Get new jobs by email
Search Results: 185 vacancies
2025 PhD Graduate - Algorithm Researcher - Artificial Intelligence, Machine Learning, and Infor[...]
2025 PhD Graduate - Algorithm Researcher - Artificial Intelligence, Machine Learning, and Information Fusion Join to apply for the 2025 PhD Graduate - Algorithm Researcher - Artificial Intelligence, Machine Learning, and Information Fusion role at Johns Hopkins Applied...SuggestedFull timeTemporary workWork experience placementInterim roleInternshipRemote workRelocation packageFlexible hours- ...great employer can make – it's not just talk with our client, it's excellence in practice. They are seeking a Mobile Security Researcher to join their team. Relevant qualifications: -Bachelor's Degree -6+ years of professional experience -Experience with C...SuggestedFlexible hours
- ...What you will be doing! As an Embedded System Researcher , you will take a leadership role in advanced research and development efforts focused on embedded platforms. You will coordinate directly with customers, lead technical teams, and drive complex projects from...SuggestedFull time
- ...Legato, LLC recruiters (****@*****.***) would love to speak with you regarding the following position: Vulnerability Researcher Security Clearance Required :TS/SCI with Polygraph Salary Range: $160,000-$230,000, depending on experience. We are seeking...SuggestedBank staff
- ...holidays, 8% 401k, and more. If you are fully-cleared and work in Software Engineering, Data Science, Cyber/CNO/CNE, Vulnerability Research, or Cloud/Systems Infrastructure projects, our client likely has multiple efforts that would interest you. They are seeking a...Suggested
- ...great employer can make – it's not just talk with our client, it's excellence in practice. They are seeking a Mobile Vulnerability Researcher to join their team. Relevant qualifications: -Bachelor's Degree in Computer Science or similar -12+ years of professional...SuggestedFlexible hours
- Join to apply for the Machine Learning Researcher role at Johns Hopkins Applied Physics Laboratory Join to apply for the Machine Learning Researcher role at Johns Hopkins Applied Physics Laboratory Johns Hopkins Applied Physics Laboratory provided pay range This range...SuggestedFull timeTemporary workWork experience placementInterim roleRelocation packageFlexible hours
- ...Legato, LLC recruiters (****@*****.***) would love to speak with you regarding the following position: Mobile Software Researcher in Annapolis Junction, MD. Security Clearance Required : TS/SCI w/ Polygraph Salary Range: $185,000-$194,000, depending...SuggestedBank staff
- ...What you will be doing! As a Mobile Vulnerability Researcher, you will work with a team to perform vulnerability research against mobile technologies. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to...SuggestedFull time
- ...invests in the success of your career and well being, our client might be the perfect fit. They are seeking a Mobile Vulnerability Researcher to join their team. Relevant qualifications: -Knowledge of the Linux kernel and device drivers -Experience with C and...SuggestedRemote work
- ...Job Description Job Description What you will be doing! As a Software Application Researcher, you will work independently to identify flaws in software and software architecture design. You should be familiar with the latest techniques in vulnerability research...Suggested
- ...Job Description Job Description What you will be doing! As a Level 3 Windows Security Researcher, you will be part of a team focused on conducting security research related to Windows technologies. The ideal candidate should be familiar with the latest techniques...Suggested
- ...employer can make – it's not just talk with our client, it's excellence in practice. They are seeking a Windows Vulnerability Researcher to join their team. Relevant qualifications: -Bachelor's Degree -6+ years of professional experience -Experience with C,...SuggestedFlexible hours
- Cleared Vulnerability Researcher Bestgate Engineering is seeking a Software Engineer with expertise in vulnerability research, reverse engineering, and exploit development. The ideal candidate will support both OCO (Offensive Cyber Operations) and DCO (Defensive Cyber...Suggested
$95k - $114k
...Key Role: Conduct research and analysis to identify vulnerabilities and potential threat vectors into systems and networks, develop CNO and CNE exploits, enable capabilities, and engineer attack methodologies. Apply leading-edge principles, theories, and technologies...SuggestedFull time- ...Job Description Job Description Job Title: Mobile Vulnerability Researcher Location: Maryland At REDLattice, we're redefining the rules of the cyber game. Our mission goes beyond just protecting critical infrastructure—we're boldly exploring cyber strategies...Local area
- ...Job Description Job Description Job Title: Distributed Application Researcher Location: Maryland At REDLattice, we're redefining the rules of the cyber game. Our mission goes beyond just protecting critical infrastructure—we're boldly exploring cyber strategies...Local area
- ...and enhance development of classified and unclassified network research prototypes for a government research customer. Candidates will... ...by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world...For contractors
- ...Peraton Labs is seeking a skilled and experienced Senior Research Scientist to join our team supporting fully cleared research efforts... ...by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world...
- ...skilled and experienced Application Prototype Engineer to join our research team supporting fully cleared research efforts for our Maryland... ...by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the...Full timeFor subcontractor