Vulnerability Research Job Vacancies

76 to 100 of 159 Vulnerability Research Jobs

Hardware Reverse Engineer (Jr., Senior, Principal) - TS or higher cleared

Centreville, Virginia, United States
Parsons Corporation
exploit development Create and develop novel security applications for embedded systems Quickly isolate areas of interest in large complex systems Rapidly prototype new technologies to exploit target systems Perform vulnerability research on hardened systems What Required Skills You'll Bring: Must have a Top Secret or Higher Clearance BS degree win Computer Science/Information Sciences or related More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Tech Lead - Architect with Security Clearance

Herndon, Virginia, United States
Nightwing
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Vulnerability Assessment Analyst with Security Clearance

Herndon, Virginia, United States
ManTech International
ManTech seeks a motivated, career and customer-oriented Senior Vulnerability Assessment Analyst to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will contribute to technical vulnerability assessments of applications and infrastructure, vulnerability research, and generation of assessment reports. The individual contributes to the selection of appropriate technical tests, network … or vulnerability scan tools, and/or pen testing tools based on review of requirements and purpose; lists all steps involved for executing selected test(s) and coaches others in the use of advanced research, development, or scan tools and the analysis of comparative findings between proposed and current technologies. You will coordinate or lead teams to conducts … ethical tests, network scans, and/or vulnerability scans that support the evaluation of information safeguard effectiveness, conducting reconnaissance, target assessment, target selection, and vulnerability research. Using COTS tools you will conduct or lead teams to conduct vulnerability assessments, analyzes results, identifies exploitable vulnerabilities, and verifies vulnerabilities through manual assessment Responsibilities include, but are not limited to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Researcher with Security Clearance

Annapolis Junction, Maryland, United States
Booz Allen Hamilton
Job Number: R Vulnerability Researcher Key Role: Provide network security research to identify and exploit u nk nown vulnerabilities in code to support our cyber business. Create custom fuzzing sof tware to enumerate and differentiate our delivery. Provide cyber and SIGINT exploitation of large-scale networks and the data riding on them to uncover u nk nown and … competencies. Basic Qualifications: 4+ years of experience with software development, including reading and writing C/C++ and x86/x86_64 assembly languages 3+ years of experience performing vulnerability research or network vulnerability assessments to discover vulnerabilities in modern software Experience with Windows internals, including system architectures, data structures, processes, and security model Experience performing dynamic … Qualifications: Experience performing exploit development and network analysis Experience creating, developing, or modifying large software solutions as part of a team Ability to create custom fuzzing harnesses to support vulnerability research efforts Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Science, Technology, Engineering, or Mathematics preferred; Master's degree in Computer Science, Computer Engineering, Electrical Engineering More ❯
Employment Type: Permanent
Salary: USD 225,000 Annual
Posted:

Reverse Engineer/Vulnerability Researcher - TS/SCI with Security Clearance

Annapolis Junction, Maryland, United States
Parsons
Where you can find your next, right now. We've got what you're looking for. Job Description: Parsons is seeking a highly talented and driven Reverse Engineer/Vulnerability Researcher to join our team. As a key member of our team, you will have the opportunity to work on fascinating projects with some of the best professionals in … the industry, exploring the boundaries of vulnerability research. This is an on-site position in Annapolis Junction, MD. Responsibilities: Use reverse engineering techniques to delve into the inner workings of various systems and software to uncover security vulnerabilities Develop proof-of-concept exploits that showcase the impact of vulnerabilities Collaborate with cross-functional teams to ensure products are effective … required Bachelor's or Master's degree in Computer Science, Information Security, or a related field (can be waived) A minimum of 2 years of hands-on experience in vulnerability research and reverse engineering Experience developing exploits and payloads Strong understanding of low-level systems, software design, and security practices Proficiency in programming languages such as C, Python More ❯
Employment Type: Permanent
Salary: USD 151,700 Annual
Posted:

Senior Vulnerability Researcher

United Kingdom
Hybrid / WFH Options
NPL
sector to maintain resiliency and security. Read more about UKTL here ! Successful candidates will join a state-of-the-art facility and be supporting the team conducting testing and research on the latest technologies and innovations in the industry. You will work alongside our infrastructure and Cybersecurity professionals to ensure that the UK's world class Telecoms infrastructure grows More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Computer Network Operations Developer with TS/SCI FULL SCOPE with Security Clearance

Columbia, Maryland, United States
Mindbank Consulting Group
Mindbank is hiring motivated individuals, from junior to senior levels, to work in a dynamic environment with a team of Cyber Engineers in reverse engineering, vulnerability research, prototyping, design, development, integration, and test tasks to develop capabilities against various networking devices. This work will leverage your ability to deconstruct a variety of hardware and software, focusing on network … vulnerabilities discovered. In this job you will have an opportunity to work with a dynamic team of cyber researchers and engineers through all stages of the product lifecycle-from vulnerability research to development and test. Job Responsibilities: • Perform reverse engineering, vulnerability analysis, exploit dev, and capability dev in support of operations and capabilities directorates. • Be flexible, and … C++, and/or Python; • Minimum five (5) years of experience programming cyber tools and/or techniques for the US Government or commercial sector • Experience performing open-source research & vulnerability analysis • Experience utilizing reverse engineering tools such as IDA Pro and/or Ghidra to analyze firmware of embedded devices • Proficiency in network protocols, routers, and network More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

MOBILE SECURITY RESEARCHER - MARYLAND - URGENT with Security Clearance

Laurel, Maryland, United States
Cyberstrike Group
Job Title: MOBILE SECURITY RESEARCHER - MARYLAND - URGENT Job Type: Full-time Clearance Level: TS/SCI with POLY Work Arrangement: On-site Job Location: Laurel MD Background Perform security research against mobile technologies Familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices Must be extremely detail oriented when documenting their … research Required to write code in C, Python, and Assembly to demonstrate ability to control the flaws Requirements Strong C, Python, and ASM development experience Experience reading and writing assembly (x86/x64) Extensive experience with debuggers (ADB, GDB, etc.) Working as a team with researchers and developers Preferred Understanding of Linux Kernel and device derivers More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Operations (CNO) Developer with Security Clearance

Columbia, Maryland, United States
Mindbank Consulting Group
TYPE: Direct Hire Job Overview: Mindbank is hiring a motivated Computer Network Operations (CNO), to work in a dynamic environment with a team of Cyber Engineers in reverse engineering, vulnerability research, prototyping, design, development, integration, and test tasks to develop capabilities against various networking devices. This work will leverage your ability to deconstruct a variety of hardware and … vulnerabilities discovered. In this job you will have an opportunity to work with a dynamic team of cyber researchers and engineers through all stages of the product lifecycle-from vulnerability research to development and test. Job Responsibilities: • Perform reverse engineering, vulnerability analysis, exploit dev, and capability dev in support of operations and capabilities directorates. • Be flexible, and … C++, and/or Python • Minimum five (5) years of experience programming cyber tools and/or techniques for the US Government or commercial sector • Experience performing open-source research & vulnerability analysis • Experience utilizing reverse engineering tools such as IDA Pro and/or Ghidra to analyze firmware of embedded devices • Proficiency in network protocols, routers, and network More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Application Researcher with Security Clearance

Columbia, Maryland, United States
BigBear.ai
Overview BigBear.ai is seeking a Software Researcher to identify flaws in software and software architecture design. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices, must be extremely detail oriented when documenting their research, and will need to understand distributed architectures and protocol analysis between disaraprate … components. What you will do Demonstrate the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Write code in C, Python, and Assembly to demonstrate ability to control the flaws Distribute architectures and protocol analysis between disaraprate components. What you need to have Bachelor's Degree and six (6) years' experience in computer science … GDB, ADB, BDI, etc.) Experience with dynamic and static binary analysis, fuzzing techniques, and source code auditing Strong C, Python, and ASM development experience Demonstrated ability to self-drive research tasking Motivated to learn complex systems Working as a team with researchers and developers What we'd like you to have N/A About BigBear.ai BigBear.ai is a More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Reverse Engineer

Boulder, Colorado, United States
Hybrid / WFH Options
Kudu Dynamics LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerability research, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Reverse Engineer

Aurora, Colorado, United States
Hybrid / WFH Options
Kudu Dynamics LLC
and staffed with talent who have built, overseen, and enhanced capabilities throughout the entire USG arsenal. Our team of hackers, engineers, makers, and shakers have experience spanning centuries of research, development, and operations missions - across desktop, mobile, IoT, and embedded platforms. Kudu Dynamics is uniquely qualified to anticipate tomorrow's threats and build the next generation of capabilities. Full … Job Description The Kudu Dynamics Aggressor team of security researchers and software engineers is actively developing an automated firmware vulnerability discovery tool for Internet of Things (IoT) devices. The Aggressor team has generated thousands of potential vulnerabilities and has hundreds of physical devices (IP cameras, wireless routers, etc.) ready for real-world exploit development. Our team is eager to … bring on one to two Software Engineers who are ready to directly contribute in a reverse engineering, vulnerability research, system emulation, and exploit development role. Responsibilities Reverse engineer commercial IoT devices to get access to firmware and hardware debugging connections Research CVEs and other freely available information to help inform your exploit development Create and demonstrate usable More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber DevOps Engineer with Security Clearance

Fort Bragg, North Carolina, United States
PlanIT Group LLC
and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetration testing (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware … software, networks, cloud, etc.) to conduct research to evaluate potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. Required Skills: • Minimum of 3 years Software Engineering experience, or related field • Python Coding and Development • Gitlab/GitHub Continuous Integration & Continuous Development • (CI/CD) Implementation and Application • Bachelor's degree from an accredited college in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

DevSecOps Technical SETA with Security Clearance

Arlington, Virginia, United States
SPA
application of multi-disciplinary analytic skills to support multiple clients within the Department of Defense (DoD). These clients include the Office of the Under Secretary of Defense for Research and Engineering (OUSD(R&E , Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S , DARPA, the Joint Staff, and USINDOPACOM. SPA provides critical decision … technological superiority and enabling the delivery and sustainment of secure, resilient, and preeminent capabilities to the warfighter quickly and cost effectively. Our team of experienced military, technical, and operations research analysts is skilled in evaluating military problems, identifying the driving factors, devising innovative approaches, collecting applicable data, developing necessary software tools, and performing thorough and timely assessments to inform … support out of Arlington, VA. Responsibilities The Technical SETA (Engineer/Scientist/Mathematician) will support DARPA I2O with high assurance, high confidence, or zero-defect software and systems research and development for true mission critical solutions. The candidate will connect modern DevSecOps development processes and traditional mathematical modeling oriented "Formal Methods," applied to the specification, development, and verification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Capability Developer (Windows OR Linux SME) with Security Clearance

San Antonio, Texas, United States
Strategic Technologies Analytics Group (STAG)
Analytics Group (STAG) is seeking an experienced capability developer with a focus on Windows and reverse engineering in a Windows environment to support a DoD customer. You will conduct vulnerability analysis and capability development on Windows-based software to determine leads and possible offensive opportunities for the customer. Our ideal candidate will leverage their experience to understand the specific … with established Department of Defense (DoD) policies, procedures, and requirements. Job Description: In this role, you will analyze highly complex and diverse mission areas that require innovative solutions through vulnerability assessments and capability development. Additionally, you will conduct the following duties: • Reverse engineer Windows-based or Linux platforms. • Produce and modify software systems in C/C Python. • Direct … include proactivity, initiative, creativity, and open-mindedness. • Establish and maintain relationships with IC/DoD partners on a daily basis, ensuring effective and efficient progress on projects. • Conduct operational research from various sources/metadata to identify, develop, and find mission-related targets. • Develop tailored access and exploitation strategies against targets of interest. • Create weaponeering solutions with known capabilities More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr Manager, Business Development - Cyber Services with Security Clearance

Chantilly, Virginia, United States
REDLattice Incorporated
winning cyber services contracts. We are driven by impactful and innovative projects that contribute directly to safeguarding our country and our strategic partners. Our teams are engaged in advanced vulnerability research and cyber solutions that meet the complex demands of our mission. With offices in Northern Virginia, Melbourne, Florida, Tel Aviv, Israel, and other locations, we are expanding … network within DoD and proven ability to collaborate with industry peers. Must possess an active TS/SCI clearance Preferred Qualifications: Experience developing and marketing offensive cyber solutions including vulnerability research and reverse engineering. Strong network within the USIC Prior experience working within or directly supporting DoD and USIC. Familiarity with Government-Wide Acquisition Contracts (GWACs), IDIQs, OTAs More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Offensive Software Developer with Security Clearance

Fort Belvoir, Virginia, United States
Parsons
Windows environments. What You'll Be Doing: Offensive capability development Program in C and C# and BOFs Work in a Scrm/Agile Environment Malware development, analysis and software vulnerability research What Required Skills You'll Bring: Active TS/SCI Clearance Must be proficient in offensive capability development for Windows environments. Proficient in C and C# and … red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Application Developer 3 with Security Clearance

Severna Park, Maryland, United States
Red Lake Consulting
. Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with Vulnerability Research and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

CNO Reverse Engineer with Security Clearance

Maryland, United States
ClearanceJobs
. Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with Vulnerability Research and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer, Incident Response with Security Clearance

Herndon, Virginia, United States
Constellis
physical, logical, and electronic protection of data, including cloud, corporate, web application, access control, intrusion detection/prevention, virus protection, and more, as well as Digital Forensics, Software Development, Vulnerability Research, Reverse Engineering, Software/Hardware Engineering, and Operational Consultancy (e.g., Red Teaming/Hunt, Mission Evaluation) and performing incident response and working in the global security operations More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber (CNO) Software Developer with Security Clearance

Columbia, Maryland, United States
Percival Engineering
years of technical work experience - Minimum one (1) year experience programming in Assembly, C, C#, C++ Desired Skills & Qualifications: - Preferred skills include experience in static and dynamic reverse engineering, vulnerability research, binary analysis of executables, exposure to kernel programming, exposure with assembly languages, and/or ability to analyze and signature network protocols. Application Process: - All qualified applicants More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Developer with Security Clearance

Fort Belvoir, Virginia, United States
Hybrid / WFH Options
General Dynamics Information Technology
red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development. WHAT YOU'LL NEED TO SUCCEED: Required Experience: 5+ years of related experience Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Reverse Engineer (Ft. Meade, MD) with Security Clearance

Maryland, United States
Set of X
Skills: Experience with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, Rust. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with Vulnerability Research and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. Eduction/Experience: 8 yrs., B.S. in More ❯
Employment Type: Permanent
Salary: USD 220,000 Annual
Posted:

Database Developer with Security Clearance

Herndon, Virginia, United States
Nightwing
full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Application Developer (Annapolis Junction, MD) with Security Clearance

Annapolis Junction, Maryland, United States
Set of X
and systems to meet mission objectives. Desired Skills: Experience with any of the following: Java, JavaScript, Bash, Assembly (both x86 and x64), PowerShell, Perl, C#, and Rust. Experience with Vulnerability Research and Exploit development. Knowledge of end-to-end SIGINT collection and analysis systems. Experience with production CNO capabilities and operations. Education/Experience: 12 yrs., B.S. in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Vulnerability Research
10th Percentile
£58,000
25th Percentile
£85,000
Median
£100,000