Get new jobs by email
$135k - $216k
A national security company in Maryland is looking for a Mobile Software Reverse Engineer to conduct software exploitation, reverse engineer malicious programs, and support development efforts. The ideal candidate will have over 10 years of experience, exceptional communication...Suggested$73.45k - $132.78k
Description Leidos has an exciting opportunity for an Exploitation Specialist/GDAT Software Engineer to join our team in St. Louis, MO.... ...Geospatial Data Analysis Tool‑Modernized (GDAT‑M) application, developed by the customer. GDAT‑M serves the customer, ASG...SuggestedFor contractorsLocal areaImmediate start- ...infrastructure. Our teams lead advanced vulnerability analysis and develop tailored cyber solutions to meet the demands of rapidly... ...(both legitimate and malicious) to understand system behavior, exploits, or undocumented APIs. Conduct vulnerability research and proof...Suggested
- ...required Travel: ~5% The Mission Design, build, and validate exploit and implant toolchains used in realistic adversary emulation. Your... ...senior DoD mission‑assurance decisions. What You’ll Do Develop exploit code, in‑memory loaders, kernel/userland persistence, and...Suggested
$150k - $200k
...the Role Reveal Technology is seeking a Senior Full Stack Developer to build applications and services across multiple environments... ..., FastAPI backend APIs, database systems, SDR integration, exploitation framework interfaces, and cloud infrastructure. This is a...SuggestedRemote jobFull timeHome officeCNO - Senior Embedded Software Engineer - C, C++, Linux 07-26-2024 Annapolis Junction, MD Branc[...]
$220k - $265k
...engineering, x86 Assembly, and automated unit testing in Python to develop capabilities, research existing functionality, perform protocol... ...Desired skills: Experience with vulnerability analysis and exploit development Experience with Python Experience with Assembly Knowledge...SuggestedHourly payExtra incomeTemporary workImmediate startFlexible hours- ...criticality of the work we are doing We are looking for a PHP Developer responsible for developing and updating server side code, to... ...● Strong knowledge of the common PHP or web server exploits and their solutions ● Integration of multiple data sources and...SuggestedContract workRemote work
- ...including at the endpoint, ThreatLocker helps businesses stop exploits before they happen and move from reactive defense to proactive... ...POSITION OVERVIEW ThreatLocker's Microsoft Cloud Full Stack Developers support the development, expansion and maintenance of our...SuggestedWork at office
- A highly skilled cybersecurity firm is seeking a Vulnerability Researcher / Exploit Developer to join their team in Maryland. This role involves conducting advanced vulnerability research and exploit development, with a strong focus on Linux kernel development and reverse...Suggested
- Vulnerability Researcher / Exploit Developer Vulnerability Researcher / Exploit Developer Location: Maryland At REDLattice, we are a global leader in providing differentiated cyber products and services. As we continue to evolve in a rapidly changing cyber landscape, REDLattice...Suggested
- A defense technology company is seeking a Senior Software Developer to develop exploits, shellcode, and mitigation bypassing. Responsibilities include offensive capability development and conducting dynamic analysis in a highly technical environment. Candidates must have...SuggestedFlexible hours
- ...familiarity with the GEOINT Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Architecture. Responsibilities... ...baseline (requirements, interfaces, architectures). Develop architecture artifacts, project plans, CONOPS, requirements, and...SuggestedPermanent employmentContract workWork experience placementLocal areaRemote work
$104k - $130k
...position will also be responsible for educating and mentoring developers on secure coding and application security best practices.... ...engineering tools (IDA, etc.). Ability to write proof-of-concept exploits. Agile experience. Thrive at BlackLine Because You...SuggestedTemporary workWork at officeShift work2 days per week3 days per week$187k - $220k
...recommendations and solutions Work with technical leads to develop strategies, programs, systems and tools that enhance our approach... ...~ Deep understanding of blockchain technologies, protocols, exploits, and frameworks and associated security risks ~ Security domain...SuggestedWork at officeFlexible hoursShift work3 days per week- Job Description The company is looking for an amazingly talented Senior Software Developer to join our team! In this role you will get to develop exploits, shellcode, and bypassing mitigations and conduct dynamic analysis. What You'll Be Doing Offensive capability development...SuggestedFlexible hours
- ...they will be tested on it-Want someone who has been a PySpark developer, SQL background is necessary - they will be interviewed on it -... ...Experience in developing data pipeline solutions to ingest and exploit new and existing data sources. - Expertise in leveraging SQL,...Full timeContract workWork at officeRemote work
- ...Overview BigBear.ai is seeking a Application Developer to join exciting, up-and-coming projects where you will design, develop, prototype... ..., and Go Deep experience with Vulnerability Research and Exploit Development Knowledge of end-to-end SIGINT collection and...Flexible hours
$235k - $255k
Description: Join our team as a Software Engineer and Exploitation Capability Integrator, where you'll architect, implement and deploy cutting... ...with customers to drive holistic end‑to‑end solutions. Develop software to operationalize and deploy mobile capabilities in production...Extra incomeContract work$135k - $216k
...and malware analysis efforts). Background: Conduct software exploitation against applications, middleware, operating systems (OS) user... ...Strategic and proactive mindset with the ability to identify and develop new opportunities for cross-agency collaboration that advance...Full timeContract workWork experience placementMonday to FridayShift work$100k - $125k
...and malware analysis efforts). Background: Conduct software exploitation against applications, middleware, operating systems (OS) user... ...passion in mobile industry and mobile development. Experience developing/designing mobile phone platforms highly desired. Experience...Full timeWork experience placement$112k - $179k
...and malware analysis efforts). Background: Conduct software exploitation against applications, middleware, operating systems (OS) user... ...strong passion for mobile industry and development. Experience developing or designing mobile platforms. Experience with wireless APIs...Work experience placementWorldwide- ...United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team... ...Responsibilities: Act as the lead Network Engineer in developing and implementing IT/network plans. Manages network operations...Contract workWork at officeWorldwide
- ...enterprise-ready, secure, and easy to adopt. You will be hands‑on developing and maintaining SDKs, REST APIs, and automation scripts,... ...against advanced threats like spyware, ransomware, and zero‑day exploits. Culture of transparency and respect: Work in an environment...Full timeRemote work
$103.8k - $192.3k
...Description: Accenture Federal Services is seeking an Embedded Developer to support numerous challenging, mission-critical projects that... ...if you have: Experience with vulnerability analysis and exploit development Experience with Python Experience with Assembly...Live inWork at officeLocal area$69.4k - $158k
...Job Number: R0231944 Embedded Developer The Opportunity: As an embedded software engineer, you know how to create and maintain... ...vSwitch, or QEMU Experience with vulnerability analysis and exploit development Experience with Python Experience with Assembly...Full timeContract workPart timeLocal areaRemote work- ...command and control. Position Summary As the Embedded Developer, the role will support numerous challenging, mission-critical... ...to haves): Experience with vulnerability analysis and exploit development Experience with Python Experience with Assembly...Full timeWork experience placementWork at officeMonday to FridayShift work
$8k
...has an exciting new, fully FUNDED opportunity for an Embedded Developer on our largest PRIME contract. Our team of Analysts and Engineers... ...- Deep experience with vulnerability research and exploit development - Knowledge of end-to-end SIGINT collection and...Permanent employmentContract workTemporary workImmediate startFlexible hours- ...VB6, C#, ASP.Net, VB.Net S, QL Server, Azure). Advanced analytical skills that are inline with the Microsoft Azure ecosystem that exploits the platform with minimal coding and maximum configuration. Advanced knowledge of web coding standards including HTML5 and CSS3....
$240k - $280k
...AD3 Description: You will act as an embedded developer/general-purpose CNO software engineer for up-and-coming projects... ...). Deep experience with Vulnerability Research and Exploit development. Knowledge of end-to-end SIGINT collection and...Flexible hours- ...blocking, Attack Surface Reduction (ASR), endpoint security, exploit protection, network protection, and Cloud Security Posture Management... ...technologies to include Organizational Change Management by developing end-user, help desk, and stakeholder communications....Full timeWork at office
