Get new jobs by email
Search Results: 185 vacancies
2025 PhD Graduate - Algorithm Researcher - Artificial Intelligence, Machine Learning, and Infor[...]
2025 PhD Graduate - Algorithm Researcher - Artificial Intelligence, Machine Learning, and Information Fusion Join to apply for the 2025 PhD Graduate - Algorithm Researcher - Artificial Intelligence, Machine Learning, and Information Fusion role at Johns Hopkins Applied...SuggestedFull timeTemporary workWork experience placementInterim roleInternshipRemote workRelocation packageFlexible hours- ...great employer can make – it's not just talk with our client, it's excellence in practice. They are seeking a Mobile Security Researcher to join their team. Relevant qualifications: -Bachelor's Degree -6+ years of professional experience -Experience with C...SuggestedFlexible hours
- ...employer can make – it's not just talk with our client, it's excellence in practice. They are seeking a Windows Vulnerability Researcher to join their team. Relevant qualifications: -Bachelor's Degree -6+ years of professional experience -Experience with C,...SuggestedFlexible hours
- ...Job Description Job Description What you will be doing! As an Embedded System Researcher , you will take a leadership role in advanced research and development efforts focused on embedded platforms. You will coordinate directly with customers, lead technical...Suggested
- ...Job Description Job Description What you will be doing! As a Level 3 Windows Security Researcher, you will be part of a team focused on conducting security research related to Windows technologies. The ideal candidate should be familiar with the latest techniques...Suggested
- ...Job Description Job Description What you will be doing! As a Mobile Vulnerability Researcher, you will work with a team to perform vulnerability research against mobile technologies. The candidate must be familiar with the latest techniques in vulnerability research...Suggested
- ...technical breakthroughs at the cutting edge of artificial intelligence (AI) and machine learning (ML)? Do you thrive in a collaborative research environment, working alongside an energetic, multidisciplinary team of scientists and engineers? Are you ready to help the US...SuggestedTemporary workWork experience placementInterim roleRelocation packageFlexible hours
- ...invests in the success of your career and well being, our client might be the perfect fit. They are seeking a Mobile Vulnerability Researcher to join their team. Relevant qualifications: -Knowledge of the Linux kernel and device drivers -Experience with C and...SuggestedRemote work
- ...Job Description Job Description What you will be doing! As a Software Application Researcher, you will work independently to identify flaws in software and software architecture design. You should be familiar with the latest techniques in vulnerability research...Suggested
- ...Legato, LLC recruiters (****@*****.***) would love to speak with you regarding the following position: Mobile Software Researcher in Annapolis Junction, MD. Security Clearance Required : TS/SCI w/ Polygraph Salary Range: $185,000-$194,000, depending...SuggestedBank staff
- ...holidays, 8% 401k, and more. If you are fully-cleared and work in Software Engineering, Data Science, Cyber/CNO/CNE, Vulnerability Research, or Cloud/Systems Infrastructure projects, our client likely has multiple efforts that would interest you. They are seeking a...Suggested
- ...great employer can make – it's not just talk with our client, it's excellence in practice. They are seeking a Mobile Vulnerability Researcher to join their team. Relevant qualifications: -Bachelor's Degree in Computer Science or similar -12+ years of professional...SuggestedFlexible hours
- ...Legato, LLC recruiters (****@*****.***) would love to speak with you regarding the following position: Vulnerability Researcher Security Clearance Required :TS/SCI with Polygraph Salary Range: $160,000-$230,000, depending on experience. We are seeking...SuggestedBank staff
- Cleared Vulnerability Researcher Bestgate Engineering is seeking a Software Engineer with expertise in vulnerability research, reverse engineering, and exploit development. The ideal candidate will support both OCO (Offensive Cyber Operations) and DCO (Defensive Cyber...Suggested
$95k - $114k
...Key Role: Conduct research and analysis to identify vulnerabilities and potential threat vectors into systems and networks, develop CNO and CNE exploits, enable capabilities, and engineer attack methodologies. Apply leading-edge principles, theories, and technologies...SuggestedFull time- ...Job Description Job Description Job Title: Distributed Application Researcher Location: Maryland At REDLattice, we're redefining the rules of the cyber game. Our mission goes beyond just protecting critical infrastructure—we're boldly exploring cyber strategies...Local area
- ...Job Description Job Description Job Title: Mobile Vulnerability Researcher Location: Maryland At REDLattice, we're redefining the rules of the cyber game. Our mission goes beyond just protecting critical infrastructure—we're boldly exploring cyber strategies...Local area
- ...need to achieve objectives successfully. Responsibilities: Identify flaws in software and its architecture. Conduct vulnerability research to find security issues. Document research findings meticulously. Write code in C, Python, and Assembly to exploit or control identified...Immediate startRelocation packageFlexible hours
- Job Description We are looking for an advanced physicist to join our team to train AI models. You will measure the progress of these AI chatbots, evaluate their logic, and solve problems to improve the quality of each model. In this role you will need to hold an...Hourly payFull timePart timeRemote work
- Works across fresh food departments like produce, deli, or bakery. Stocks shelves, rotates products, and assists customers with fresh product inquiries. Walmart