Get new jobs by email
  • $25 per hour

     ...way we approach complex challenges? Do you find satisfaction in developing innovative solutions that leverage the power of technology to...  ...potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. *USE OF THIS CLASSIFICATION REQUIRES... 
    Suggested
    Full time
    Contract work
    Temporary work
    Work experience placement
    Work at office
    Remote work
    Relocation
    Relocation package
    Flexible hours
    Shift work

    Lockheed Martin

    Hanover, MD
    4 days ago
  • $300 per month

     ...programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and...  ...to find the perfect match.** • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers •... 
    Suggested
    Full time
    Temporary work
    Work experience placement
    Work at office
    Remote work
    Relocation
    Relocation package
    Flexible hours
    Shift work

    Lockheed Martin

    Hanover, MD
    25 days ago
  • A leading technology company is hiring a Software Reverse Engineer in Woburn, MA. This role involves researching vulnerabilities in cyber physical systems and requires an Active Top Secret security clearance. Candidates should have a strong background in reverse engineering...
    Suggested

    STR

    Woburn, MA
    4 days ago
  •  ...A federal solutions company seeks a Senior Software Developer to join their team in Fort Belvoir, Virginia. In this role, you will be responsible for offensive capability development, including exploits and shellcode creation, dynamic analysis, and malware development... 
    Suggested
    Flexible hours

    Beyond SOF

    Fort Belvoir, VA
    2 days ago
  •  ...is seeking an experienced, motivated and resourceful Front End Developer to join our team. Help us to build efficient, beautiful and...  ...web frameworks Strong knowledge of common PHP or web server exploits and their solutions Experience with limitations of PHP as a... 
    Suggested
    Full time

    Tpd Careers

    United States
    16 hours ago
  •  ...services to customers. You are right at home interacting with developers who work in SaaS production environments. Secure Cloud Architecture...  ...status, or any other legally protected status. We discriminate against hackers who try to exploit businesses of all sizes.... 
    Suggested
    Full time
    Remote work
    Home office
    Flexible hours

    Huntress

    San Francisco, CA
    1 day ago
  • $140k - $180k

     ...results. Synack's PTaaS platform has uncovered more than 71,000 exploitable vulnerabilities to date, protecting a growing list of Global...  ..., you will be part of a fast-paced, collaborative team developing our Red Team platform. You will be a critical contributor to... 
    Suggested
    Contract work
    Remote work

    Synack

    Myrtle Point, OR
    1 day ago
  •  ...leading the cybersecurity market toward a more secure approach of blocking the exploits of application vulnerabilities.  POSITION OVERVIEW We’re looking for an experienced Front-End Web Developer with deep, hands-on expertise in Webflow to own and maintain a high-... 
    Suggested
    Full time
    Work at office

    Threatlocker

    Orlando, FL
    16 hours ago
  •  ...dpartement I-ICT. Vous rejoignez une squad Agile/Scrum Bruxelles et contribuez au dveloppement de solutions Java critiques pour l'exploitation ferroviaire. Responsabilits Assurer le leadership technique sur un scope back?end critique pour lexploitation... 
    Suggested
    Contract work
    Temporary work
    Freelance
    Work at office

    ICTCG

    Mission, KS
    16 hours ago
  • $86.46k - $146.98k

     ...technology, superior products, and intelligence solutions. As you develop the latest technology and defend national security, you will...  ...Systems' game-changing defense and commercial electronics. Exploiting every electron, we push the limits of what is possible, giving... 
    Suggested
    Full time
    Work experience placement
    Local area
    Shift work
    Night shift
    Day shift

    ClearanceJobs

    Saint Louis, MO
    2 days ago
  •  ...Familiarity with malicious code identification and common hacker attack techniques Ability to research and reproduce vulnerability exploitation Understanding of advanced cryptographic concepts. Ability to demonstrate manual testing experience including all of OWASP... 
    Suggested

    Bridge Technologies and Solutions

    Englewood, CO
    16 hours ago
  • $77.81k - $132.28k

     ...technology, superior products, and intelligence solutions. As you develop the latest technology and defend national security, you will...  ...Systems' game-changing defense and commercial electronics. Exploiting every electron, we push the limits of what is possible, giving... 
    Suggested
    Full time
    Shift work

    ClearanceJobs

    Springfield, VA
    3 days ago
  •  ...cybersecurity incidents impacting applications or cloud infrastructure (exploited vuln, credential stuffing, web/API attacks). Partner with...  ...to Rain's architecture. Collaborate with the GRC team to develop and deliver internal security awareness initiatives, phishing... 
    Suggested
    Local area

    RAIN Technologies

    Reno, NV
    3 days ago
  • $192k - $240k

     ...reviews, penetration testing, and vulnerability management. You will develop and maintain tooling to perform static and dynamic testing of...  ...ability to find vulnerabilities in complex systems and craft exploits to demonstrate business impact. This role is highly cross... 
    Suggested
    Work experience placement
    Work at office
    Remote work
    Work from home

    Brex

    Seattle, WA
    4 days ago
  •  ...Stay up to date with the latest application security threats, vulnerabilities, and exploits The Essentials ~3 to 5 years proven software engineering experience developing and maintaining scalable, Cloud-native software solutions, including familiarity with container... 
    Suggested
    Work at office

    Warner Bros.

    Atlanta, GA
    4 days ago
  •  ...utilize static analysis to identify vulnerable code patterns that can be exploited by adversaries. Use dynamic analysis, fuzzers and code reviews to find weaknesses in our codebase and work with developers to patch them. Fix Vulnerabilities Across the Full Stack:... 
    Remote work
    Shift work

    Onebrief

    Cape Coral, FL
    1 day ago
  •  ...knowledge of web application security vulnerabilities Experience developing applications that utilize web application frameworks...  ...OS, SAST/DAST scanners, Sqlmap, SOAPUI/OPENAPI) Developed exploits for web application vulnerabilities Exposure to public-sector... 
    Local area
    Immediate start
    Remote work

    Tyler Technologies

    Bangor, ME
    16 hours ago
  •  ...distributed database rethinking the way Ignite executes SQL queries and exploiting massive parallelization as well as other CPU/GPU capabilities to dramatically speed the system up. Design and develop enhancements for query execution runtime: do research, check ideas,... 
    Remote work

    GridGain

    United States
    2 days ago
  • $165k - $195k

     ...We are searching for a Top Secret cleared Cloud Developer (Senior) to join our team in Washington, DC. You will be working in an...  ...applications to assist with operational data discovery, data exploitation, data analytics, and data visualization tools. The section works... 
    Temporary work

    Jacobs

    Washington DC
    16 hours ago
  • $160k - $180k

     ...center networks using encryption and trusted applications, and exploit and exit whenever they want. But all of that movement is visible...  ...releases each week. Our cloud services and platform are developed primarily in Go with a focus on security, scalability, and stability... 
    Remote work
    Flexible hours

    ExtraHop Networks

    Richmond, VA
    16 hours ago
  • $160.28k - $195.9k

     ...and as assigned globally. Transitioning a lead into a fully developed opportunity, including creating detailed Statements of Work and...  ...schemes that falsely claim to represent Solventum and seek to exploit job seekers. Please note that all email communications from... 
    Local area
    Flexible hours

    Solventum

    Pittsburgh, PA
    1 day ago
  • $176k - $207k

     ...Code Team Semgrep is on a mission to make it expensive to exploit software. As the team behind the most popular SAST, we built the...  ...security tools to help people secure the software their developers are writing. Whether it's through writing tooling to tailor Semgrep... 
    Weekend work

    Semgrep

    San Francisco, CA
    3 days ago
  • $150k - $220k

     ...autonomous AI agents powered by their in-house models that can find, exploit, and patch complex vulnerabilities in web applications at...  ...Role & Responsibilities We are seeking a skilled Full-Stack Developer with a focus on backend and AI. The ideal candidate will have strong... 
    Full time
    Relocation package

    MindFort AI (YC X25)

    Los Angeles, CA
    3 days ago
  •  ...Overview What We're Looking For As an Embedded Developer at CyberPoint, you support numerous challenging, mission-critical projects that...  ...Will Set You Apart * Experience with vulnerability analysis and exploit development * Experience with Python * Experience with Assembly... 
    For contractors
    Local area

    CyberPoint International

    Beltsville, MD
    16 hours ago
  •  ...ETL Java Developer SME Leidos has a new and exciting opportunity for an ETL Java Developer SME in our National Security Sector's (NSS...  ...And develops custom code/scripts to quickly extract, triage, and exploit data across domains and data stores. Job Responsibilities... 
    Immediate start
    Flexible hours

    ClearanceJobs

    Bethesda, MD
    2 days ago
  • $154.05k - $278.48k

     ...Description Leidos has a new and exciting opportunity for a ETL Java Developer SME in our National Security Sector's (NSS) Cyber & Analytics...  ...develops custom code/scripts to quickly extract, triage, and exploit data across domains and data stores. Job Responsibilities... 
    Local area
    Immediate start
    Flexible hours

    Leidos

    Bethesda, MD
    1 day ago
  •  ...criminal and state-sponsored adversary groups, and ultimately developing finished intelligence products that provide a decision advantage...  ...Discover, analyze and track advanced cyber campaigns that exploit security issues in mobile platforms or leverage mobile malware... 
    Work at office
    Remote work
    Flexible hours

    CrowdStrike

    Albuquerque, NM
    3 days ago
  • $164.2k - $328.4k

     ...software. Our software tools enable companies around the world to develop highly innovative electronic products faster and more cost-...  ...from the solution by developing and enhancing methodology that exploits the solutions capabilities Ensure customers are kept up-to-date... 
    Full time
    Work at office
    Flexible hours

    Siemens AG

    San Diego, CA
    3 days ago
  •  ...Analysis: Discover, analyze and track advanced cyber campaigns exploiting mobile platforms or leveraging mobile malware. Enhance...  ...mobile tools and malware through reverse engineering. Develop and maintain tools to automate analysis tasks and tracking of... 
    Work at office
    Remote work
    Flexible hours

    CrowdStrike

    United States
    3 days ago
  •  ...Overview Full Stack Developer Location: Preferred: St. Louis | Alternate: Chantilly, Alexandria Clearance: Top Secret/SCI...  ...design, development and testing specific to data ingestion and exploitation application. Provide status on development tasks to meet program... 

    Bailey Information Technology Consultants, LLC

    Saint Louis, MO
    3 days ago