Get new jobs by email
- ...Polygraph. Intezra, Inc. is seeking a Software Engineer & Exploitation Capability Integrator . In this role, you'll work on the front... ...and unclassified networks. Responsibilities: Architect, develop, and deploy mobile and enterprise capabilities to support...SuggestedContract workLocal area
- Software Engineer - Mobile Exploitation & Reverse Engineering Software Engineer - Mobile Exploitation & Reverse Engineering 19 hours ago... ...things down to build something better? We’re hiring a developer who’s equally comfortable writing application code as they are...SuggestedFull timePart timeInternship
- ...Description Leidos has an exciting opportunity for an Exploitation Specialist/GDAT Software Engineer to join our team in St. Louis... ...Data Analysis Tool-Modernized (GDAT-M) application developed by customer. The GDATM application serves the customer, its ASG...SuggestedFor contractors
- ...Certifies that protection and detection capabilities are acquired or developed, and maintained using the Cybersecurity engineering approach... ...common security threats, attack vectors, vulnerabilities and exploits * Proficient knowledge of common operating systems, protocols...SuggestedFull timeTemporary workWork at officeLocal areaImmediate startRemote workWork visa
- ...TechConnect and DeepDive collaboration sessions with our entire technical staff. Your Mission: As an Exploit Engineer III, you will play a leading role in designing, developing, and testing advanced proof-of-concept exploits across various platforms in a secure, ethical...Suggested
- Full-time Company Description GRIMM researches and develops the art of the possible in business modernization and computing technologies... ..., not just textbooks. Job Description We’re searching for Exploit to support the client’s tactical and strategic approaches for mission...SuggestedFull time
- ...Familiarity with malicious code identification and common hacker attack techniques • Ability to research and reproduce vulnerability exploitation • Understanding of advanced cryptographic concepts. • Ability to demonstrate manual testing experience including all of...SuggestedFull time
- ...About Semgrep Semgrep is on a mission to make it expensive to exploit software. As the team behind the most popular SAST, we built... ...do Lead and Scale the Enterprise SE Team Recruit, retain, develop and coach top SE talent as we expand from our current team to meet...SuggestedFull timeFor contractorsWeekend work
- ..., or dive deeper into existing skills. In depth understanding of common attacker tools and techniques, and how they are can be exploited by insecure development practices. Experience with vulnerability assessment tools. Strong communication skills with the ability...SuggestedFull timeWorldwide
- ...has an immediate opening for an on-site C++ Software Engineer/Developer with AWS experience working with a company that is committed... ...Cutting edge technologies in digital signal processing, image exploitation, and machine learning/artificial intelligence. A team of...SuggestedTemporary workFor contractorsWork at officeImmediate startWorldwideFlexible hours
- ...Knowledge of cybersecurity frameworks and vulnerability methodologies Demonstrates a basic understanding of how a variety of exploits work and shows skills in enumerating and selecting the correct exploit for a given system Additional Information Compensation...SuggestedFull timeCasual workWork at office
- ...translate them into technical specifications. Ensure the scalability and performance of analytics solutions to meet business needs. Develop and enforce best practices for data governance and security within the analytics environment. Conduct regular audits and...SuggestedRemote jobTemporary workDay shift
- ...To support Navy Federal’s Data Architecture organization, we are seeking a skilled and experienced Sr Principal Data Architect to develop and implement data strategies and frameworks that align with the organization's business goals. As a Data Architect, you will be responsible...SuggestedInternshipMonday to Friday
- Job Description At Oracle Cloud Infrastructure (OCI), we build the future of the cloud for Enterprises as a diverse team of fellow creators and inventors. We act with the speed and attitude of a start-up, with the scale and customer-focus of the leading enterprise software...SuggestedFlexible hours
$175k - $190k
...mission in a dynamic, fast-paced environment. This role involves developing, enhancing, and maintaining software systems used across... ...to adapt or reverse engineer existing proof-of-concept (POC) exploits. #cjpost #LI-RD In support of pay transparency at...SuggestedFull timeLocal area- ...About Semgrep Semgrep is on a mission to make it expensive to exploit software. As the team behind the most popular SAST, we built... ...security tools to help people secure the software their developers are writing. Whether its through writing tooling to tailor Semgrep...Full timeContract workWeekend work
- ...software. Our software tools enable companies around the world to develop highly innovative electronic products faster and more cost-... ...from the solution by developing and enhancing methodology that exploits the solutions capabilitiesEnsure customers are kept up-to-date...Full timeWork at officeLocal areaWork from homeFlexible hours
- ...Grove Technologies, LLC, a dynamic and fast-growing federal contractor, is seeking a highly skilled and motivated Software Tool/Exploit Developer to support the Defense Threat Reduction Agency’s (DTRA) Advance Red Cyber program in executing Red Team Assessments. Oak...For contractorsWork experience placementWork at officeRemote work
- ...chartered with providing the skills and innovative technologies to develop, design, produce and sustain secure products across our Lines... ...a dynamic team environment and the ability to work with Cyber Exploitation Engineers, Cyber System Security Engineers and system...Full timeInterim roleWork at officeRemote workRelocationFlexible hoursShift work3 days per week
- ...systems Demonstrates a basic understanding of how a variety of exploits work and shows skills in enumerating and selecting the correct... ...rise, and we are excited to invite an experienced full-stack developer with a strong focus on frontend development to join our...Full timeCasual workWork at office
- ...communities of players. We are a global team of game lovers who are developing, publishing and innovating the mobile games industry,... ...working with QA teams to improve gameplay experience, curtail exploits and ensure that everything works smoothly Collaborating and...Full timeCasual workLocal areaImmediate startRemote work
- ...communities of players. We are a global team of game lovers who are developing, publishing and innovating the mobile games industry,... ...working with QA teams to improve gameplay experience, curtail exploits and ensure that everything works smoothly Collaborating and...Full timeCasual workLocal areaImmediate startRemote work
- ...of enabling organizations to proactively find, fix and verify exploitable attack vectors before criminals exploit them. Our flagship product... ..., interests, and career goals. Responsibilities: Develop core product features in ETL (Extract, Transform, Load) and GraphQL...Full timeRemote workFlexible hours
- ...professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Designs, develops, and implements complex enterprise software solutions in Adobe. Collaborates closely with technical and non-technical roles such...Work at officeRemote workFlexible hours
$78.4k - $141.63k
Overview The Virtual Server Engineering (VSE) team provides infrastructure design, implementation, and management for virtualized infrastructure and the supporting physical server infrastructure. These services include virtualization platforms, disaster recovery, migration...InternshipMonday to Friday- ...security analysis solutions. This fully remote role involves developing detection logic, automation, and visualizations to help clients... ...supplemental detection coverage for high-risk vulnerabilities and exploits Contribute to the evolution of security policies,...Full timeWork at officeLocal areaRemote work
- ...scale. If youre passionate about CTFs, vulnerability research, exploit development, or just love breaking things to understand them... ...software Collaborating cross functionally with engineers to develop secure services Auditing source code for security vulnerabilities...Full timeTemporary work16 hoursFlexible hours
$80k - $100k
...Elastic Stack solutions (Elasticsearch, Logstash, Kibana, Beats) to support search, analytics, observability, and security needs. Develop efficient queries and indexing strategies, optimize performance, and manage large-scale data pipelines. Automate data workflows...Full timeImmediate startRemote work- ...About Semgrep Semgrep is on a mission to make it expensive to exploit software. As the team behind the most popular SAST, we built... ...platforms. You will: Work with the team to manage, maintain, develop, and optimize our cloud infrastructure Lead major...Full timeContract workFor contractorsFor subcontractorWork at officeWeekend work
- ...elite team of security researchers, youll work alongside CNO developers and hardware engineers, conducting cutting-edge vulnerability... ...security weaknesses, and developing innovative proof-of-concept exploits. If youre passionate about wireless security, embedded firmware...Full timeContract workLocal area