Job Description: We are looking for a skilled Network Evaluator to assess the security and resilience of operational and developmental networks and systems for U.S. government and military customers. You will evaluate these systems for vu...
Job Description: We are looking for a Reverse Engineer to join our team. You will perform technical analysis of malicious binaries through controlled execution and static analysis of assembly code, overcoming techniques designed to defeat...
Job Description: 450 / 451/ 452 Grads Tools: DVT, WVT, PKTSWING Ability to dig into massive sets of hexdump and pick out repeatable sets of data that could be forms of communication hiding in the signal. The Level 3 Protocol Analyst ...
Job Description: We are looking for a skilled Reverse Engineer to support Endpoint Exploitation Activities (EEA) with expertise in malware exploitation (MEX) or mobile-focused capabilities. You will leverage your experience in Computer Ne...
Job Description: We are looking for a Cryptologic Computer Scientist with expertise in Red Hat Enterprise Linux (RHEL) system administration and Ansible automation. You will configure and maintain virtual machines (VMs) for malware analys...
Job Description: We are seeking an Intrusion analyst with expertise in target digital network analysis and malware analysis. In this role, you will analyze target digital network data to discover, analyze, and document malicious or unauth...
Job Description: 450 / 451/ 452 Grads Tools: DVT, WVT, PKTSWING Ability to dig into massive sets of hexdump and pick out repeatable sets of data that could be forms of communication hiding in the signal. The Level 3 Protocol Analyst ...
Job Description: Seeking true SIGNALS analysts proficient in DNI, Cyber, and PROFORMA (TSR), potentially tasked with developing and delivering training initiatives. This role requires expertise in SIGNALS analysis rather than SIGINT, emph...
Job Description: The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assuranc...
Job Description: Analyzes user's requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. ...