VULNERABILITY RESEARCH AND REVERSE jobs in UNITED STATES, United Kingdom #3

looking for. Job Description: Are you looking to make great use of your Android reverse engineering (RE) and vulnerability research (VR) skills, while continuing to sharpen..., and learn from / collaborate with our existing Android / vulnerability research / reverse engineering subject matter experts...

Vaxcom Services

/ vulnerability research / reverse engineering subject matter experts, we have the perfect position for you to help start a new stage... is required - 10+ years of software engineering (C, Python) / reverse engineering / vulnerability research experience (or 3 years...

Parsons

of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system... with customer stakeholders, drive technical direction, and mentor other engineers in all aspects of Vulnerability Research...

Raytheon Technologies

Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research...FUTURE NEED Location: Vienna, VA Description: The candidate will be working independently as a Vulnerability...

Cipher Tech Solutions

to contribute to our portfolio of systems security engineering projects. Tenet3 Research Interns engage in a variety of highly... from data Reverse engineered public safety cameras Built web services to capture structured knowledge Explored and exploited...

Tenet3

tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects.... Our core competencies include (but are not limited to): Program analysis, including program understanding, vulnerability...

Peraton

tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects.... Our core competencies include (but are not limited to): Program analysis, including program understanding, vulnerability...

Peraton

tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects.... Our core competencies include (but are not limited to): Program analysis, including program understanding, vulnerability...

Peraton

development, relish crafting OS/Network/Application designs, specialize in vulnerability and malware analysis, or excel in Reverse..., have a deep understanding of network protocols and inter-process communication, and have a knack for executing guided research...

Lockheed Martin

development, relish crafting OS/Network/Application designs, specialize in vulnerability and malware analysis, or excel in Reverse... reverse engineering on x86/x86_64, MIPS, ARM, or PowerPC - Vulnerability Analysis of source code or binaries - Machine...

Lockheed Martin

development, relish crafting OS/Network/Application designs, specialize in vulnerability and malware analysis, or excel in Reverse... reverse engineering on x86/x86_64, MIPS, ARM, or PowerPC - Vulnerability Analysis of source code or binaries - Machine...

Lockheed Martin

tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects.... Our core competencies include (but are not limited to): Program analysis, including program understanding, vulnerability...

Peraton

scientific and engineering research, capability and limitation analysis, reverse engineering analysis and characterizations..., facility, and vulnerability assessments. This includes, but not limited to, civil and industrial engineering and sub...

CACI International

, completed on schedule, and are in accordance with Agency and organizations policies. Research major obstacles related to the... Plans, etc.) Information Security Vulnerability Management (ISVM) compliance, DHS Performance Plan requirements, audit...

Zermount, Inc

: Research vulnerabilities and perform reverse engineering on embedded systems. Plan and Conduct vulnerability analysis on user... with vulnerability research on one or more operating systems (Android, IOS, Windows, Linux, etc.). Reverse engineering hardware...

Northrop Grumman

security tools. Experience with vulnerability assessment, exploit development, and/or reverse engineering for cyber-physical...Senior Cyber-Physical Security Engineer Columbia, SC What we do Integer Technologies is an applied research...

Integer Technologies

a security engineering or vulnerability researcher role.4+ years of relevant software engineering experience Exceptional C.... Knowledgeable in modern server architecture, hypervisor security research, and firmware analysis Effective written and verbal...

Nvidia