Vulnerability Researcher/Reverse Engineer
By Ring0 Technologies, Inc. At Lackland Air Force Base, TX, United States
Conduct research for the purposes of finding new vulnerabilities and enhance existing capabilities.
Resolve customer requirements and propose solutions for software modifications and enhancements.
Knowledgeable of evolving trends in offensive and defensive cyber tools, tactics, and procedures .
In-depth knowledge of x86/64, ARM and MIPS instruction sets and architectures and MZ/PE, ELF, APK, and IPS file formats.
Certifications such as SANS GREM, GCFA; IACRB CREA; eLearn Security eCRE; Offensive Security OSCE, OSEE, or other similar technical certifications.
Conduct detection and analysis of malware and malware communication techniques.
Software Vulnerability Researcher Jobs
By STR At , Woburn
Identifying software vulnerabilities, and developing tools to assist in this process
Experience with software reverse engineering tools (Ghidra, IDA Pro, Binary Ninja)
Reverse engineering and characterizing software and firmware
Developing custom emulation solutions to enable dynamic analysis
Communicating results to other employees and our customers
U.S. Citizen with the ability to obtain a Top Security (TS) Clearance
Manager, Vulnerability Research Jobs
By BitSight At , Remote
Demonstrated experience in security research people management
Over 750 teammates are dispersed throughout Boston, Raleigh, New York, Lisbon, Singapore, Argentina, and remote
Establish team priorities for research and development of new vulnerability intelligence collection and analysis capabilities
Evaluate, align, and escalate vulnerability detection capabilities within Bitsight’s established risk assessment framework
Communicate timelines and expectations for high-priority vulnerability detection capabilities
Recruit, train, and develop an international team of vulnerability researchers of diverse backgrounds and skill sets
Vulnerability Researcher Jobs
By Raytheon At , Annapolis Junction, 20701
Experience building and using tools to find, exploit, and productize vulnerabilities in complex software systems
Experience with C or C++
4+ years of professional experience
3 or more of the "desired skills" below
Experience reading or writing assembly (x86, x64, ARM, PPC, MIPS, SPARC, 68k, or others)
Experience using reverse engineering tools such as IDA Pro, HexRays, Ghidra, Binary Ninja, or objdump.
Vulnerability Manager Jobs
By The Travelers Companies, Inc. At , Hartford $142,600 - $235,200 a year
Lead strategic planning/roadmap creation for Vulnerability Management.
Define key performance indicators and metrics to illustrate efficacy with vulnerability management
Provide educational content on how to remediate vulnerabilities
May directly manage the configuration, testing, documentation, and implementation of upgrades to vulnerability management processes, controls or products as directed.
Regularly report on the state of vulnerabilities including criticality, exploit probability, business impact and remediation to security and IT leadership
Remain current with emerging threats and share knowledge to improve security posture
Vulnerability Researcher (Early Career)
By Battelle At , Columbus
Experience with PC and embedded systems architecture to include boot processes and OS internals
Experience with a disassembler for vulnerability research (IDA Pro, BinaryNinja, etc.)
Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)
Experience with one or more debuggers (WinDbg, OllyDbg, gdb, etc.)
Ability to demonstrate good organization, communication, problem-solving, and teamwork skills
Knowledge of common mitigation techniques (DEP, ASLR, etc.)
Threat And Vulnerability Lead
By Hologic At , Marlborough, Ma $124,200 - $206,900 a year
Lifecycle management of threat and vulnerability tools
Maintaining current knowledge and understanding of threats, emerging threats, and vulnerabilities.
Experience coaching IT and Security Engineers to strengthen the skills and value of the team.
If you have the right skills and experience, apply today!
Developing Key Performance Indicators and Key Risk Indicators for threats and vulnerabilities to Hologic's information assets
Experience leading large portfolios of inter-related projects, achieving target outcomes and business value within budget and timeline.
Vulnerability Researcher Jobs
By Flashpoint At New York, NY, United States
In-depth knowledge of common security software and hardware vulnerabilities and attack vectors. Deep familiarity with OWASP top 20.
You have writing skills and affinity for writing research papers and summarizing complex subjects into short entries.
You have some experience with vulnerability exploit development and familiarity with security assessment tools and techniques.
In-depth knowledge of security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.)
Some programming experience with scripted languages (preferably Python3) and compiled languages (preferably C).
You possess high reading comprehension, attention to detail, and deductive reasoning.
Vulnerability Researcher Jobs
By Apple At Cupertino, CA, United States

Summary Apple's Security Engineering & Architecture team (SEAR) focus on security needs. Passionate about safeguarding, we believe the best defense is a good offense. When it comes to ...

Vulnerability Researcher Jobs
By ForAllSecure At , Dallas-Fort Worth, Tx
Multitasking and time management skills
Understanding of low-level operating system concepts (memory management, process lifecycle, I/O systems, etc.)
Deliver training sessions and knowledge transfer sessions
Required hands-on knowledge of professional reverse engineering and program analysis tools
Hands-on experience with implementing solutions in C, C++, Java, Python
Hands-on experience with reading and writing assembly in at least one common architecture (x86, ARM, etc)
Entry-Level Vulnerability Researcher Jobs
By Battelle At , Columbus, 43201, Oh
Experience with PC and embedded systems architecture to include boot processes and OS internals
Experience with a disassembler for vulnerability research (IDA Pro, BinaryNinja, etc.)
Experience with one or more assembly languages (x86, x64, ARM, MIPS, PowerPC, etc.)
Experience with one or more debuggers (WinDbg, OllyDbg, gdb, etc.)
Ability to demonstrate good organization, communication, problem-solving, and teamwork skills
Knowledge of common mitigation techniques (DEP, ASLR, etc.)
Vulnerability Researcher Jobs
By ForAllSecure At , Washington, Dc
Multitasking and time management skills
Understanding of low-level operating system concepts (memory management, process lifecycle, I/O systems, etc.)
Deliver training sessions and knowledge transfer sessions
Required hands-on knowledge of professional reverse engineering and program analysis tools
Hands-on experience with implementing solutions in C, C++, Java, Python
Hands-on experience with reading and writing assembly in at least one common architecture (x86, ARM, etc)
Vulnerability Researcher Jobs
By Delta Dental Ins. At , Remote
Maintains communication with management regarding development within assigned responsibilities and performs special projects as required
Bachelor's Degree in Computer Science or Management Information related field, or equivalent work experience
Develops leadership-level communications, including management specific metrics, white papers, procedures, thought position papers, etc.
Develops and manages testing methodologies that adhere to common security guidelines and NIST standards
Conducts an evaluation of cloud security configurations, identifies prevalent vulnerabilities in cloud security controls, and improves and maintains cloud testing standards
Provides detailed reports with proof of vulnerabilities, guidance, and advice to support customer teams through vulnerability remediation
Software Vulnerability Researcher Jobs
By STR At , Arlington, Va
Identifying software vulnerabilities, and developing tools to assist in this process
Experience with software reverse engineering tools (Ghidra, IDA Pro, Binary Ninja)
Reverse engineering and characterizing software and firmware
Developing custom emulation solutions to enable dynamic analysis
Communicating results to other employees and our customers
U.S. Citizen with the ability to obtain a Top Security (TS) Clearance
Vulnerability Mapping & Developer Jobs
By Pinnacle Group, Inc. At United States
Excellent written and oral communication skills
Experienced with Confluence, Jira, Excel
Some experience with data analytics tools, eg. Tableau, PowerBI
Prefer hybrid out of Reston VA – but remote can be accepted too.
Goal: Reduce number of open-source vulnerabilities with no roadmap or action plan
Tasks and job duties, in order of priority:
Production Support (Vulnerability Operations)
By Strategic Staffing Solutions At Irving, TX, United States
• Knowledge on Server Management tools like OVO/Netbackup/Alerting tools.
• Proven experience with Software Configuration Managements and DEVOPS tools (GIT, Jenkins).
• Knowledge/experience of Python/Shell scripting.
• Bring in engineering, operational management in domains like Cloud
• Must have 7+ Years of Production Support experience
• Experience in application/Infrastructure Support experience using Microsoft Stack
Research Engineer- Atmospheric Perils Vulnerability
By Verisk At Boston, MA, United States
Demonstrated data mining skills (SQL and/or statistical analysis)
Excellent written and verbal communication skills
Strong organizational and excellent documentation skills
Knowledge of GIS applications (e.g. ArcView) and SQL server is a plus
Implementation of research into AIR’s portfolio risk analysis models, including programming loss simulation codes and analysis tools, and probabilistic assessment validation
Use of GIS tools for data visualization and analysis