Nightwing
Jobs at Similar Companies
Similar Companies Hiring
Jobs at Nightwing
Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.
Success! We'll use this to further personalize your experience.
Recently posted jobs
Information Technology • Software
The Proposal Manager leads development of proposals for Federal customers, ensuring compliance and collaboration with teams. Responsibilities include managing timelines, guiding content creation, and maintaining proposal best practices.
Information Technology • Software
Oversee design and maintenance of on-premise data center environments, provide technical leadership, and ensure high IT system performance.
Information Technology • Software
Develop software for cybersecurity, focusing on systems-level security engineering with a range of technologies. Engage in software production for commercial and government clients.
Information Technology • Software
Develop software for security systems, focusing on OS internals, debugging, and driver development using C/C++, while ensuring compliance with security standards.
Information Technology • Software
Vulnerability Researchers at Nightwing analyze systems to understand their behavior, developing and defeating security techniques, primarily working with C/C++ and Python.
Information Technology • Software
Vulnerability Researchers analyze systems to develop and defeat security techniques. They write code and perform reverse engineering in small teams.
Information Technology • Software
The Applications Architect will design software architectures, lead development teams, collaborate on technical solutions, and ensure application performance and standards are met, while mentoring junior developers.
Information Technology • Software
The Site Lead manages Advanced Special Operations Techniques programs, coordinating resources and ensuring timely and accurate delivery of services to meet government objectives.
Information Technology • Software
The Cybersecurity Project Engineer designs and deploys security controls for a secure multi-tenant infrastructure, conducts risk assessments, and collaborates with various teams to implement security measures and protocols.
Information Technology • Software
The Cloud/DevOps Engineer designs DevSecOps pipelines for automation, manages cloud infrastructure, and resolves deployment issues while collaborating with engineering teams.
Information Technology • Software
The Hardware Engineer analyzes and optimizes hardware infrastructure, manages inventory, develops specifications, and supports data center operations and maintenance tasks.
Information Technology • Software
Design and implement ServiceNow SecOps solutions, integrate with SIEM and vulnerability scanners, develop workflows, provide mentorship, and ensure compliance with security standards.
Information Technology • Software
The Multi-disciplinary Engineer II will develop innovative engineering solutions, design testing plans, conduct analyses, and prototype for various engineering disciplines, collaborating effectively with teams.
Information Technology • Software
The Principal Vulnerability Researcher will analyze and identify zero-day vulnerabilities, develop and debug software applications, utilize program analysis tools, and require a TS/SCI with polygraph clearance.
Information Technology • Software
The Information Review and Release Analyst reviews requests for information under FOIA and Privacy Act, managing cases and collaborating with government agencies to ensure compliance and process improvements.
Information Technology • Software
The candidate will develop and maintain software applications as web services, work with various databases, and ensure compliance with IT solutions in intelligence operations.
Information Technology • Software
Seeking an Applications Developer to design, develop, and implement high-performance software solutions for complex challenges, focusing on security, innovation, and collaboration.
Information Technology • Software
The CSOC Threat Management Specialist performs incident analysis, handles security incidents, recommends detection mechanisms, leverages AI/ML for threat detection, and supports operational processes in a CSOC environment.
Information Technology • Software
The Information Review and Release Analyst reviews and researches FOIA, PA, and EOMDR requests, analyzing classified information and collaborating with teams to ensure accurate release decisions.
Information Technology • Software
The Senior Principal Vulnerability Researcher will identify zero-day vulnerabilities, analyze software, and develop techniques for vulnerability exploitation in various operating systems.






