Ready to apply? CareerBliss has 168 Computer Security Researcher jobs nationwide waiting for you. Browse through 168 jobs - we are sure you will find one for you!
Filter by location:
Nationwide
Job Description
Position Title
Cyber Vulnerability Researcher (Contingent)
Work Location
Camp Pendleton, CA
Position Description
The Cyber...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
Job Description** Principal Offensive Security Researcher to work from secure facilities in Columbia, MD or Denver, CO. Local candidates preferred...
Job Description** Principal Offensive Security Researcher to work from secure facilities in Columbia, MD or Denver, CO. Local candidates preferred...
Job Description** Principal Offensive Security Researcher to work from secure facilities in Columbia, MD or Denver, CO. Local candidates preferred...
Job Description** Principal Offensive Security Researcher to work from secure facilities in Columbia, MD or Denver, CO. Local candidates preferred...
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike
* Mimic threat actor behavior...
* Strategic Leadership: Define and execute the AI and data strategy aligned with the company's vision and goals.
* R&D Oversight: Lead research...
Reporting to the Assistant Vice President for Technology Ventures, the Director of Venture Development will play a pivotal role in advancing...
Deliver simple solutions to complex problems as a Software Developer, Senior at GDIT. Here, you’ll tailor cutting-edge solutions to the unique...
Cyber Security Analyst
Own your career as a Cyber Security Analyst at GDIT. Here, you’ll have the opportunity to build strong lines of cyber defense...
This individual possesses solid engineering fundamentals and understanding with some supervision in overseeing the implementation and/or...