Cyber Security and Information Services

Ensuring that national security missions can be accomplished successfully despite cyber attacks takes technical ingenuity and creativity. We research, develop, evaluate, and deploy new tools that confront continually evolving cyber threats. We also develop advanced hardware, software, and algorithms for processing datasets from a range of sources, including speech, imagery, text, and network traffic.

Search results for "". Page 1 of 1, Results 1 to 18 of 18
Title Research Area Group Job Function
Reset
Group 57--Summer Research Program Intern (Cyber Operations and Analysis Technology) 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Student / Co-Op / Summer
Business Manager
Business Manager Lexington, MA, US
05 - Cyber Security and Information Sciences 05-52 - AI Technology and Systems Finance
Cyber Operations & Architectures Researcher 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Engineering / Science / Technology
Reverse Engineer and Vulnerability Research Specialist 05 - Cyber Security and Information Sciences 05-51 - Cyber Systems and Operations Cyber Security
Cyber Systems Exploitation Researcher 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Group 53 - Summer Research Program Intern (Secure Resilient Systems and Technology) 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Student / Co-Op / Summer
Integrated Cyber Exploitation Researcher (Fort Meade, MD) 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Cyber Security
Cyber-Physical Systems Engineer 05 - Cyber Security and Information Sciences 05-51 - Cyber Systems and Operations Cyber Security
Sr. Software Engineer - Cryptographic Systems Architect 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Cyber Security
Space Systems Security R&D Engineer 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Cyber Security
Research Scientist - System Security Researcher 05 - Cyber Security and Information Sciences 05-53 - Secure Resilient Systems and Technology Cyber Security
Joint All-Domain Command & Control (JADC2) System Architect 05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Engineering / Science / Technology
Integrated Cyber Exploitation Researcher (Fort Meade, MD) 05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Cyber Systems Exploitation Researcher
Cyber Systems Exploitation Researcher Lexington, MA, US +1 more…
05 - Cyber Security and Information Sciences 05-59 - Cyber System Assessments Cyber Security
Cyber-SIGINT Engineer
Cyber-SIGINT Engineer Lexington, MA, US
05 - Cyber Security and Information Sciences 05-51 - Cyber-Physical Systems Cyber Security
Cyber Operations Researcher
Cyber Operations Researcher Lexington, MA, US
05 - Cyber Security and Information Sciences 05-57 - Cyber Operations and Analysis Technology Cyber Security
Reverse Engineer and Vulnerability Researcher 05 - Cyber Security and Information Sciences 05-51 - Cyber-Physical Systems Cyber Security
Postdoctoral Associate
Postdoctoral Associate Lexington, MA, US
05 - Cyber Security and Information Sciences 05-99 - Supercomputing Center Engineering / Science / Technology