Get new jobs by email
$170k - $260k
...Software Engineer & Exploitation Capability Integrator Intezra Inc. is a highly technical start-up that specializes in cyber development... ...unclassified networks. Responsibilities: Architect, develop, and deploy mobile and enterprise capabilities to support...SuggestedContract workLocal area$10k
...TechConnect and DeepDive collaboration sessions with our entire technical staff. Your Mission: As an Exploit Engineer III, you will play a leading role in designing, developing, and testing advanced proof-of-concept exploits across various platforms in a secure, ethical...Suggested- Full-time Company Description GRIMM researches and develops the art of the possible in business modernization and computing technologies... ..., not just textbooks. Job Description We’re searching for Exploit to support the client’s tactical and strategic approaches for mission...SuggestedFull time
$126.1k - $227.95k
...software team, creating next-generation capabilities for GEOINT exploitation and analysis. The ideal candidate will possess a strong blend... ...capabilities. You will be instrumental in architecting and developing cutting-edge solutions, leading technical initiatives, and...SuggestedContract work$112k - $179k
...and malware analysis efforts). Background: Conduct software exploitation against applications, middleware, operating systems (OS) user... ...in mobile industry and mobile development. Experience developing/designing mobile phone platforms highly desired. Experience...SuggestedPart timeWork experience placement$193.4k - $220.7k
...work and how our customers interact with Capital One. Design, develop, test, deploy, and support AI software components including... ...expertise in hardware, software, and AI enable you to see and exploit optimization opportunities that others miss. You are a resilient...SuggestedFull timePart timeLocal area$146k - $234k
...across enterprise-level GEOINT systems, including the Analytic and Exploitation Environment, Foundation GEOINT Mission, and Compartmented... ...Support resource planning and cross-team coordination. Develop and maintain project schedules aligned to strategic milestones...SuggestedPart timeFor contractorsWork at office- ...binaries, including Ghidra or IDA Pro Experience with finding and exploiting vulnerabilities in firmware binaries using static and dynamic... ...such as Android or iOS Experience with extending or modifying developed exploit chains to devices or microcontrollers Top Secret...SuggestedFull timePart timeWork experience placementRemote work
- ...work and how our customers interact with Capital One. Design, develop, test, deploy, and support AI software components including... ...expertise in hardware, software, and AI enable them to see and exploit optimization opportunities that others miss. Is a resilient...SuggestedPart time
$104.65k - $189.18k
...DevOps Software Engineer working with a dynamic team to design, develop and deploy a state-of-the-art technology stack supporting the... ...centralize and standardize Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) of Open Source Intelligence (OSINT)...SuggestedContract workRemote workFlexible hoursCNO - Senior Embedded Software Engineer - C, C++, Linux 07-26-2024 Annapolis Junction, MD Branc[...]
$220k - $265k
...engineering, x86 Assembly, and automated unit testing in Python to develop capabilities, research existing functionality, perform protocol... ...Desired skills: Experience with vulnerability analysis and exploit development Experience with Python Experience with Assembly Knowledge...SuggestedHourly payExtra incomeTemporary workImmediate startFlexible hours$65 - $75 per hour
...advocate, driving issue resolution to achieve client satisfaction. Develop and maintain code/scripts, preferably in Python, in partnership... ...such as NodeJS, Ruby, etc., is a plus. Understanding of exploits, malware, ransomware, and their defenses. Experience in...SuggestedHourly payContract workMonday to FridayShift work2 days per week3 days per week- ...embedded systems and software to identify vulnerabilities and develop robust countermeasures. This position is ideal for problem-solvers... ...and security flaws. * Develop and implement strategies for exploitation and defense of embedded systems. * Collaborate with cross-...SuggestedContract workWork experience placementLocal area
- ...Job Description Job Description Vulnerability Researcher / Exploit Developer Location: Maryland At REDLattice, we are a global leader in providing differentiated cyber products and services. As we continue to evolve in a rapidly changing cyber landscape, REDLattice...Suggested
$193.4k - $220.7k
...work and how our customers interact with Capital One. Design, develop, test, deploy, and support AI software components including... ...expertise in hardware, software, and AI enable you to see and exploit optimization opportunities that others miss. You are a resilient...SuggestedFull timePart timeLocal area- ...shall provide guidance of potential cyber threats, attacks, and exploitations and advise decision-makers of the inherent risks and... ...maintenance of a new application. The Contractor shall design and develop the application in a Web environment. The Contractor shall analyze...For contractors
$116k - $193k
...environments ~ Infrastructure as Code (IaC) security expertise with Terraform, Ansible, or similar tooling ~ Reverse engineering and exploit mitigation skills in enclave settings ~ Cross platform expertise across Linux, Windows, and hybrid operating systems in air...Full timePart timeFor subcontractorCurrently hiringRemote work$130k - $280k
...security engineer, software engineer, site reliability engineer, or security consultant ~ Understanding of security weaknesses, exploits, attacks and mitigations ~ Experience and enthusiasm for learning about new security products, features, and strategies; ~...Full timePart timeImmediate start$225.4k - $257.2k
...work and how our customers interact with Capital One. Design, develop, test, deploy, and support AI software components including... ...expertise in hardware, software, and AI enable you to see and exploit optimization opportunities that others miss. You are a resilient...Full timePart timeLocal area- ..., or dive deeper into existing skills. In depth understanding of common attacker tools and techniques, and how they are can be exploited by insecure development practices. Experience with vulnerability assessment tools. Strong communication skills with the ability...Part timeWorldwide
$100.8k - $172.8k
...implement IAS' security framework and application protections. Develop security standards and best practices for the R&D organization,... ...practices are followed. ~ Direct experience using tools to exploit vulnerabilities. ~ Working knowledge of AI tools and...Full timePart time$113k - $159.55k
...reduce the introduction of program design flaws that may lead to exploitation. This role also includes hands-on coding responsibilities to... ...testing and remediation of findings. Collaborate with developers to provide repetitive validation testing prior to production...Part timeWork from home3 days per week- ...Computer Exploitation Test Engineer Praescient Analytics has an immediate opening for a 2nd Battalion (BN) Detachment (DET) A Computer... ...analytic disputes and conflict resolution. Demonstrate ability to develop concise, insightful, and comprehensive products for defense...Part timeImmediate startWorldwide
- ...and by collaborating across multiple intelligence and information sources to support mission-critical intelligence requirements. • Exploit imagery through tools such as Remote View, SOCET GXP, and iSpy. • Utilize geospactial analysis and production tools, including...Immediate startRemote workFlexible hours
- ...work and how our customers interact with Capital One. Design, develop, test, deploy, and support AI software components including... ...expertise in hardware, software, and AI enable them to see and exploit optimization opportunities that others miss. A resilient trail...Part time
- ...project and system integration efforts focused on dataset collection and exploitation in support of operational needs. This role involves working with internal and external partners to design, develop, and enhance data acquisition strategies and exploitation platforms....
- ...research, and reverse-engineering for mobile devices. You will perform a variety of activities, including application development, exploit testing/debugging, reverse-engineering mobile applications/SDKs, and vulnerability research. Responsibilities: Test and debug...
- ...Postal Code: 97222 Job Description Title: .Net Applications Developer Duration: 12 Months Contract To Hire Location: Portland,... ...proposed solutions are properly understood and appropriately exploited. Service-Level Management (SLMO) Performs defined tasks to...Contract workPart time
$170k - $210k
...experienced Cloud Engineer SME to maintain and enhance an existing social media data exploitation platform. The candidate will work within an existing team environment. Work will include developing enhancements to an existing service-based web application. Responsibilities...Part time$126.1k - $227.95k
...centralize and standardize Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) of Open Source Intelligence (OSINT)... ...software development and system engineering. Experience developing basic tooling and scripting: UNIX shell, Python, Perl or similar...Part timeRemote work