Get new jobs by email
$25 per hour
...way we approach complex challenges? Do you find satisfaction in developing innovative solutions that leverage the power of technology to... ...potential vulnerabilities and develop new capabilities to exploit and/or mitigate vulnerabilities. *USE OF THIS CLASSIFICATION REQUIRES...SuggestedFull timeContract workTemporary workWork experience placementWork at officeRemote workRelocationRelocation packageFlexible hoursShift work$300 per month
...programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and... ...to find the perfect match.** • Vulnerability analysts • Exploit developers • Hardware/ Software reverse engineers •...SuggestedFull timeTemporary workWork experience placementWork at officeRemote workRelocationRelocation packageFlexible hoursShift work- A leading technology company is hiring a Software Reverse Engineer in Woburn, MA. This role involves researching vulnerabilities in cyber physical systems and requires an Active Top Secret security clearance. Candidates should have a strong background in reverse engineering...Suggested
- ...A federal solutions company seeks a Senior Software Developer to join their team in Fort Belvoir, Virginia. In this role, you will be responsible for offensive capability development, including exploits and shellcode creation, dynamic analysis, and malware development...SuggestedFlexible hours
- ...is seeking an experienced, motivated and resourceful Front End Developer to join our team. Help us to build efficient, beautiful and... ...web frameworks Strong knowledge of common PHP or web server exploits and their solutions Experience with limitations of PHP as a...SuggestedFull time
- ...services to customers. You are right at home interacting with developers who work in SaaS production environments. Secure Cloud Architecture... ...status, or any other legally protected status. We discriminate against hackers who try to exploit businesses of all sizes....SuggestedFull timeRemote workHome officeFlexible hours
$140k - $180k
...results. Synack's PTaaS platform has uncovered more than 71,000 exploitable vulnerabilities to date, protecting a growing list of Global... ..., you will be part of a fast-paced, collaborative team developing our Red Team platform. You will be a critical contributor to...SuggestedContract workRemote work- ...leading the cybersecurity market toward a more secure approach of blocking the exploits of application vulnerabilities. POSITION OVERVIEW We’re looking for an experienced Front-End Web Developer with deep, hands-on expertise in Webflow to own and maintain a high-...SuggestedFull timeWork at office
- ...dpartement I-ICT. Vous rejoignez une squad Agile/Scrum Bruxelles et contribuez au dveloppement de solutions Java critiques pour l'exploitation ferroviaire. Responsabilits Assurer le leadership technique sur un scope back?end critique pour lexploitation...SuggestedContract workTemporary workFreelanceWork at office
$86.46k - $146.98k
...technology, superior products, and intelligence solutions. As you develop the latest technology and defend national security, you will... ...Systems' game-changing defense and commercial electronics. Exploiting every electron, we push the limits of what is possible, giving...SuggestedFull timeWork experience placementLocal areaShift workNight shiftDay shift- ...Familiarity with malicious code identification and common hacker attack techniques Ability to research and reproduce vulnerability exploitation Understanding of advanced cryptographic concepts. Ability to demonstrate manual testing experience including all of OWASP...Suggested
$77.81k - $132.28k
...technology, superior products, and intelligence solutions. As you develop the latest technology and defend national security, you will... ...Systems' game-changing defense and commercial electronics. Exploiting every electron, we push the limits of what is possible, giving...SuggestedFull timeShift work- ...cybersecurity incidents impacting applications or cloud infrastructure (exploited vuln, credential stuffing, web/API attacks). Partner with... ...to Rain's architecture. Collaborate with the GRC team to develop and deliver internal security awareness initiatives, phishing...SuggestedLocal area
$192k - $240k
...reviews, penetration testing, and vulnerability management. You will develop and maintain tooling to perform static and dynamic testing of... ...ability to find vulnerabilities in complex systems and craft exploits to demonstrate business impact. This role is highly cross...SuggestedWork experience placementWork at officeRemote workWork from home- ...Stay up to date with the latest application security threats, vulnerabilities, and exploits The Essentials ~3 to 5 years proven software engineering experience developing and maintaining scalable, Cloud-native software solutions, including familiarity with container...SuggestedWork at office
- ...utilize static analysis to identify vulnerable code patterns that can be exploited by adversaries. Use dynamic analysis, fuzzers and code reviews to find weaknesses in our codebase and work with developers to patch them. Fix Vulnerabilities Across the Full Stack:...Remote workShift work
- ...knowledge of web application security vulnerabilities Experience developing applications that utilize web application frameworks... ...OS, SAST/DAST scanners, Sqlmap, SOAPUI/OPENAPI) Developed exploits for web application vulnerabilities Exposure to public-sector...Local areaImmediate startRemote work
- ...distributed database rethinking the way Ignite executes SQL queries and exploiting massive parallelization as well as other CPU/GPU capabilities to dramatically speed the system up. Design and develop enhancements for query execution runtime: do research, check ideas,...Remote work
$165k - $195k
...We are searching for a Top Secret cleared Cloud Developer (Senior) to join our team in Washington, DC. You will be working in an... ...applications to assist with operational data discovery, data exploitation, data analytics, and data visualization tools. The section works...Temporary work$160k - $180k
...center networks using encryption and trusted applications, and exploit and exit whenever they want. But all of that movement is visible... ...releases each week. Our cloud services and platform are developed primarily in Go with a focus on security, scalability, and stability...Remote workFlexible hours$160.28k - $195.9k
...and as assigned globally. Transitioning a lead into a fully developed opportunity, including creating detailed Statements of Work and... ...schemes that falsely claim to represent Solventum and seek to exploit job seekers. Please note that all email communications from...Local areaFlexible hours$176k - $207k
...Code Team Semgrep is on a mission to make it expensive to exploit software. As the team behind the most popular SAST, we built the... ...security tools to help people secure the software their developers are writing. Whether it's through writing tooling to tailor Semgrep...Weekend work$150k - $220k
...autonomous AI agents powered by their in-house models that can find, exploit, and patch complex vulnerabilities in web applications at... ...Role & Responsibilities We are seeking a skilled Full-Stack Developer with a focus on backend and AI. The ideal candidate will have strong...Full timeRelocation package- ...Overview What We're Looking For As an Embedded Developer at CyberPoint, you support numerous challenging, mission-critical projects that... ...Will Set You Apart * Experience with vulnerability analysis and exploit development * Experience with Python * Experience with Assembly...For contractorsLocal area
- ...ETL Java Developer SME Leidos has a new and exciting opportunity for an ETL Java Developer SME in our National Security Sector's (NSS... ...And develops custom code/scripts to quickly extract, triage, and exploit data across domains and data stores. Job Responsibilities...Immediate startFlexible hours
$154.05k - $278.48k
...Description Leidos has a new and exciting opportunity for a ETL Java Developer SME in our National Security Sector's (NSS) Cyber & Analytics... ...develops custom code/scripts to quickly extract, triage, and exploit data across domains and data stores. Job Responsibilities...Local areaImmediate startFlexible hours- ...criminal and state-sponsored adversary groups, and ultimately developing finished intelligence products that provide a decision advantage... ...Discover, analyze and track advanced cyber campaigns that exploit security issues in mobile platforms or leverage mobile malware...Work at officeRemote workFlexible hours
$164.2k - $328.4k
...software. Our software tools enable companies around the world to develop highly innovative electronic products faster and more cost-... ...from the solution by developing and enhancing methodology that exploits the solutions capabilities Ensure customers are kept up-to-date...Full timeWork at officeFlexible hours- ...Analysis: Discover, analyze and track advanced cyber campaigns exploiting mobile platforms or leveraging mobile malware. Enhance... ...mobile tools and malware through reverse engineering. Develop and maintain tools to automate analysis tasks and tracking of...Work at officeRemote workFlexible hours
- ...Overview Full Stack Developer Location: Preferred: St. Louis | Alternate: Chantilly, Alexandria Clearance: Top Secret/SCI... ...design, development and testing specific to data ingestion and exploitation application. Provide status on development tasks to meet program...


