VULNERABILITY RESEARCH AND REVERSE jobs in LAUREL MD, United Kingdom

to support vulnerability research / reverse engineering and prototype development Strong experience doing vulnerability research...: Vulnerability Researcher / Reverse Engineer Security Clearance Required: TS/SCI with Polygraph We are seeking: A candidate...

Legato

contract. Key Responsibilities: You will be responsible for performing reverse engineering research on highly complex... software applications. This research will involve static and dynamic analysis including reverse engineering and kernel...

GliaCell Technologies

contract. Key Responsibilities: You will be responsible for performing reverse engineering research on highly complex... software applications. This research will involve static and dynamic analysis including reverse engineering and kernel...

GliaCell Technologies

&D and prototyping of new CNO capabilities for the Maryland customer. The work involves Vulnerability Research, Exploit Development, CNO...Legato, LLC recruiters (Staffing@legatocorp.com) would love to speak with you regarding the following position: Reverse...

Legato

with difficult problems that must be solved rapidly and effectively. You will primarily operate as a reverse engineer/vulnerability... using industry standard tools such as IDA, Ghidra, OllyDbg, etc. Experience with vulnerability research and exploit...

GliaCell Technologies

/ vulnerability research / reverse engineering subject matter experts, we have the perfect position for you to help start a new stage... is required - 10+ years of software engineering (C, Python) / reverse engineering / vulnerability research experience (or 3 years...

Parsons

, and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support... forward. Responsibilities: Performing Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO...

Parsons

experience Vulnerability research experience Binary reverse engineering experience Some development experience...-Savvy Vulnerability Researcher / Reverse Engineer Security Clearance Required: TS/SCI with Polygraph We are seeking: iOS...

Legato

's job description is as follows: Perform Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO... requirements and source code, to technical documentation and specifications. Performing long term, in depth vulnerability...

2HB Incorporated

research, reverse engineering, CNO development, hardware emulation, system engineering, and data analytics. Our engineers... for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability...

Raytheon Technologies

. Experience with Vulnerability Research and Exploit development. Perks and Benefits: 8 weeks paid leave - 4 weeks of personal... reverse engineer for network-based devices for up-and-coming projects where you will design, develop, prototype, modify...

Belay Technologies

. Experience with Vulnerability Research and Exploit development. Perks and Benefits: 8 weeks paid leave - 4 weeks of personal... reverse engineer for network-based devices for up-and-coming projects where you will design, develop, prototype, modify...

Belay Technologies

systems research; simulation/model development and prototyping; software design programming; computational science; algorithm... analysis and design; reverse engineering software/malware; and/or designing/developing computer or information systems...

The Kenjya-Trusant Group

systems research; simulation/model development and prototyping; software design programming; computational science; algorithm... analysis and design; reverse engineering software/malware; and/or designing/developing computer or information systems...

The Kenjya-Trusant Group

at Annapolis Junction, MD. The ideal candidate will perform Software Engineering and vulnerability research with a focus on OCO... term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation technologies...

2HB Incorporated

/Embedded applications. Experience with Vulnerability Research and Exploit development. Knowledge of end-to-end SIGINT... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...

GliaCell Technologies

. Experience with developing CNO specific software in Linux/Windows/Embedded applications. Experience with Vulnerability Research... Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat...

GliaCell Technologies