...Description/Job Summary
Vulnerability Assessment Analyst - Journeyman
Job Location: Fort Meade, MD
Job Category:
Position Type: Full Time, 40 hours per week
Athena Technology Group, Inc. is a Service-Disabled Veteran Owned /Small Business (SDVOSB) focused...
Suggested
Full time
Local area
...enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to... ...- Tailored security solutions
- Reverse engineering
- Researching emerging network industry technologies and solutions
-...
Suggested
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
Identified vulnerabilities and attacks to the design and operation of a system
Perform control system security analysis
Perform wired and wireless network security analysis
Conducts vulnerability analysis
Develops scalable mitigation strategies
Suggested
Contract work
Responsibilities NSA Research Scientists are actively expanding the boundaries of what can be accomplished with artificial intelligence... ...tools to exploit and analyze computer systems and network vulnerabilities Modeling, simulating, prototyping, and/or benchmarking high...
Suggested
Full time
Work experience placement
Local area
Relocation package
Flexible hours
Monday to Friday
...innovative projects that offer opportunities for advancement.
Currently, ManTech is seeking a motivated, career and customer-oriented Research Scientist to join our team in Fort Meade, MD.
Responsibilities include but are not limited to:
* Under supervision, research and...
Suggested
...capabilities, design new approaches, help solve complex problems, and research new solutions to propel our mission. As a Capabilities... ...tools (e.g., Ghidra, OllyDbg, gdb); Software application vulnerability analysis and exploitation; Operating system internals; Mobile...
Suggested
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...expertise finds a natural fit at NSA including, but not limited to, fields of algebra, combinatorics, Fourier analysis, operations research, graph analytics, regression, machine learning, exploratory data analysis, stochastic processes, statistical modeling, forecasting...
Suggested
Full time
Temporary work
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...analysis, and collection of valuable intelligence information Research and implement solution sets to influence and enhance network... ...information system security (Red team) Identify intrusions and vulnerabilities and recommend mitigation strategies and techniques to secure...
Suggested
Apprenticeship
Work experience placement
Worldwide
Shift work
Night shift
...debugging Software reverse engineering tradecraft Skills (preferred): Network protocol analysis Operating System/Kernel knowledge Vulnerability research Cryptography basics Pay, Benefits, & Work Schedule Pay: Salary offers are based on candidates' education level and years of...
Suggested
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...Collaborate with team members and help prioritize requests from researchers and mission organizations Assist in the planning, design,... ...security incidents or violations; and, examining network vulnerabilities and determining actions to mitigate them. Additional duties...
Suggested
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...Position Overview:
Cantada has Vulnerability Research positions on multiple contracts. The successful candidate will analyze systems to understand how they work and react when they break. Candidates must have a strong development background and must be aware of advance...
Suggested
...professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting... ..., deployment/installation, and maintenance), programming, vulnerability analysis, penetration testing, computer forensics, and/or...
Suggested
Full time
Temporary work
Work experience placement
Relocation package
Flexible hours
Monday to Friday
Responsibilities Identify systematic vulnerabilities, misconfigurations and hardening strategies Identify existence of malicious and/or... ...vulnerability discovery and analysis Create tailored security solutions Researching emerging network industry technologies and solutions...
Suggested
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...continued success and shape the future of our cybersecurity, intelligence, and services offerings.
Position Description:
Vulnerability researchers at Nightwing CODEX analyze systems to understand how they work and how they behave when they break. Candidates must be...
Suggested
Holiday work
Temporary work
Work experience placement
Work alone
Flexible hours
...and tools within the NISIRT
Analyze any newly identified vulnerabilities and deficiencies within the Enterprise IT/IC GovCloud... ...of the gap analysis and at the direction of the Government, research and evaluate commercial products capable of eliminating the vulnerability...
Suggested
...cognizant of missions and priorities
Assist in planning, research, and analysis of DoD cyberspace policy, analysis of cyberspace... ...Providers (CSSP), Open Source Intelligence (OSINT) Analysis, and Vulnerability analysis
Assist with Command-level cyber inspections and...
Work experience placement
...information sharing and threat awareness; and conducting in-depth research, compilation, and analysis of a wide range of complex and... ....
- Enhance counterintelligence-related cyber threat and vulnerability awareness among internal and external consumers.
- Conduct...
Permanent employment
Full time
Temporary work
Part time
Work experience placement
Local area
Immediate start
Remote job
Trial period
Flexible hours
...complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such... ...and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information...
Full time
Work experience placement
Relocation package
Flexible hours
Monday to Friday
...level embedded systems techniques. Our teammates on the program provide expert, onsite support in research and development of software designed to exploit vulnerabilities of adversary technology, algorithm development, script writing and software utility development, use...
Shift work
...logical network topographies, protocols and applications, and trending technologies.
+ Conducting target research from various sources, identifying vulnerabilities, indicators and warnings, performing intelligence analysis through the application of analytic tools and...
Local area
Shift work
...be in computer or information systems design/development, systems architecture, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, cybersecurity, Machine/Network Virtualization, Cloud Infrastructure, Virtual...
Apprenticeship
Remote job
Shift work
Night shift
...meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. CIS brings...
Holiday work
Full time
Temporary work
Work experience placement
Flexible hours
Vulnerability Researcher
REQ ID:975-03
BTS Software Solutions is seeking a Vulnerability Researcher II with an active TS/SCI w/ POLY to join our team in Ft. Meade, MD
What You'll Get To Do:
* Actively debug software and troubleshoot issues with software crashes and...
Local area
Remote job
...Operational Readiness Inspection (CCORI)s.
Conduct open-source intelligence research in support of threat discovery or research.
Research, analyze, corroborate, and assess vulnerabilities, Information Assurance Vulnerability information as it is related to...
Work experience placement
Shift work
...Job Description
Overview
Perform hands on interactive vulnerability assessments in order to mitigate possible or real-time threats... ...malicious attacks.
Work in a team environment to conduct research/analysis of current and emerging cyber threats. Define requirements...
Full time
Shift work
...Meade area)
Security Clearance: TS/SCI with Appropriate Agency Polygraph
Artera Technologies, LLC's performs extensive vulnerability research and security risk assessment of our clients' various embedded devices and firmware. When applicable, we develop specially...
Full time
...reverse engineering and debugging on existing software. Identify defects in software and provide ways to correct defects. Research open-source vulnerabilities related to software. Develop methods and techniques to identify if running software is vulnerable.
Required...
..., the nation's leading cyber agency, has exciting and challenging positions in Cyber Security Engineering and Cyber and TEMPEST vulnerability analysis/mitigation. Are you ready to help secure our Nation's critical Infrastructure? If so, NSA is the place for you Qualifications...
Flexible hours
Monday to Friday
...mid-level labor category. BS+1 qualifies at the junior level and BS+14 qualifies for the senior level. Cantada seeks a Vulnerability Researcher (VR) to provide engineering and vulnerability research results related to hardware components, software applications, and...
Full time
...Demonstrate relevant experience in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, and/or systems engineering.
Ability to analyze and exploit captured media...
Work experience placement