embedded system security. This multi-disciplinary team performs hands-on research and analysis and develops proof-of-concept... to propose and lead new internal research efforts in the hardware security domain. Roles & Responsibilities: Qualified...
MitreResponsibilities Cyber Security Analyst will conduct research, evaluate system configuration data, and provide... experience, technical collection, penetration testing, “red teaming,” hardware engineering, software reverse engineering...
Peratonand network sources within the Endpoint, Detection and Response (EDR) solutions. You will also be reviewing vulnerability reports... needs and wants Regularly assist with reviews and provide reports on observed threats Research new threats to enterprise...
PonduranceResponsibilities The Digital Forensic Analyst will conduct research, evaluate system configuration data, and provide... vulnerability analysis using commercial-off-the-shelf (COTS) and/or customer-provided tools; Evaluate cloud services, web...
Peraton/ bio-engineering research, reverse bio-engineering analysis/ characterizations, facility and vulnerability assessments.... You will get to demonstrate the ability to define comprehensive, new, or unique research approaches that enable rigorous...
CACI Internationalreverse engineering, threat hunting, vulnerability escalation, and resolving security incidents from detection to remediation... to help streamline investigations, daily. monitoring and analysis research. The role works directly within GCS, the...
McDonald'sdomain: Embedded Development, Vulnerability Research, Reverse Engineering, Software and/or Hardware Engineering, AI/ML... Responsibilities (supporting one or more of the following): Reverse Engineering and Vulnerability Research. Researching novel...
Leidosreverse engineering, threat hunting, vulnerability escalation, and resolving security incidents from detection to remediation... to help streamline investigations, daily. monitoring and analysis research. The role works directly within GCS, the...
McDonald's, incidents, and threats through independent analysis and/or research. Consults development and product teams on vulnerability... on security incidents and threats and research appropriate countermeasures. Uses knowledge of the HP environment to scope the...
HPresearch, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers... for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability...
Raytheon Technologiesextensive vulnerability research and security risk assessment of our clients’ various embedded devices and firmware. When...++, Assembly (Intel, Motorola, and/or PowerPC), Java, Perl, Python, C Shell, Bash, and SQL. Experience with reverse engineering...
Artera Technologiesresearch, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers... for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability...
Raytheon Technologiesextensive vulnerability research and security risk assessment of our clients’ various embedded devices and firmware. When.... Unix/Linux development experience Subversion experience CNO experience Networking experience Software Analysis/Reverse...
Artera TechnologiesDevelopment, Vulnerability Research, Reverse Engineering, Software and/or Hardware Engineering, AI/ML, and/or Advanced Networking... one or more of the following): Reverse Engineering and Vulnerability Research. Researching novel hardware or software based CNO...
Leidosperforming software engineering, reverse engineering, and vulnerability research with a focus on OCO (Offensive Cyber Operations... and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Work...
Vaxcom Services, and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. Support... forward. Responsibilities: Performing Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO...
Parsonsand be passionate about advancing cybersecurity operations. Responsibilities: Reverse Engineering, Vulnerability Research... reverse engineering, vulnerability research, binary exploitation, and CNE tool development. Contribute to the strategic...
Eminence Talent Group