Job Title: Cyber Security Researcher Description: Cybersecurity Researcher will serve as a subject matter expert... policies, vulnerability management, Internet of Things (IoT), industrial control system (ICS)/SCADA security and related...
experts who actively test applications and systems for weaknesses and advise on resolution. As a Red Team Researcher.... Responsibilities: What you'll do... Conduct vulnerability identification, assessments, active exploits, and social engineering...
The Leidos Cyber Accelerator is seeking a hands-on applied researcher to design, execute, and automate real-world...-test distribution tools (e.g., common Kali Linux tools) -Fuzzing for vulnerability discovery (e.g., AFL / AFL...
. Job Description We have an opening for a Senior Security Researcher to lead efforts to develop techniques and tools for red teaming in support of the... in the design and implementation of new tools and techniques for vulnerability assessment, penetration testing, and adversary...
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research... (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first...
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research... (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first...
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research... (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first...
Are you a cybersecurity and/or AI researcher who enjoys a challenge? Are you excited about pioneering new research... (SEI) is seeking applicants for the AI Security Researcher role. Originally created in response to one of the first...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research... Description Located onsite in Fort Meade, MD When you join our team as a Cyber System Exploitation Researcher, you'll be contributing...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research... Description Located onsite in Fort Meade, MD When you join our team as a Cyber System Exploitation Researcher, you'll be contributing...
Researcher who doesn't just want to "break things," but who wants to understand the why and how behind the defense..." that powers our high-level research while being mentored to become a full-scale Security Researcher. Foundation & Infrastructure...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research.... Job Description Cyber System Exploitation Researcher When you join our team as a Cyber System Exploitation Researcher, you'll...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research... Description When you join our team as a Cyber System Exploitation Researcher, you'll be contributing to the development of cyber...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research.... Job Description Cyber System Exploitation Researcher When you join our team as a Cyber System Exploitation Researcher, you'll...
The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research... Description When you join our team as a Cyber System Exploitation Researcher, you'll be contributing to the development of cyber...
As a Senior Security Researcher, you will: Research emerging attack vectors and techniques. Analyze detection.... Working knowledge of AI workflows or generative AI/LLM frameworks. Experience in vulnerability analysis and exploit...
Role Title Senior iOS Researcher Role Summary Deliver high-impact security research and exploit analysis. Lead... advanced investigations into iOS internals, reverse engineering, and vulnerability discovery to strengthen mobile threat...
lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research, and/or anomaly detection... in software development lifecycle, large-scale computing, threat analysis or modeling, cybersecurity, vulnerability research...