- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with the concepts of reverse engineering, binary emulation, and vulnerability research, including tools such as Ghidra, QEMU, and AFL. STR is hiring a Software Vulnerability Researcher to be part of a multidisciplinary team developing cutting-edge technology with significant and immediate impact on our national security.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Possible activities include emulating complex software in virtual environments, reverse engineering systems and software, and performing static and dynamic vulnerability analysis. STR is a growing technology company with locations near Boston, MA, Arlington, VA, near Dayton, OH, Melbourne, FL, and Carlsbad, CA. We specialize in advanced research and development for defense, intelligence, and national security in: cyber; next generation sensors, radar, sonar, communications, and electronic warfare; and artificial intelligence algorithms and analytics to make sense of the complexity that is exploding around us.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Manager of Cybersecurity (Vulnerability and Application Security), you will play a key role in ensuring the security and integrity of our digital assets and IT systems. Develop and implement vulnerability scanning and assessment processes, ensuring timely and effective remediation of identified issues.
$147,900 - $184,900 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Our team covers the full life cycle from emulation, reverse engineering, vulnerability research, and CNO/CNE tool development for various operating systems. Vulnerability Research and Reverse Engineer.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields. Two Six Technologies is seeking a Principal Vulnerability Researcher to support our growing team in Albuquerque, New Mexico.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Two Six Technologies is seeking a Lead Vulnerability Researcher with active Top Secret Clearance to join our team in Arlington, Virginia. Collaborate with team to align capability development roadmaps and complete transfer of vulnerability research prototypes into production environments.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability remediation and vulnerability management practices. Drive continuous improvements in vulnerability management processes and tools by leveraging industry-leading technologies, automation, and data-driven insights.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Researcher - Top Secret clearance/SCI eligible - (22799) Vulnerability Researcher - Top Secret clearance/SCI eligible. Vulnerability Researcher - Top Secret clearance/SCI eligible - (22799.
$85,000 - $180,000 a yearExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional responsibilities include: Performing detailed vulnerability assessments from researching secure technologies. Must possess an active Top Secret clearance with SCI/CI polygraph eligibility.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Vulnerability Assessment Analyst Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy, Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Executes threat intelligence reports, threat, vulnerability, and incident management processes to help ensure cybersecurity risks and threats are proactively identified and addressed to maintain the protection of information and information systems.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Marriott Manager, Vulnerability Management Tallahassee , Florida Apply Now Schedule Full-Time. o Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the collection and use of data for our critical Information Assurance Vulnerability Management (IAVM) Program using various security tools (i.e. ACAS, HBSS, ADUC, Burp Suite, etc). Cyber Security Engineer - Vulnerability Management.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
May be engaged in other information security or risk management projects including Supplier Risk management, Disaster Recovery (DR), Business Continuity management (BCP), Crisis Management (CM), Product security, Software Development Life Cycle, Vulnerability Management, Penetration testing and reporting and/or the US Federal cloud platform security controls certifications and operations.
ExpandUpdated 7 days ago
Title: vulnerability Company: Trellix
FEATURED BLOG POSTS
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like