Get the job you really want.
Maximum of 25 job preferences reached.
Top Cybersecurity Jobs in Boston, MA
Machine Learning • Security • Software • Analytics • Defense
The Senior Cybersecurity Analyst supports operations, compliance, and security policies while providing expertise on cybersecurity strategy and governance.
Top Skills:
Anti-VirusAWSAzureCloud Access Security BrokerCorelight InvestigatorFirewallsIntrusion Detection SystemsIntrusion Prevention SystemsLinuxmacOSMalwareMicrosoft DefenderSentinelTcp/IpUnixVulnerability ManagementWindows
Machine Learning • Security • Software • Analytics • Defense
As a Senior Embedded Software Engineer, you will develop software applications, ensure quality through testing, integrate components, and communicate technical designs within a multidisciplinary team, focusing on embedded systems and cybersecurity.
Top Skills:
BashCC++DockerGccGitGitlabLlvmPythonQemuSubversionTcp/Ip
Machine Learning • Security • Software • Analytics • Defense
The Information Systems Security Manager ensures cybersecurity compliance for classified programs, manages security documentation, and collaborates with various security teams to maintain a secure operational posture.
Top Skills:
EmassNessusNist 800-53 ControlsScapSnowSplunkXacta
Machine Learning • Security • Software • Analytics • Defense
The Senior Software Reverse Engineer will analyze vulnerabilities, perform reverse engineering on software/firmware, and develop cybersecurity solutions. A Top Secret clearance is required.
Top Skills:
Afl++Assembly LanguagesBinary NinjaC/C++GhidraIda ProPythonQemu
Machine Learning • Security • Software • Analytics • Defense
The Software Reverse Engineer will analyze vulnerabilities in cyber physical systems, reverse engineer software/firmware, develop cybersecurity solutions, and document research.
Top Skills:
Afl++Arm AssemblyBinary NinjaC/C++GhidraIda ProPythonQemuX86 Assembly
Machine Learning • Security • Software • Analytics • Defense
The role involves supporting cybersecurity activities for classified programs, ensuring compliance, managing configurations, and conducting vulnerability scans. It requires collaboration with various security professionals and contributing to RMF documentation and cybersecurity architecture.
Top Skills:
AcasLinuxMicrosoft Deployment Toolkit (Mdt)NessusNmapPowerstruxSecurity Content Automation Protocol (Scap)SplunkWindows
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
All Filters
Total selected ()
No Results
No Results


