Cyber Security and Information Services

Ensuring that national security missions can be accomplished successfully despite cyber attacks takes technical ingenuity and creativity. We research, develop, evaluate, and deploy new tools that confront continually evolving cyber threats. We also develop advanced hardware, software, and algorithms for processing datasets from a range of sources, including speech, imagery, text, and network traffic.

Search results for "". Page 1 of 2, Results 1 to 25 of 33
Title Research Area Group Job Function
Reset
Space Systems Security Scientist 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Cyber Security
Reverse Engineer and Vulnerability Researcher 05 - Cyber Security and Information Sciences 05-51 - Cyber-Physical Systems Cyber Security
RF Analyst/Engineer
RF Analyst/Engineer Lexington, MA, US
05 - Cyber Security and Information Sciences 05-51 - Cyber-Physical Systems Cyber Security
Postdoctoral Associate
Postdoctoral Associate Lexington, MA, US
05 - Cyber Security and Information Sciences 05-99 - Supercomputing Center Engineering / Science / Technology
Super Computing Center--Summer Research Program Intern 05 - Cyber Security and Information Sciences 05-99 - Supercomputing Center Engineering / Science / Technology
Group 57--Summer Research Program Intern (Cyber Operations and Analysis Technology) 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Student / Co-Op / Summer
Business Manager
Business Manager Lexington, MA, US
05 - Cyber Security and Information Sciences 05-52 - AI Technology and Systems Finance
Cyber Operations & Architectures Researcher 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Engineering / Science / Technology
Reverse Engineer and Vulnerability Research Specialist 05 - Cyber Security and Information Sciences 05-51 - Cyber Systems and Operations Cyber Security
Group 53 - Summer Research Program Intern (Secure Resilient Systems and Technology) 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Student / Co-Op / Summer
Integrated Cyber Exploitation Researcher (Fort Meade, MD) 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Software Solution Architect and Engineer 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Software Development / Architecture
Cyber Systems Exploitation Researcher 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Cyber-Physical Systems Engineer 05 - Cyber Security and Information Sciences 05-51 - Cyber Systems and Operations Cyber Security
Cyber Systems Exploitation Researcher 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Sr. Software Engineer - Cryptographic Systems Architect 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Cyber Security
Integrated Cyber Exploitation Researcher (Fort Meade, MD) 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Grp 59 - Cyber System Exploitation CO-OP (July-December, 2024) 1 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Student / Co-Op / Summer
Joint All-Domain Command & Control (JADC2) System Architect 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Engineering / Science / Technology
Grp 59 - Cyber System Exploitation CO-OP (July-December, 2024) ) 1 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Student / Co-Op / Summer
Computer Vision and Multimedia Engineering 05 - Cyber Security and Information Sciences 05-52 - AI Technology and Systems Cyber Security
Group 52--Student Technical Assistant (AI Technology and Systems) (July-December) 05 - Cyber Security and Information Sciences 05-52 - AI Technology and Systems Student / Co-Op / Summer
Cyber Systems Exploitation Researcher
Cyber Systems Exploitation Researcher Lexington, MA, US +1 more…
05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Group 59-Summer Research Program--Cyber System Exploitation Intern 1 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Cyber Operations Researcher
Cyber Operations Researcher Lexington, MA, US
05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Cyber Security