Get new jobs by email
- ...Grove Technologies, LLC, a dynamic and fast-growing federal contractor, is seeking a highly skilled and motivated Software Tool/Exploit Developer to support the Defense Threat Reduction Agency’s (DTRA) Advance Red Cyber program in executing Red Team Assessments. Oak...SuggestedFor contractorsWork experience placementWork at officeRemote work
$73.45k - $132.78k
...Description Leidos has an exciting opportunity for an Exploitation Specialist/GDAT Software Engineer to join our team in St. Louis... ...Data Analysis Tool-Modernized (GDAT-M) application, developed by the customer. GDAT-M serves the customer, ASG collaborators...SuggestedFor contractorsLocal areaImmediate start- ...infrastructure. Our teams lead advanced vulnerability analysis and develop tailored cyber solutions to meet the demands of rapidly... ...evolving needs of our customers. We are seeking a highly skilled Exploit Developer with strong reverse engineering capabilities to...Suggested
$70k - $190k
...Demonstrated leadership skills to lead the project team to develop great, innovative, high quality products that exceed customer expectations... ...developing and deploying analytics that discover and exploit social networks Experience documenting ontologies, data models...SuggestedContract workWork experience placementFlexible hours- ...based collection capabilities into ground processing and data exploitation requirements Collaborate with Customer stakeholders to... ...Services - AWS/Azure/Google Cloud Platform - GCP) Assist in developing Concepts of Operations (CONOPs) and Interface Control Document...SuggestedFor contractorsWork at officeLocal area
- ...community, defense, civil, and commercial markets. Principal Cyber Exploit Engineer Nightwing provides technically advanced full-... ...our end users in their spaces. Applicants will join a team of developers building high impact native applications for mobile devices,...SuggestedRelocationRelocation package
$200k - $250k
...Description Job Description Job Description Embedded Software Developer / Reverse Engineer (Network Device Focus) Columbia, MD | Full... ...environments Experience with vulnerability research and exploit development Knowledge of large-scale signal collection and analysis...SuggestedFull timeFor contractorsLocal area- ...solutions are leading the cybersecurity market toward a more secure approach of blocking the exploits of application vulnerabilities. POSITION OVERVIEW ThreatLocker's SQL Developer plays a key role in building and optimizing high-performance SQL queries that power...SuggestedWork at office
- ...development support to maintain and enhance an existing social media data exploitation platform. The Contractor will work within an existing team environment. Work will include developing enhancements to an existing service-based Java web application. Required...SuggestedFor contractorsLocal areaRemote work
- ...Description Overview BigBear.ai is seeking a Application Developer to join exciting, up-and-coming projects where you will design... ...Rust, and Go Deep experience with Vulnerability Research and Exploit Development Knowledge of end-to-end SIGINT collection and...SuggestedFlexible hours
- ...: B2i, Data Migration Team (DMT), Electronic Document OCR and exploitation (eDox), GitSMART, Electronic Records Analysis Team (ERAT), and... ...AEVEX uses agile and customized approaches to rapidly define, develop, and deliver specialized solutions for airborne special mission...SuggestedLocal areaRemote work
$177k - $187k
...the Annapolis Junction, MD area. Capabilities: Design and develop automated analytic software, techniques and algorithms... ...Experience developing and deploying analytics that discover and exploit social networks Experience documenting ontologies, data models...SuggestedWork experience placementLocal area$43.27 - $96.15 per hour
...techniques. Enablement of potential further analysis, repeatable exploitation processes, feature addition, and technical reporting are also... ...of our company is comprised of extremely talented software developers who write production tools which directly support one of two...SuggestedHourly payContract workFor contractorsLocal areaRemote workRelocation packageFlexible hours$70k - $190k
...Technologies is seeking a Cloud Engineer to join our intel team. The SWE develops, maintains, and enhances complex and diverse Big-Data cloud... ...developing and deploying analytics that discovers and exploit social networks. Experience documenting ontologies, data models...SuggestedWork experience placement$98k - $146k
...past forty-five plus years, we have supported Department of Defense customers by developing innovative remote sensing algorithms, tools, and techniques to deliver world-class data exploitation capabilities supporting missile defense; intelligence, surveillance, &...SuggestedTemporary workFor contractorsWork experience placementRemote workFlexible hours- ....Net Developer San Fransisco , CA 12+ months Mandatory Qualifications: Systems and Application Design... ...issues such as out-of-date libraries, insecure calls, and common exploits • Experienced in advanced NoSQL database design and usage...
- ...familiarity with the GEOINT Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Architecture. Responsibilities... ...baseline (requirements, interfaces, architectures). Develop architecture artifacts, project plans, CONOPS, requirements, and...Permanent employmentContract workWork experience placementLocal areaRemote work
$106k - $145.75k
...Applicants must remain alert to fraudulent job postings and recruitment schemes that falsely claim to represent Solventum and seek to exploit job seekers. Please note that all email communications from Solventum regarding job opportunities with the company will be from...H1bRemote workRelocation packageFlexible hours- ...detection, response, and mitigation. Conduct vulnerability assessments and manage remediation efforts, including tracking CISA Known Exploited Vulnerabilities (KEVs). Implement log aggregation, analysis, and security event monitoring using SIEM platforms such as Splunk....Remote work
$87.28k - $130.92k
...considered as a new security perimeter. Many cloud breaches today exploit misconfigurations and vulnerabilities in IAM. Citi is looking... ..., support and consume services in public cloud. Define and develop preventive guardrails, detective controls, and automated alerts...Full timeRemote work- ...NS2 Mission is currently seeking a driven and skilled Cloud Developer to join our team in Chantilly, VA. This Cloud Developer... ...existing service-based web application for social media data exploitation and analytics. Deploy and optimize AI models (e.g., for classification...Local areaFlexible hours
$190k - $240k
...! Belay Technologies is seeking a Senior Application Developer (Reverse Engineer) to join our intel team. Your will act as a... ...novel software vulnerabilities. Experience working as an exploitation analyst. Experience working as an interactive operator....Contract workWork experience placementFlexible hours- ...Position: Java Full stack Developer Location: San Francisco, CA or Sacramento, CA Duration: 24 Months Required... ...issues such as out-of-date libraries, insecure calls, and common exploits. Ability to take functional requirements and convert them...
$146k - $175k
...past forty-five plus years, we have supported Department of Defense customers by developing innovative remote sensing algorithms, tools, and techniques to deliver world-class data exploitation capabilities supporting missile defense; intelligence, surveillance, &...Full timeTemporary workFor contractorsWork experience placementWork at officeImmediate startRemote workFlexible hours$105k - $180k
...and Technical Intelligence. Looking for C++ Application Developers to work in a rapid pace, collaborative, small-team environment... ...integration within government frameworks Experience with the exploitation and analysis of OPIR, E/O, SAR, Spectral, RF, or other...Temporary workWork at officeRemote work$50k - $290k
...objectives closely aligned with end users. This role will focus on developing custom software tools and techniques for the Android platform... ...vulnerability analysis and developing proof-of-concept exploit software Debug and diagnose low-level software issues using...Contract workWork experience placement- ...aspects of managing and maintaining a set of enterprise hosted developer enablement tools that are used throughout global IT development... ...also be expected to work with the SRE teams on regular basis, to exploit the environment, and infrastructure tooling. Candidates will...Remote work
$204k - $284k
...multidisciplinary team of researchers and engineers dedicated to developing cutting-edge technologies with significant and immediate... ...cybersecurity solutions Performing vulnerability weaponization, exploit development, payload development, and exploit mitigation on a...Full timeWork experience placementLocal areaImmediate startNight shift$69.4k - $158k
...Junction,MD,US Share job via: Share Embedded Developer The Opportunity: As an embedded software engineer, you... ...vSwitch, or QEMU Experience with vulnerability analysis and exploit development Experience with Python Experience with...Full timeContract workPart timeWork at officeLocal areaRemote work$103.8k - $192.3k
...Description: Accenture Federal Services is seeking an Embedded Developer to support numerous challenging, mission-critical projects that... ...if you have: Experience with vulnerability analysis and exploit development Experience with Python Experience with...Live inWork at officeLocal area


