As a Reverse Engineer / Vulnerability Researcher professional at Lockheed Martin, you’ll protect the networks that our citizens and the world depend upon each minute. ...
Mobile Vulnerability Researcher. REDLattice is seeking an experienced Mobile Vulnerability Researcher with a strong background in Computer Network Operations (CNO) and software development. ...
This position may be eligible for a $25K sign on bonus for external hires!.Lockheed Martin, Cyber & Intelligence invites you to step up to one of today’s most daunting challenges: the use of advanced electronics to undermine our way of life.As a cyber security professional at Lockheed Martin, you’ll...
The candidate will be working independently as a Software Researcher to identify flaws in software. Experience working as a team with researchers and developers. ...
Reflexive Concepts is seeking an Embedded System Researcher to join our team!. ...
Provide analysis for Cyber and SIGINT exploitation of large-scale networks and the data riding on them to uncover unknown and emerging adversary capabilities leveraging expertise in exploitation.Apply leading-edge principles, theories, and concepts and contribute to the development of new principles...
The candidate will be working independently as a Software Researcher to identify flaws in software. Working as a team with researchers and developers. ...
Data Science & Analysis (Digital).Active Top Secret SCI with Polygraph.Investigates, analyzes and reviews Artificial Intelligence (AI) Analytics for the research, development, and realized solutions to support the exploitation of the extraordinary volume and variety of Signals Intelligence (SIGI...
Description Are you passionate about bringing cutting-edge technology to bear in real-world applications? Do you want a career that challenges you and affords opportunities for life-long learning? If you are graduating with a PhD degree in chemistry, physics, or a related field, and have experience ...
You will have many opportunities to grow as a researcher and technical expert, including in project leadership, technical execution, and sharing results with the community through publications and presentations. ...
When you join our team as a Cyber System Exploitation Researcher, you'll be contributing to the development of cyber security tools and techniques. ...
As a Reverse Engineer / Vulnerability Researcher professional at Lockheed Martin, you’ll protect the networks that our citizens and the world depend upon each minute. ...
You will have many opportunities to grow as a researcher and technical expert, including in project leadership, technical execution, and sharing results with the community through publications and presentations. ...
Senior Vulnerability Researcher. ...
As a Vulnerabilities Researcher for Offensive Cyber Operations, your one of a kind mind will jump in to intricacies of systems in order to learn and know the functionality and how it behaves / triggers during breaches. ...
Expert Vulnerability Researcher. ...
When you join our team as a Cyber System Exploitation Researcher, you'll be contributing to the development of cyber security tools and techniques. ...
The Vulnerability Researcher assists efforts to identify vulnerabilities and cybersecurity threats to program, functions, products, applications, and systems. The Vulnerability Researcher takes direction from more senior personnel. They collaborate and share work with other Vulnerability Researchers...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation.We develop and prototype cutting-edge capabilities for our operational partners in the U.We look for, find, and demonstrate cyber vulnerabilities so th...
Data Science & Analysis (Digital).Active Top Secret SCI with Polygraph.Investigates, analyzes and reviews Artificial Intelligence (AI) Analytics for the research, development, and realized solutions to support the exploitation of the extraordinary volume and variety of Signals Intelligence (SIGI...
Our researchers tackle some of the most complex challenges to gain deeper insights into how people interact with each other and the world around them, and work collaboratively to contribute new ideas to products that impact the experiences of billions of people on a global scale. UX Researcher, Quan...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and system exploitation.We develop and prototype cutting-edge capabilities for our operational partners in the U.We look for, find, and demonstrate cyber vulnerabilities so th...
Our researchers tackle some of the most complex challenges to gain deeper insights into how people interact with each other and the world around them, and work collaboratively to contribute new ideas to products that impact the experiences of billions of people on a global scale. UX Researcher, Qual...