital Forensics, Software Development, VulnerabilityResearch, Reverse Engineering, Software/Hardware Engineering, and Operational Consultancy (e.g., Red Teaming/Hunt, Mission Evaluation) and performing incident response and working in the global security operations More ❯
years of technical work experience - Minimum one (1) year experience programming in Assembly, C, C#, C++ Desired Skills & Qualifications: - Preferred skills include experience in static and dynamic reverse engineering, vulnerabilityresearch, binary analysis of executables, exposure to kernel programming, exposure with assembly languages, and/or ability to analyze and signature network protocols. Application Process: - All qualified applicants More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerabilityresearch, or software exploit development. WHAT YOU'LL NEED TO SUCCEED: Required Experience: 5+ years of related experience Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows More ❯
Skills: Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with VulnerabilityResearch and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. Eduction/Experience: 8 yrs., B.S. in More ❯
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerabilityresearch, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil More ❯
and systems to meet mission objectives. Desired Skills: Experience with any of the following: Java, JavaScript, Bash, Assembly (both x86 and x64), PowerShell, Perl, C#, and Rust. Experience with VulnerabilityResearch and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. Education/Experience: 12 yrs., B.S. in More ❯