Exploit Developer jobs

Now available 6 results are consistent

Sort by:relevance - date

EXPLOIT DEVELOPER - ALL LEVELS

BS degree in computer engineering, computer science or similar technical degree. Python experience. C/C++ experience. Experience with application and kernel development on Linux / Windows /iOS / Android. Experience with Assembly p...

CompanyInterclypse
AddressSan Antonio, TX
CategoryInformation Technology
Date Posted 4 weeks ago See detail

Exploit Developer - All Levels

Interclypse

San Antonio, TX

BS degree in computer engineering, computer science or similar technical degree. Python experience. C/C++ experience. Experience with application and kernel development on Linux / Windows /iOS / Android. Experience with Assembly p...

Exploit Developer - All Levels

Interclypse

Annapolis Junction, MD

BS degree in computer engineering, computer science or similar technical degree. Python experience. C/C++ experience. Experience with application and kernel development on Linux / Windows /iOS / Android. Experience with Assembly p...

Exploit Developer - All Levels

Interclypse

Reston, VA

BS degree in computer engineering, computer science or similar technical degree. Python experience. C/C++ experience. Experience with application and kernel development on Linux / Windows /iOS / Android. Experience with Assembly p...

Exploit Developer

Str

Woburn, MA

Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems. Developing and applying automated rev...

Exploit Developer

Str

Arlington, VA

Reverse engineering complex software or firmware targets, ranging from typical Windows/Linux binaries to embedded firmware running non-traditional computer architectures and operating systems. Developing and applying automated rev...

Cybersecurity Exploit Developer

Ewa Warrior Services

Norfolk, VA

Analyze and extrapolate from the latest Cyber threat intelligence new and evolving attack techniques. Develop tools to emulate effects of cyber-attacks for training. Develop usable exploits and implants. Design and develop remote...