Are you a Mobile Vulnerability Researcher who is ready for a new challenge that will launch your career to the... about Ability to work with some amazingly talented people Job Description: GliaCell is seeking a Mobile Vulnerability Researcher...
GliaCell TechnologiesBlackstone Talent Group, an award-winning technology consulting and talent agency is seeking a Vulnerability... vulnerabilities across applications, endpoints, databases, networking devices, and mobile, cloud and third-party assets Administer...
Blackstone Talent Groupweeks. You will be joining an existing fast paced team focused on Security Research for Mobile technologies. The candidate... needs to be experienced with Mobile systems and have experience and recent exposure to the latest security implementations...
LegatoEngineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...
GliaCell TechnologiesEngineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...
GliaCell TechnologiesEngineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...
GliaCell TechnologiesEngineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...
GliaCell Technologiesdetection/prevention of unauthorized behaviors, performs system security vulnerability assessments and solution development... Junction MD., area. Our dynamic team delivers information security solutions that facilitate secure data flows and the...
Peratondevices, mobile devices, etc. Provides Tier 1 (Help Desk) and Tier 2 (Escalation) problem identification, diagnosis... reliability, security and performance. Responsibilities Provide support for implementation, troubleshooting and maintenance...
CyberCore Technologiesutilizing Elasticsearch/Kibana). They will document the proposed changes relevant to system security for inclusion in the System... Security Plan and for evaluation under the Risk Management Framework approval process. Requirements Bachelor's degree in...
SITEC Consultingto influence recommendations to malware analysis and exploitation strategy. Participate and facilitate System Security Plan (SSP... knowledge of programming skills:including C/C++ and Assembly language, Windows internal C/C++ and either UNIX/Linux or mobile...
Peratonsecurity controls. Perform periodic vulnerability scans of systems Provide support to IT systems including day-to-day... and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk...
General Dynamicssecurity controls. Perform periodic vulnerability scans of systems Provide support to IT systems including day-to-day... and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help Desk...
General DynamicsEngineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...
GliaCell TechnologiesInternals Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More Vulnerability... engineering, vulnerability research and discovery, and system exploitation. We develop and prototype cutting-edge capabilities...
MIT Lincoln LaboratoryInternals Reverse Engineering of Embedded Systems Firmware, Malicious Code, Mobile Applications, and More Vulnerability... engineering, vulnerability research and discovery, and system exploitation. We develop and prototype cutting-edge capabilities...
MIT Lincoln LaboratoryUS Citizenship Employment Term and Type: Regular, Full Time Required Security Clearance: TS/SCI with CI Poly...++ and Assembly language, Windows internal C/C++ and either UNIX/Linux or mobile (Android) platform, exploit development...
Aircraft Technologies Group