VULNERABILITY RESEARCH AND REVERSE jobs in UNITED STATES, United Kingdom #5

, IMS) SIEM Reverse Engineering / Malware analysis Collaborate and support teammates and outside teams with regard...’ experience in penetration testing, ethical hacking, exploit writing, and/or vulnerability management. Deep understanding...

Allstate

a rapidly evolving systems security research and trend identification of malicious software. You’ll evaluate and analyze... capabilities, and mitigation strategies. You’ll perform research in malicious software, vulnerabilities, and exploitation tactics...

Booz Allen Hamilton

of innovation and technology on existing programs Vulnerability research or software reverse engineering skills Operating System.... As a Solution Architect, you will work with business development, research and development, and other subject matter experts...

Leidos

, vulnerability research, reverse engineering and exploit development is a plus. - Experience with cloud (Azure, AWS) technologies... and research? Are you curious and self-driven to continuously learn, explore, and try harder, as well as share your knowledge...

UBS

experience Vulnerability research experience Binary reverse engineering experience Some development experience...-Savvy Vulnerability Researcher / Reverse Engineer Security Clearance Required: TS/SCI with Polygraph We are seeking: iOS...

Legato

with the vulnerability research team to gather relevant information on proof-of-concept exploits they generate and engages..., etc.) Ability to analyze proof-of-concept exploit/CVE vulnerability and engineer it to be stabe and repeatable Extensive experience in reverse...

Vaxcom Services

capabilities are operationally ready to be used on live infrastructure Works with the vulnerability research team to gather... (Computer Science, Cybersecurity, Computer Engineering, etc.) Ability to analyze proof-of-concept exploit/CVE vulnerability...

Parsons

with the vulnerability research team to gather relevant information on proof-of-concept exploits they generate and engages..., etc.) Ability to analyze proof-of-concept exploit/CVE vulnerability and engineer it to be stabe and repeatable Extensive experience in reverse...

Vaxcom Services

capabilities are operationally ready to be used on live infrastructure Works with the vulnerability research team to gather... vulnerability and engineer it to be stabe and repeatable Extensive experience in reverse-engineering both compiled binaries...

Parsons

posture of Ivanti products. What You Will Be Doing: Conduct regular penetration tests and vulnerability assessments... progress of vulnerability remediation efforts and ensure that issues are addressed within agreed-upon timelines. Maintain...

Ivanti

's job description is as follows: Perform Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO... requirements and source code, to technical documentation and specifications. Performing long term, in depth vulnerability...

2HB Incorporated

The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research...

MIT Lincoln Laboratory

, you will be taking part in leading new projects. Key responsibilities: Research on territories with little-explored vulnerability... bars every day. Qualifications: Proven vulnerability research experience (preferably in iOS) - Must Experience...

Cellebrite

The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research...

MIT Lincoln Laboratory

/ Continuous Deployment) Experience. Research Experience. Experience with Software Reverse Engineering. Open-source contribution... technologies. Experience developing or customizing vulnerability exploit code. Experience with cloud penetration testing (AWS...

ApTask

Qualifications Demonstrated detailed knowledge and experience in vulnerability research (VR), reverse engineering (RE), hardware... developing advanced research projects in highly specialized areas of computer network operations (CNO); planning, coordinating...

Lockheed Martin

, and vulnerability research and exploitation against both the unique systems and technologies used by our customers, as well as approved... operations, Purple Team engagements, Vulnerability Research, and/or Exploitation. ● Experience in identifying security...

Securin