Post job

Researcher jobs at Cipher

- 145 jobs
  • Vulnerability Researcher: Mid-Level (Applicants must already hold a TS clearance or higher)

    Cipher Tech Solutions 4.3company rating

    Researcher job at Cipher

    The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research. Requirements: * MUST be a US citizen * Must hold a US government security clearance at the TS Level or higher at time of application * Must hold a Bachelor's degree in Computer Science, Electrical/Computer Engineering, Math or Physics (or be within one year of completion, no exceptions to degree type) * Must have 3 years of post graduation experience relevant to this position. * Strong C, ASM, and Python development experience * Reverse engineering utilizing any of IDA, Ghidra, or Binary Ninja * Experience with dynamic and static binary analysis & fuzzing techniques * Extensive experience with debuggers (GDB, ADB, etc.) * Experience auditing code for security vulnerabilities. * Demonstrated ability to self-drive research tasking * Motivated to learn complex systems Desired Skills: * Performing full system emulation for research and analysis * Understanding of network protocols * Experience reading and writing assembly (ARM, x86/x64) * Understanding of OS Internals (any major OS) Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions. Salary and other Compensation: The hourly wage range is: $55.28 - $81.73 The salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our Perks & Benefits page for a general description of benefits and other potential compensation benefits: *********************************************************** About Us: At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the author (actor) *Who that actor might be. Vaccination Notice: Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements. Important Security Clearance Information: Be aware that you are applying for a job that requires you already hold a U.S. government security clearance at time of application. The U.S. government will not issue security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government). NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM. * - Cipher Tech is an Equal Opportunity Employer. All hiring and employment decisions are made on the basis of business requirements, performance, and merit with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
    $55.3-81.7 hourly 18d ago
  • Vulnerability Researcher

    Twosix Technologies 3.9company rating

    Fort Meade, MD jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join the Exploitation Sector of Two Six Technologies-a team of dedicated hackers in Northern Virginia and Maryland-where you'll immerse yourself in reverse engineering and vulnerability research on a wide range of embedded systems, software, and operational processes. Working alongside reverse engineers and security researchers, you'll identify vulnerabilities, analyze attack vectors, and assess operational impacts on some of the most critical systems for our customers. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about vulnerability research which can make a tangible impact on national security, we want you on our team. This role requires regular on-site support at the Laurel, Maryland customer site. What you will do: * Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems * Develop proof of concept (PoC) code for identified vulnerabilities * Reverse-engineer targeted embedded systems to identify vulnerabilities * Review source-code looking for risks and vulnerabilities * Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness * Compare system attack techniques and propose operationally effective countermeasures * Produce reports, briefings, and perspectives on actual and potential attacks What you will need (Basic Qualifications): * Bachelor's degree and 2 years of relevant experience, OR Associate's degree and 4 years of relevant experience * Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering * Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS) * Proficiency in linux command-line environments * Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra * Experience using vulnerability research tools such as emulators or fuzzers * Experience using a software debugger such as GDB or WinDbg Nice If You Have (Preferred): * Experience producing technical briefings for operational stakeholders * Experience using a hardware debugger * Experience with UART, SPI, I2C * Experience with common secure communications such as TLS or SSH * Familiarity with embedded firmware, RTOS, or networked systems * Familiarity with high-side environments Security Clearance: * Active TS/SCI clearance with Polygraph required #LI-ZS1 #LI-ONSITE Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range $122,422-$183,633 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $122.4k-183.6k yearly Auto-Apply 3d ago
  • DoD SkillBridge Vulnerability Researcher (Cyber199)

    Research Innovations 3.8company rating

    Melbourne, FL jobs

    Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems. We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done. This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems. This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems Developing and enhancing functionality by adding features and capabilities to undocumented interfaces Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues WHAT YOU HAVE DONE Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike EVEN BETTER Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC) Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly. We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII. It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events. Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law. #LI-AC1
    $36k-75k yearly est. Auto-Apply 60d+ ago
  • Vulnerability Researcher I/II (Cyber253)

    Research Innovations 3.8company rating

    Melbourne, FL jobs

    Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems. We are seeking a dedicated Vulnerability Researcher to join our Cyber Security team. As a Vulnerability Researcher at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done. This position requires the ability to obtain and maintain a Top Secret Clearance with SCI eligibility WHAT YOU WILL BE DOING Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems Developing and enhancing functionality by adding features and capabilities to undocumented interfaces Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues WHAT YOU HAVE DONE Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike EVEN BETTER Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC) Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection At RII, we believe that diversity in our workforce is critical to our success. We strive to hire great people from a wide variety of backgrounds, not just because it's the right thing to do, but because it makes us stronger. We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly. We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII. It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events. Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law.
    $36k-75k yearly est. Auto-Apply 4d ago
  • DoD SkillBridge Vulnerability Researcher (Cyber199)

    Research Innovations 3.8company rating

    Melbourne, FL jobs

    Job DescriptionResearch Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems. We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done. This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems. This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems Developing and enhancing functionality by adding features and capabilities to undocumented interfaces Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues WHAT YOU HAVE DONE Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike EVEN BETTER Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC) Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly. We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII. It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events. Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law. #LI-AC1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $36k-75k yearly est. 27d ago
  • Vulnerability Researcher

    Two Six Technologies 3.9company rating

    Arlington, VA jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join the Exploitation Sector of Two Six Technologies-a team of dedicated hackers in Arlington, Virginia-where you'll immerse yourself in cutting-edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top-tier CNO developers and hardware engineers, you'll discover vulnerabilities and create proof of concepts on embedded systems. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about building tools that make a tangible impact on national security, we want you on our team. What you will do: Analyze and solve complex technical challenges with no predefined answers. Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities. Deconstruct and understand the functionality of intricate technical systems. Navigate ambiguity and independently forge paths toward innovative solutions. Collaborate in a small-team environment, where your contributions will have an outsized impact. Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle. What you will need (Basic Qualifications): Bachelor's (or higher) degree in computer science, engineering, or a related field (solid knowledge in data structures and algorithms may substitute for a specific degree) Experience with programming/scripting languages in C, Python and the *nix command line Familiarity with reverse engineering principles and disassemblers (e.g., Binary Ninja, Ghidra, IDA) Minimum of 3 years of experience utilizing cybersecurity principles and a strong interest in learning more Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance Ability to work in the Arlington, Virginia office daily Nice to have (Preferred): Experience scripting with the Binary Ninja API or Ghidra. Experience with other languages (e.g. Go, Rust) Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS). Familiarity with cryptography concepts and their implementation. Hands-on experience working with hardware and embedded systems. Prefer active TS/SCI with Poly Security Clearance: Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance. #LI-ZS1 #LI-ONSITE Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range$119,646-$179,469 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $119.6k-179.5k yearly Auto-Apply 18d ago
  • Cybersecurity Researcher

    Two Six Technologies 3.9company rating

    Arlington, VA jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join the Embedded Sector of Two Six Technologies-a team of dedicated hackers in Arlington, Virginia-where you'll immerse yourself in cutting-edge Vulnerability Research on a wide range of unique embedded systems. Working side by side with top-tier CNO developers and hardware engineers, you'll discover vulnerabilities and create proof of concepts on embedded systems. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about building tools that make a tangible impact on national security, we want you on our team. What you will do: Analyze and solve complex technical challenges with no predefined answers. Perform in-depth reverse engineering to identify vulnerabilities, assess their impact, and transform findings into actionable capabilities. Deconstruct and understand the functionality of intricate technical systems. Navigate ambiguity and independently forge paths toward innovative solutions. Collaborate in a small-team environment, where your contributions will have an outsized impact. Leverage your expertise in digital forensics and watermarking to inform secure development practices and maintain data integrity throughout the product lifecycle. What you will need (Basic Qualifications): Bachelor's (or higher) degree in Computer Science, Computer/Electrical Engineering, or a related field (or equivalent practical experience). Experience developing, debugging, and scripting in C/C++ and Python within Linux command-line environments, with a strong emphasis on low-level programming, memory management, and system interaction for reverse engineering and vulnerability research. Experience with reverse engineering and vulnerability research, using tools such as IDA Pro, Binary Ninja, or Ghidra. Expertise in one or more of the following: Firmware analysis (ARM, MIPS, PowerPC, RTOS). Firmware rehosting using emulation tools such as QEMU. Fuzzing and exploit development. Binary obfuscation and anti-analysis techniques. Wireless protocols and radio signal analysis. File system forensics and fault injection frameworks. Nice to have (Preferred): Experience scripting with the Binary Ninja API or Ghidra. Experience with other languages (e.g. Go, Rust). Knowledge of embedded device security and reverse engineering (e.g., ARM, RTOS). Familiarity with cryptography concepts and their implementation. Hands-on experience working with hardware and embedded systems. Client-facing experience in technical roles. Prefer active TS/SCI with Poly. Security Clearance: Active Top Secret clearance with eligibility/willingness to obtain a Top Secret/SCI clearance. Prefer active TS/SCI with Poly. #LI-ZS1 #LI-ONSITE Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range$119,646-$179,469 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $119.6k-179.5k yearly Auto-Apply 18d ago
  • DoD SkillBridge Vulnerability Researcher (Cyber199)

    Research Innovations 3.8company rating

    Saint Pete Beach, FL jobs

    Research Innovations, Inc. (RII) is breaking through the big, slow, status quo with transformative technology that fundamentally changes and improves the world. We develop cutting-edge software for all levels of the government and military. Using agile development practices and user-centered design, we create innovative software solutions for complex real-world problems. We are seeking a dedicated Vulnerability Research SkillBridge candidate to join our Cyber Security team. In a Vulnerability Research SkillBridge opportunity at RII, you will play a pivotal role in solving unique and challenging problems for our esteemed Defense and Homeland Security customers. This position requires a proactive mindset, deep technical expertise in vulnerability research, reverse engineering, and exploit mitigations/bypasses, and a drive to live one of our core values: Get s#!t done. This position is specifically for members of the DoD who are transitioning back to civilian life and can take advantage of programs such as SkillBridge. RII has strong connections to the military community, and we understand the transition to civilian life can be stressful-we will help you navigate those challenges. We are an approved DoD partner, and we have supported the transition of several active duty members to civilian roles, many of whom have been offered and accepted full-time employment with RII at the completion of their Skillbridge. During and after, RII provides an industry-leading mentorship and training program to selected applicants, supporting challenging, real, mission-oriented problems. This position requires an active US Secret security clearance.WHAT YOU WILL BE DOING Conducting in-depth reverse engineering and vulnerability analysis across various architectures and platforms, including x86/64, ARM, PowerPC, and more Researching and analyzing operating system and application internals, identifying and understanding security strengths and weaknesses of those systems Developing and enhancing functionality by adding features and capabilities to undocumented interfaces Modeling and analyzing in-memory compiled application behavior to identify potential vulnerabilities and improve security measures Developing and understanding mobile/embedded systems and kernel modules, particularly related to vulnerability research Participating actively in our extensive Vulnerability Research mentorship program, sharing knowledge and collaborating with colleagues WHAT YOU HAVE DONE Proficient understanding of wireless networking and associated security protocols, such as Wi-Fi (802.11), Bluetooth, or cellular networks (2G/3G/4G/5G). Familiarity with common vulnerabilities and attack vectors in wireless communication Strong grasp of legacy exploit mitigations and bypass techniques, including but not limited to Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP/NX), Stack Cookies (Canaries), and Control Flow Integrity (CFI). Experience in identifying and circumventing these security measures In-depth knowledge of both security and network fundamentals, such as cryptography, authentication, access control, and network protocols (TCP/IP, UDP, DNS, HTTP, etc.). Understanding the security implications and potential vulnerabilities associated with these concepts Programming experience with both scripted languages (preferably Python3) and compiled languages (preferably C). Ability to write efficient and secure code for vulnerability research and exploit development purposes Familiarity with low-level architectures such as x86, ARM, or MIPS. Understanding the underlying principles, instruction sets, and memory models of these architectures for vulnerability identification and analysis Experience with operating system internals and implementations, including Windows, Linux, or mac OS. Knowledge of system structures, process management, memory management, and security mechanisms at the kernel level Excellent oral, written, and interpersonal communication skills, with the ability to effectively convey complex technical concepts and interact with customers and team members alike EVEN BETTER Experience with vulnerability research and reverse engineering of real-time operating systems (RTOS), such as FreeRTOS, QNX, or VxWorks. Understanding the unique security challenges and attack vectors specific to RTOS environments Bachelor's or postgraduate degree in Computer Science, Computer Engineering, or a related field Experience with software protection and binary armoring techniques, such as anti-debugging, code obfuscation, or tamper resistance. Understanding the methods employed to protect software from reverse engineering and vulnerability discovery Proficiency in agile development methodologies, including Scrum or Kanban, for efficient collaboration and iterative development in a cybersecurity context Familiarity with low-level iOS/Android development and associated security considerations, such as jailbreaking or rooting, application sandboxing, or secure interprocess communication (IPC) Knowledge of hypervisors and their security implications, including virtualization-based security, guest escape vulnerabilities, or hypervisor-based rootkits Proficiency in malware analysis, including static and dynamic analysis techniques, behavioral analysis, and code deobfuscation. Experience in identifying and analyzing malware samples to understand their capabilities and potential vulnerabilities Experience with constraint solving techniques, such as symbolic execution, theorem proving, or model checking, for vulnerability identification, verification, and exploit generation Background in machine learning, particularly in the context of vulnerability analysis and detection, such as using ML techniques to identify patterns in code or analyze network traffic for anomaly detection We work to help your intellectual passions and creativity thrive. It's one of our core values: Let your geek flag fly. We also offer all employees comprehensive benefits including: flexible work schedules, health insurance coverage, paid time off, 401k with a company match, paid parental leave, access to wellness programs and much more. You get this all from day one, and all paid for by RII. It's all part of another of our core values: Stay human. It's why our comfortable and colorful offices such as our headquarters, include a community game room, pantry, massage chair, and an escape room, among other amenities. It's why we have community ambassadors and regular community events. Research Innovations, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity or expression, national origin, genetics, disability status, protected veteran status, age, or any other characteristic protected by state, federal or local law. #LI-AC1
    $37k-78k yearly est. Auto-Apply 60d+ ago
  • Vulnerability Researcher

    Two Six Technologies 3.9company rating

    Maryland jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join the Exploitation Sector of Two Six Technologies-a team of dedicated hackers in Northern Virginia and Maryland-where you'll immerse yourself in reverse engineering and vulnerability research on a wide range of embedded systems, software, and operational processes. Working alongside reverse engineers and security researchers, you'll identify vulnerabilities, analyze attack vectors, and assess operational impacts on some of the most critical systems for our customers. Our fast-growing roster of government customers relies on us to deliver advanced security solutions, and we're looking for a Vulnerability Researcher to help us continue pushing boundaries. If you're passionate about vulnerability research which can make a tangible impact on national security, we want you on our team. This role requires regular on-site support at the Laurel, Maryland customer site. What you will do: Identify vulnerabilities and potential attacks across hardware, software, procedures, logistics, and physical security of systems Develop proof of concept (PoC) code for identified vulnerabilities Reverse-engineer targeted embedded systems to identify vulnerabilities Review source-code looking for risks and vulnerabilities Analyze the effects of vulnerabilities on mission outcomes and operational effectiveness Compare system attack techniques and propose operationally effective countermeasures Produce reports, briefings, and perspectives on actual and potential attacks What you will need (Basic Qualifications): Bachelor's degree and 2 years of relevant experience, OR Associate's degree and 4 years of relevant experience Relevant experience: computer/information systems design/development, programming, information/cyber/network security, reverse-engineering, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering Proficiency in C/C++, Python, and at least one ISA (e.g. x86/ARM/MIPS) Proficiency in linux command-line environments Experience using a decompiler such as IDA Pro, Binary Ninja, or Ghidra Experience using vulnerability research tools such as emulators or fuzzers Experience using a software debugger such as GDB or WinDbg Nice If You Have (Preferred): Experience producing technical briefings for operational stakeholders Experience using a hardware debugger Experience with UART, SPI, I2C Experience with common secure communications such as TLS or SSH Familiarity with embedded firmware, RTOS, or networked systems Familiarity with high-side environments Security Clearance: Active TS/SCI clearance with Polygraph required #LI-ZS1 #LI-ONSITE Two Six Technologies is committed to providing competitive and comprehensive compensation packages that reflect the value we place on our employees and their contributions. We believe in rewarding skills, experience, and performance. Our offerings include but are not limited to, medical, dental, and vision insurance, life and disability insurance, retirement benefits, paid leave, tuition assistance and professional development. The projected salary range listed for this position is annualized. This is a general guideline and not a guarantee of salary. Salary is one component of our total compensation package and the specific salary offered is determined by various factors, including, but not limited to education, experience, knowledge, skills, geographic location, as well as contract specific affordability and organizational requirements. Salary Range $122,422 - $183,633 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $122.4k-183.6k yearly Auto-Apply 2d ago
  • Usability Researcher (webcam interview)

    360 It Professionals 3.6company rating

    Charlotte, NC jobs

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile. Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us. We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change. Job Description This position requires a senior-level usability specialist. Candidates should possess a deep understanding of both qualitative and quantitative user experience research methods. Experience in the design and usability of financial services web products is preferred. • As part of the Digital Design team, the successful candidate will lead usability studies, and provide usability consultation. Responsibilities • Develop research plans, conduct usability tests and cognitive walkthroughs, and report outcomes. • Manage project with designers, UX Lead, IA, Content, and/or Prototyping directly, to improve the user experience. • Craft documentation to help communicate the experience to the project team, UX team, and prototyping team. Qualifications Experience & Skills Requirements • 7+ years of experience in a senior usability engineer or analyst role. • Evaluate project requirements to generate research and user-testing plans and estimates. • Vast experience with usability improvements and design efforts. • Mastery-level user experience research and analysis skills with ability to quickly synthesize reports of findings. • Create and lead the passion for being the voice of the user and experience building user centric solutions. • Strong verbal and visual communication, written communication, interpersonal and presentation skills. • Collaborate with designers, developers, stakeholders and UX leaders to identify and address barriers to making platforms accessible to individuals with disabilities • Experience leading usability improvements and design efforts. • Experience guiding and mentoring senior software engineers and test engineers. • Proven ability to document requirements, designs, and project status. Additional Information Thanks and Regards, Karan Sharma 510-254-3300 ext. 150
    $58k-97k yearly est. 60d+ ago
  • AI / ML Researchers

    Modmed 4.5company rating

    Boca Raton, FL jobs

    We are united in our mission to make a positive impact on healthcare. Join Us! South Florida Business Journal, Best Places to Work 2024 Inc. 5000 Fastest-Growing Private Companies in America 2024 2024 Black Book Awards, ranked #1 EHR in 11 Specialties 2024 Spring Digital Health Awards, “Web-based Digital Health” category for EMA Health Records (Gold) 2024 Stevie American Business Award (Silver), New Product and Service: Health Technology Solution (Klara) Who we are: We Are Modernizing Medicine (WAMM)! We're a team of bright, passionate, and positive problem-solvers on a mission to place doctors and patients at the center of care through an intelligent, specialty-specific cloud platform. Our vision is a world where the software we build increases medical practice success and improves patient outcomes. Founded in 2010 by Daniel Cane and Dr. Michael Sherling, we have grown to over 3400 combined direct and contingent team members serving eleven specialties, and we are just getting started! ModMed's global headquarters is based in Boca Raton, FL, with a growing office in Hyderabad, India, and a robust remote workforce across the US, Chile, and Germany. We Are Modernizing Medicine (WAMM)! We're a team of bright, passionate, and positive problem-solvers on a mission to place doctors and patients at the center of care through an intelligent, specialty-specific cloud platform. Our vision is a world where the software we build increases medical practice success and improves patient outcomes. Founded in 2010 by Daniel Cane and Dr. Michael Sherling, we have grown to over 3400 combined direct and contingent team members serving eleven specialties, and we are just getting started! ModMed is based in Boca Raton, FL, with office locations in Santiago, Chile, Berlin, Germany, Hyderabad, India, and a robust remote workforce with team members across the US. As we continue to scale and drive innovation, we are seeking dynamic and experienced AI/ML Researchers at various levels to join our team. We are seeking AI/ML Researchers to drive innovation in large language models (LLMs), AI agents, and advanced machine learning systems. This role is ideal for hands-on researchers with a strong academic background, demonstrated publications, and practical experience translating cutting-edge AI techniques into real-world applications. You will work at the intersection of research and product, collaborating with cross-functional teams to design, develop, and deploy next-generation AI solutions that create measurable business impact. Key Responsibilities : Conduct research in large language models, generative AI, reinforcement learning, and AI agents, with a focus on advancing state-of-the-art capabilities. Design and implement new algorithms and architectures for LLM fine-tuning, adaptation, and multi-agent collaboration. Translate business problems into research-driven AI solutions, working closely with stakeholders to identify opportunities for innovation. Build and evaluate models using techniques such as deep learning, natural language processing, generative modeling, reinforcement learning, and multi-modal learning. Own the end-to-end lifecycle of research-driven ML projects, from exploration and prototyping to production deployment and monitoring. Publish findings in top-tier conferences and journals, contributing to the broader AI research community. Collaborate with product managers, data engineers, and software engineers to bring research ideas into scalable, production-grade systems. Partner with data engineering teams to ensure robust pipelines and infrastructure for training, experimentation, and deployment. For senior/lead level, mentor junior researchers and data scientists, fostering a culture of innovation and scientific rigor. Qualifications: PhD in Computer Science, Electrical Engineering, Mathematics, Physics, or a related quantitative field. Proven track record of research excellence demonstrated by publications in top ML/AI conferences (e.g., NeurIPS, ICML, ICLR, ACL, CVPR, AAAI, KDD) or journals. Experience in machine learning or AI research, with applied experience in LLMs, generative AI, or AI agents. Strong proficiency in Python and ML frameworks such as PyTorch or TensorFlow. Hands-on experience with MLOps tools and cloud platforms (AWS, GCP, or Azure). Expertise in at least one of the following areas: Large Language Models (pretraining, fine-tuning, prompt engineering, retrieval-augmented generation) Autonomous AI Agents and multi-agent systems Generative AI (text, vision, speech, or multimodal) Reinforcement learning and decision-making systems Familiarity with distributed data systems, high-performance computing, and GPU/TPU-based model training. Strong communication skills, with the ability to present research findings to both technical and non-technical stakeholders. #LI-DV1 ModMed Benefits Highlight: At ModMed, we believe it's important to offer a competitive benefits package designed to meet the diverse needs of our growing workforce. Eligible Modernizers can enroll in a wide range of benefits: India Meals & Snacks: Enjoy complimentary office lunches & dinners on select days and healthy snacks delivered to your desk, Insurance Coverage: Comprehensive health, accidental, and life insurance plans, including coverage for family members, all at no cost to employees, Allowances: Annual wellness allowance to support your well-being and productivity, Earned, casual, and sick leaves to maintain a healthy work-life balance, Bereavement leave for difficult times and extended medical leave options, Paid parental leaves, including maternity, paternity, adoption, surrogacy, and abortion leave, Celebration leave to make your special day even more memorable, and company-paid holidays to recharge and unwind. United States Comprehensive medical, dental, and vision benefits, including a company Health Savings Account contribution, 401(k): ModMed provides a matching contribution each payday of 50% of your contribution deferred on up to 6% of your compensation. After one year of employment with ModMed, 100% of any matching contribution you receive is yours to keep. Generous Paid Time Off and Paid Parental Leave programs, Company paid Life and Disability benefits, Flexible Spending Account, and Employee Assistance Programs, Company-sponsored Business Resource & Special Interest Groups that provide engaged and supportive communities within ModMed, Professional development opportunities, including tuition reimbursement programs and unlimited access to LinkedIn Learning, Global presence and in-person collaboration opportunities; dog-friendly HQ (US), Hybrid office-based roles and remote availability for some roles, Weekly catered breakfast and lunch, treadmill workstations, Zen, and wellness rooms within our BRIC headquarters. PHISHING SCAM WARNING: ModMed is among several companies recently made aware of a phishing scam involving imposters posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote "interviews," and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from ModMed without a formal interview process, and valid communications from our hiring team will come from our employees with a ModMed email address (*************************). Please check senders' email addresses carefully. Additionally, ModMed will not ask you to purchase equipment or supplies as part of your onboarding process. If you are receiving communications as described above, please report them to the FTC website.
    $47k-91k yearly est. Auto-Apply 60d+ ago
  • TTP Red Cyber Researcher

    Oak Grove Technologies 4.3company rating

    Fort Belvoir, VA jobs

    Oak Grove Technologies, LLC, a dynamic and fast-growing federal contractor, is seeking a highly skilled and motivated TTP Red Cyber Researcher to join our team! In this role you will research, identify, and creatively think about novel TTPs that can be integrated into red cyber operations. Oak Grove Technologies is a Service-Disabled Veteran-Owned Business based in Raleigh, NC, with a Test and Training Center located near Fort Bragg and Camp Mackall. With over 20 years of expertise in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks top talent to develop impactful solutions. Oak Grove Technologies offers a competitive compensation and benefits package. Requirements What You'll Be Doing Researching, identify, and creatively develop novel Tactics, Techniques, and Procedures (TTPs) for integration into red cyber operations. Conduct adversarial emulation relevant to the modern cyber landscape. Support active red cyber operations with real-time TTP development against unique targets or network defenses. Think creatively about potential new TTPs and how adversaries might deploy them against DoD targets. Contribute to the development of TTPs for offensive cyber operations. What Desired Skills You'll Bring 1+ years of experience working with advanced cyber red teams, including adversarial emulation or developing TTPs for offensive cyber operations. Strong background in TTP research and application in operational contexts. Excellent research skills, including the ability to leverage open-source resources and classified intelligence reporting. What Required Skills You'll Bring U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. ( Highly qualified candidates with a Secret Clearance may also be considered.) 3-5+ years of relevant experience. Proven ability to research, identify, and creatively develop novel TTPs for DCART red cyber operations. Strong knowledge of adversarial TTPs to ensure emulation capabilities remain current and relevant. Ability to think creatively about potential TTPs and how adversaries might deploy them against DoD targets. Willingness and ability to travel up to 15% (CONUS/OCONUS). Security Clearance Requirements: U.S. Citizenship and an active Top Secret clearance with SCI eligibility are required. ( Highly qualified candidates with a Secret Clearance may also be considered.) Compensation and Benefits: Competitive Pay, PTO, Health Benefits. If you are a highly motivated TTP Red Cyber Researcher and ready to apply your expertise in a high-impact role, we encourage you to join our mission. Oak Grove Technologies is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. Oak Grove Technologies, LLC participates in E-Verify to determine an individual's identity and employment eligibility to work in the United States. E-Verify is a service of DHS and SSA.
    $50k-95k yearly est. 60d+ ago
  • Embedded System Researcher

    Link 3.9company rating

    Annapolis, MD jobs

    Responsibilities: As a Embedded System Researcher, you will lead others in tasks, coordinate with customers on existing work, and lead complex problems through to completion. Your experience will be focused on embedded systems with demonstrated, proven experience in any of ARM, PPC, MIPS, or other embedded assembly languages. Position Requirements:• 12 yrs experience researching and developing in an embedded systems world (VxWorks, ELDK, or custom OS)• Experience with Python, C, and ASM and development• Experience with debugging tools (GDB)• Demonstrated ability to self-drive research tasking and coordinate with customers on distilling larger tasks into meaningful milestones
    $31k-45k yearly est. Auto-Apply 60d+ ago
  • Embedded System Researcher

    Link, LLC 3.9company rating

    Annapolis, MD jobs

    Job DescriptionResponsibilities: As a Embedded System Researcher, you will lead others in tasks, coordinate with customers on existing work, and lead complex problems through to completion. Your experience will be focused on embedded systems with demonstrated, proven experience in any of ARM, PPC, MIPS, or other embedded assembly languages. Position Requirements:• 12 yrs experience researching and developing in an embedded systems world (VxWorks, ELDK, or custom OS)• Experience with Python, C, and ASM and development• Experience with debugging tools (GDB)• Demonstrated ability to self-drive research tasking and coordinate with customers on distilling larger tasks into meaningful milestones We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $31k-45k yearly est. 27d ago
  • Summer Research Intern

    Two Six Technologies 3.9company rating

    Arlington, VA jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join our Electronic Systems team for a unique opportunity to contribute to cutting-edge vulnerability research and reverse engineering research. You will be working on embedded systems, applying your technical skills to real-world problems, and directly impacting national security. Responsibilities: Participate in cutting-edge research, and be encouraged to publish results Build deployable and scalable systems that solve real-world problems Present a project at the end of the internship demonstrating your work and findings Minimum Qualifications: Actively pursuing a degree in Computer Science, Electrical Engineering, Computer Engineering, or a related field Familiarity with at least one of the following: Modern programming languages like C/C++, C#, Python, or Java Mobile and embedded system development (e.g., Android, ARM) Reverse engineering and vulnerability research Networking protocols (TCP/IP, HTTP, etc.) Proficiency in at least one debugger (e.g., GDB, WinDBG) and decompiler (e.g., Ghidra, IDA) Assembly language knowledge (e.g., x86, ARM) Preferred Qualifications: Experience in a challenging R&D environment Publications or patents of prior intellectual contributions Experience with embedded systems vulnerability research Familiarity with mitigations like ASLR, DEP, and Stack Canaries Experience with low-bandwidth communications (e.g., RS485, CAN) and protocols like 4G/5G, Wifi, Bluetooth, or Zigbee Security Clearance: Due to the nature of out work US citizenship is required Candidates must have eligibility to obtain a government security clearance The projected pay range listed for this position is a general guideline and not a guarantee of rate. Pay Range$20-$40 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $20-40 hourly Auto-Apply 18d ago
  • Summer Research Intern

    Two Six Technologies 3.9company rating

    Arlington, VA jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join our Electronic Systems team for a hands-on internship focused on developing innovative solutions for embedded devices in security applications. You'll work alongside experienced engineers and researchers to bring proof-of-concept technologies to real-world solutions. We are seeking several interns for this 12-week internship program, which will be conducted onsite in Arlington, VA. Responsibilities: Participate in cutting-edge research, and be encouraged to publish results Build deployable and scalable systems that solve real-world problems Present a project at the end of the internship demonstrating your work and findings Minimum Qualifications: Actively pursuing a degree in Computer Science, Electrical Engineering, Computer Engineering, or a related field Familiarity with at least one of the following: Modern development languages such as Python, C, C++, or Embedded C Understanding of operating systems internals (e.g., privilege/user groups, binary memory layout) Software-hardware interfaces and embedded system development Version control and automation tools such as GitLab Strong communication skills and a willingness to contribute to a collaborative team environment Preferred Qualifications: Experience in a challenging R&D environment Publications or patents of prior intellectual contributions Familiarity with memory management (heap, stack, virtual memory, MMU) Experience with CI/CD pipelines and testing in virtual machine environments Basic knowledge of firmware or driver development across Linux and Windows Exposure to reverse engineering x86/ARM binaries or malware analysis Interest in security applications involving embedded systems Clearance/Citizenship: Due to the nature of our work US Citizenship is required Candidate must have eligibility to obtain a government security clearance The projected pay range listed for this position is a general guideline and not a guarantee of rate. Pay Range$20-$40 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $20-40 hourly Auto-Apply 12d ago
  • Summer Research Intern

    Two Six Technologies 3.9company rating

    Arlington, VA jobs

    At Two Six Technologies, we build, deploy, and implement innovative products that solve the world's most complex challenges today. Through unrivaled collaboration and unwavering trust, we push the boundaries of what's possible to empower our team and support our customers in building a safer global future. Overview of Opportunity Join our Electronic Systems team, where we focus on forward & reverse engineering, vulnerability & malware research, and cryptographic protocols. We are seeking several interns for this 12-week internship program, which will be conducted onsite in Arlington, VA. Key Responsibilities: Collaborate on advanced research and innovative projects in cybersecurity and vulnerability discovery. Apply knowledge of Linux/Unix systems to solve mission-critical challenges. Develop scalable, deployable systems that address real-world security problems. Assist with reverse engineering, debugging, and analyzing complex mission applications. Present an end-of-internship project that highlights your contributions. Minimum Qualifications: Currently pursuing a degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, Statistics, or a related field. Rising Juniors or Seniors are strongly preferred. US Citizenship is required due to the nature of our work. Ability to work onsite at our Arlington, VA office. Skills & Experience (Preferred Exposure to One or More of the Following): Mobile and embedded system development or architecture (e.g., Android, ARM, wireless protocols). Unix/Linux kernel internals: understanding access controls, file systems, object file formats, runtime linker/loader, process/thread APIs, and data structures. Program analysis, reverse engineering, vulnerability research, or cryptographic protocols. Proficiency in assembly languages (x86, ARM, MIPS, PowerPC). Foundational knowledge of networking protocols, operating systems, or kernels, and network sockets programming. Hands-on hacking experience (memory corruption, rootkits, MetaSploit, Nmap). Dynamic signal capture for protocols like SPI, UART, CAN, I2C. Agile development experience or comfort with CI/CD practices, including testing and releasing software. Experience in C, C++, and Python for tool development. Knowledge of memory protection techniques (ASLR, DEP). Experience tracing code execution in a debugger (WinDbg/gdb/IDA Pro). Clearance Requirements: Must have eligibility to obtain a U.S. security clearance. The projected pay range listed for this position is a general guideline and not a guarantee of rate. Pay Range$20-$40 USD Looking for other great opportunities? Check out Two Six Technologies Opportunities for all our Company's current openings! Ready to make the first move towards growing your career? If so, check out the Two Six Technologies Candidate Journey! This will give you step-by-step directions on applying, what to expect during the application process, information about our rich benefits and perks along with our most frequently asked questions. If you are undecided and would like to learn more about us and how we are contributing to essential missions, check out our Two Six Technologies News page! We share information about the tech world around us and how we are making an impact! Still have questions, no worries! You can reach us at Contact Two Six Technologies. We are happy to connect and cover the information needed to assist you in reaching your next career milestone. Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. If you are an individual with a disability and would like to request reasonable workplace accommodation for any part of our employment process, please send an email to accommodations@twosixtech.com. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations. Additionally, please be advised that this business uses E-Verify in its hiring practices. By submitting the following application, I hereby certify that to the best of my knowledge, the information provided is true and accurate.
    $20-40 hourly Auto-Apply 18d ago
  • Part-Time Research Assistant (HUBZone Resident Required)

    Global Systems Engineering 4.0company rating

    Alexandria, VA jobs

    Job DescriptionSalary: Global Systems Engineering (GSE), an Intreped Partners subsidiary, is an SBA-certified HUBZone small business supporting the federal government with a variety of advisory and technical consulting services. We combine mission-driven expertise with a culture of integrity, innovation, and community impact. Learn more at ************************* The Part-Time Research Assistant will support proposal, business development, and policy research by gathering and analyzing information that helps shape GSEs strategic direction. Responsibilities Conduct research on programs, markets, and policy areas. Summarize and organize findings into concise reports. Support proposal development and data requests. Maintain research databases and trackers. Qualifications Excellent research and analytical skills. Proficiency in Microsoft Office and online research tools. Strong writing and organizational abilities. Interest in federal contracting or public policy a plus. HUBZone Requirement Applicants must live in a certified HUBZone. To verify, visit ***************************************** enter your home address, and confirm eligibility. Proof of residency (drivers license, utility bill, or lease) may be required. Compensation Competitive hourly rate, commensurate with experience. Eligibility: This position is not eligible for visa sponsorship. Candidates must be legally authorized to work in the United States without restriction or need for future sponsorship, regardless of employer.
    $38k-55k yearly est. 22d ago
  • Downstream Scientist

    ZP Group 4.0company rating

    Frederick, MD jobs

    Piper Companies is seeking a Downstream Scientist to support high-quality biologics manufacturing for both clinical and commercial use. This position focuses on downstream process development, scale-up, and technology transfer, with hands-on responsibilities in purification operations and troubleshooting. The ideal candidate will collaborate with cross-functional teams to ensure robust and efficient purification processes for large molecule therapeutics. Responsibilities of the Downstream Scientist Include: * Execute and optimize downstream purification processes including: * Chromatography (affinity, ion exchange) * Viral inactivation * Filtration * Ultrafiltration/diafiltration (UF/DF) * Support technology transfer of downstream processes to commercial manufacturing. * Monitor process performance and troubleshoot purification challenges. * Conduct small-scale purification studies for: * Process characterization * Scale-down model qualification * Process optimization * Analyze and interpret experimental data using multivariate data analysis (MVDA) tools. * Collaborate with upstream, analytical, and manufacturing teams to resolve process issues and implement improvements. * Document experimental procedures and results in compliance with Good Documentation Practices (GDP). * Author and review technical reports and contribute to regulatory documentation. * Present findings and technical recommendations in internal and external meetings. Qualifications of the Downstream Scientist Include: * Bachelor's degree in a relevant scientific discipline. * 3-7 years of experience in downstream process development or technology transfer in biologics manufacturing. * Strong background in biologics manufacturing within a cGMP pharmaceutical or CDMO environment. * Expertise in unit operations including chromatography, viral inactivation, filtration, and UF/DF. * Familiarity with upstream operations and mammalian cell culture. * Experience with CMC activities related to downstream processes. * Proficient in troubleshooting purification processes and implementing process improvements. * Skilled in MVDA tools and data-driven process analysis. * Strong documentation skills with adherence to GDP and GMP standards. * Excellent problem-solving, communication, and collaboration abilities. Compensation of the Downstream Scientist Includes: * Salary Range: $80,000.00 - $120,000.00/year, based on experience and certifications. * Comprehensive Benefits: CIGNA Medical, Dental, Vision; 401k through ADP, 10 PTO days/5 Holidays. * High growth potential in a very exciting and professionally nurturing environment! This job opens for applications on 10/15/2025. Applications for this job will be accepted for at least 30 days from the posting date. #LI-AW1 #LI-ONSITE keywords: Downstream Scientist, Biologics Manufacturing, Process Development, Technology Transfer, Purification Scientist, Chromatography Expert, UF/DF Specialist, Viral Inactivation, Filtration Processes, GMP, cGMP, CDMO, Biopharmaceuticals, Large Molecule Therapeutics, Mammalian Cell Culture, CMC, MVDA, Multivariate Data Analysis, Process Optimization, Scale-Up, Process Characterization, Protein Purification, Biotech Jobs, Pharmaceutical Jobs, Manufacturing Sciences, Good Documentation Practices, GDP, Regulatory Documentation, Process Troubleshooting, Biotech Careers, Bioprocessing, Biomanufacturing, Upstream Operations, Downstream Operations, Technical Transfer Scientist, Process Engineer, Manufacturing Scientist, Bioprocess Engineer, Biotech Process Development, Biologics Process Engineer, Clinical Manufacturing, Commercial Manufacturing, Biotech Scale-Up, Biotech Purification, Biotech Technology Transfer
    $80k-120k yearly 57d ago
  • Research Associate - Neural Plasticity

    Lieber Institute for Brain Development 3.5company rating

    Baltimore, MD jobs

    A little about us: The Lieber Institute for Brain Development (LIBD) was established in 2010 to plot a new course in biomedical research that would change the lives of individuals affected with developmental brain disorders. We are one of the only research institutions in the world focused specifically on understanding how genes and the environment influence the way our brains develop that lead to conditions such as schizophrenia, autism, bipolar disorder and related developmental brain disorders. Through our cutting-edge research, answers are emerging and being translated into a robust pipeline of new drugs in development. And, by focusing on genes and their dynamic interplay with the environment, we are getting even closer to the “holy grail” in medical research, the discovery of strategies for primary prevention. We are a group of dedicated, multidisciplinary and optimistic researchers, working at the cutting edge of science, utilizing state-of-the-art tools to unlock the mystery of the brain and transform the way we approach the development of new treatments, and ultimately cures. LIBD is an independent 501(c)(3) medical research institute located in the Bioscience Park on the campus of the Johns Hopkins School of Medicine and Hospital in Baltimore, MD. Job Summary: We are seeking an enthusiastic and self-motivated individual to join our group as a Research Associate. This position is best suited for candidates with significant experience in molecular biology, next generation sequencing, library prep, FACS sorting, and microscopy. The successful applicant will work within a dynamic team-based environment in a translational research setting with a focus on spatial transcriptomics projects in postmortem human brain tissue. Projects aim to generate transcriptome-scale maps in the human brain to understand differences in spatial gene expression in neuropsychiatric disorders. The Research Associate will thoughtfully conduct experiments, analyze data, participate in experimental design, and train junior personnel Overview of Duties: · Assist with brain tissue dissections · Cryosectioning postmortem human brain tissue · RNA extraction and qPCR · RNA-seq library construction · Nuclei isolation and FACs sorting · Immunocytochemistry and single-molecule fluorescent in situ hybridization · Confocal microscopy and slide scanning · Data analysis in MATLAB and R programming languages *This position description is intended to serve as a summary of the general purpose and essential functions of this position. It may change as circumstances warrant and may include other duties as deemed necessary by management. Requirements Professional and Education Requirements: · A B.S. degree in Neuroscience, Biology, or a closely related field is required. MS degree is preferred · Minimum 3 years of related laboratory research experience, including experience with RNA-seq is required Familiarity with any of the following is a plus: o Neuroanatomy o Confocal microscopy o Programming in MATLAB, R or Python Required Special Knowledge, Skills and Abilities: · Attention to detail and the ability to perform work carefully and efficiently is essential. · Ability to execute experiments independently · Ability to participate in experimental design and data analysis · Willingness to follow detailed technical protocols · Excellent organizational and communication skills *Applicants must currently be authorized to work in the U.S. on a full-time basis. Employment-based visa sponsorship (including H-1B sponsorship) is not available for this position. Physical Requirements: · Remaining in a seated or standing position for extended periods of time; · Reaching and grasping to manipulate objects with fingers; · Mobility, including the ability to maneuver around a laboratory setting including the ability to move materials weighing up to 25 pounds; · Communication skills using the spoken and written word; · Having the ability to receive detailed information through oral communication; · All other physical demands in a standard laboratory environment. ** If accommodations are needed due to pregnancy or a disability, please contact *************. Compensation Candidates are hired within the starting salary range for the position which is the lower portion of the overall range. The starting salary range for this position is $52k - $55k with opportunities for employee growth over time. Placement in the starting range is based on job-related skills and experience, as evaluated throughout the interview process. Benefits The Lieber Institute for Brain Development offers a competitive, comprehensive benefits package to help us attract and retain the best talent. Please visit ************************************** for more information. EEOC Statement: At the Lieber Institute, we are committed to a work environment of mutual respect where employment decisions are based on merit. As an equal opportunity employer, the Lieber Institute does not discriminate in employment opportunities on the basis of race, color, religion, color, sex, gender identity/expression, sexual orientation, pregnancy, marital status, age, national origin or ancestry, citizenship, disability (physical or mental), genetic information, military service, or other non-merit based factors protected by state or federal law or local ordinance, with regard to any position or employment for which the applicant or employee is qualified. LIEBER INSTITUTE FOR BRAIN DEVELOPMENT'S COMMITMENT TO DIVERSITY, EQUITY, AND INCLUSION The Lieber Institute for Brain Development is a transparent and collaborative community working to produce unique and imaginative patient-oriented solutions to developmental neuropsychiatric disorders. It is committed to integrating scientists from diverse disciplines, cultures, and countries into a research team that draws upon the best of its staff. The Institute is historic-it is defining a unique model for ground-breaking science. It values translational science that revolutionizes the field and improves the quality of life for those affected by mental illness. The Institute provides an environment that fosters independent growth through mentorship and a supportive, collegial community. Diverse minds, ideas, and talent are needed to support LIBD's mission. Fresh, innovative ideas and perspectives are a competitive necessity in an increasingly diverse and global marketplace. The success of the Institute's mission depends upon leveraging a diversity of talent. The Institute's commitment to diversity goes beyond compliance with laws and regulations that promote equal employment opportunity, prohibit discrimination and harassment, and support minority and woman owned businesses. To realize the advantages of its diversity, it is necessary to work effectively together even when differences challenge us to consider ideas and methods that seem impractical or make us feel uncomfortable. The Lieber Institute for Brain Development demonstrates its commitment to diversity by: Including others: Talent is not limited to those with a narrow set of industry and academic credentials. The Institute is committed to building diverse teams, inviting others to share their perspectives, seeking out a diversity of input when making decisions, questioning traditional thinking, and promoting continuous learning and development. Respecting one another: The Institute is committed to listening carefully to others, seeking consensus, engaging in active and constructive debate, thoughtfully challenging one another, and providing constructive feedback. Building trust: The Institute is committed to sharing information and resources, depending on one another to get things done, keeping promises, and conveying high integrity in all actions.
    $52k-55k yearly 60d+ ago

Learn more about Cipher jobs