Career Opportunities

A Service Disabled Veteran Owned Small Business

Career Opportunities

Defense System Security Engineer III

 The Defense System Security Engineer will be responsible for conducting cyber security vulnerability assessments on DoD  weapons systems to inform and educate system developers, integrators, maintainers, end users and mission owners on threats to their mission from advanced adversarial threats. The culmination of events lead to the demonstration of effects resulting from discovered vulnerabilities in weapons systems.

Requirements: • B.S. degree in Computer Science, System Engineering, Cyber Security, Information Management or related discipline.  In lieu of a B.S. degree an additional four years of experience may be substituted. CI or FS Poly Required.

Twelve (12) years' experience in the following:

  • Integrating processes for mitigating and managing risks to advanced technology and mission-critical system functionality from foreign collection, design vulnerability or supply chain exploit/insertion
  • Identifying security vulnerabilities and minimizing or containing risks associated with these vulnerabilities
  • Assessing and prioritizing the broad spectrum of security threats and attacks to system, and to identify the right, cost-effective mixture of measures to protect against such attacks
  • Developing risk assessments within the framework of current and projected cyber threat environments.

Defense System Security Engineer II

The Security Engineer will be responsible for conducting cyber security vulnerability assessments on DoD weapons systems to inform and educate system developers, integrators, maintainers, end users and mission owners on threats to their mission from advanced adversarial threats.  The culmination of events lead to the demonstration of effects resulting from discovered vulnerabilities in weapons systems.

Requirements: • B.S. degree in Computer Science, System Engineering, Cyber Security, Information Management or related discipline.  In lieu of a B.S. degree an additional four years of experience may be substituted. CI or FS Poly Required.

Eight (8) years' experience in six of the following:

  • Integrating processing for mitigating and managing risks to advanced technology and mission-critical system functionality from foreign collection, design vulnerability or supply chain exploit/insertion
  • Identifying security vulnerabilities and minimizing or containing risks associated with these vulnerabilities
  • Assessing and prioritizing the broad spectrum of security threats and attacks to system, and to identify the right, cost-effective mixture of measures to protect against such attacks
  • Developing risk assessments within the framework of current and projected cyber threat environments

Cyber Security Researcher/Developer

Conduct cyber security research to identify weaknesses in DoD IT products.  Leads special projects or investigations into specific technology or solution issues and to shepherd research and piloting of new technologies. Identify, evaluate, and analyze vulnerabilities in network appliances that detect, identify, and describe vulnerabilities in a system, network, component, or process. Develop, test, research and advise in solving Cyber Defense analytic problems. Analyze cyber defense research and identify areas for additional applied research.

Requirements: • B.S. degree in Computer Science, System Engineering, Cyber Security, Information Management or related discipline.  In lieu of a B.S. degree an additional four years of experience may be substituted.  CI or FS Poly Required

Eight (8) years’ experience in the following:

  • Technology research to include evaluating potential vulnerabilities in cyberspace systems, network and vulnerability analysis.
  • Researching technical manuals, standards, etc. to understand capabilities and/or vulnerabilities of a system or computer network.

Two (2) years’ experience in:

  • Working and assessing IA Products.
  • Network and vulnerability analysis.
  • Analyzing cyber defense research products and identify areas for additional applied research.
  • Analyzing cyber defense data and write reports on the findings and approaches to use the data.
  • Providing expert advice, testing, and research to solve Cyber Defense analytic problems

Reverse Engineer - Senior

Conduct reverse engineering and vulnerability analysis of complex and diverse software systems. Design, develop, and document proof-of-concept software to demonstrate their findings and develop custom programs for automating reverse engineering and interacting with binaries being analyzed.  BA or BS degree and 6 years of experience with software or reverse engineering or 12 years of experience with software or reverse engineering in lieu of a degree.  CI or FS Poly required.

  • Performing reverse engineering of hardware and/or software to create exploits to test the mission effect in an operationally relevant lab.
  • Experience with programming, including Python, C, C++, and Assembly
  • Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and performing dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent softwareExperience with developing software systems in assembly, C, C++, or equivalent low-level proprietary languages on Windows, UNIX, Linux, VxWorks, or vendor-proprietary operating systems
  • Ability to read or write one or more assembly languages, including x86, ARM, MIPS, or PowerPC

Target Digital Network Analyst

Conducts advanced analysis of SIGINT collection, open source data, network data and host data to ensure target continuity to profile targets and their activities, and develop techniques to gain more target information.  Possesses knowledge of target technologies and applies skills and knowledge of digital networks and the applications on them to determine how targets communicate, move, operate and live.

Qualifications: CI or FS Poly Required. At least five years in two or more of the following:

a. Computer Network Exploitation, Computer Network Attack

b. Vulnerability Assessment

c. Penetration Testing

d. Incident Response

e. Network and/or host foresnics

f. Cryptanalytic work in military or intelligence community organizations

g. Cryptology work in military or intelligence community organization

At least three years of experience in three or more of the following:

a. Analysis of host data at rest (Windows OS, system internals, file attributes

b. Forensics analysis of Windows/Linux systems or mobile devices

c. Commercial, open source or GOTS tools for intrusion detection

d. Packet capture/evaluation (e.g. tcpdump, ethereal/wireshark, etc.)

e. Network Mapping/Discovery (e.g. nmap, trickler)

f. Industry standard system/network tools (e.g. netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals Suite)

g. Exploit development of Microsoft Windows operating systems

h. Exploit development of Linux operating systems