“Y’all are the first company I’ve actively thrown people at. Other places were -Eh, they pay you, just ignore the front office.” – Team Member

We pay $$$ for external referrals!
Submit your referral today!
We are seeking a motivated and experienced FSO/CSSO to manage and oversee the security programs. The FSO/CSSO is responsible for ensuring Accolade and all cleared employees are compliant with the Nati…
What You’ll Get to Do: As a Senior System Architect, you will apply your knowledge and experience in support of an exciting mission by designing and developing system architectures, developing strat…
QUALIFICATIONS: CWIP: IAT Level I Certification, IA Baseline Certification in Linux, Unix, Windows, or Cisco OS operating system. Five (5) years’ experience as an SA in programs and contracts of sim…
DESCRIPTION: Database Administrator (DBA) / Engineer (DBE) supporting the Application Messaging Framework (AMF). Responsible for the design, maintenance, monitoring, and administration of multip…
DESCRIPTION: This position is hands-on hardware and software analysis, proof-of-concept creation, and product development in support of an exciting mission! In this position, the software developer wi…
DESCRIPTION: The Software Engineer will develop software to efficiently and uniquely process data stored in HADOOP Distributed File Systems. QUALIFICATIONS: REQUIREMENTS: BS in (Computer Science, Elec…
DESCRIPTION: This position is hands-on hardware and software analysis, proof-of-concept creation, and product development in support of an exciting mission! In this position, the Reverse Engineer will…
DESCRIPTION: In this position, the Reverse Engineer will perform active and passive analysis on subject software, in order to develop Proof-of-concept capabilities, and subsequent mature, releasable t…
DESCRIPTION: This position hands-on hardware and software analysis, proof-of-concept creation, and product development in support of an exciting mission! In this position, the software developer will …
DESCRIPTION: The candidate will implement security mitigations for our customer, working at the contractor site with frequent meetings at the customer site. REQUIREMENTS: 10+ years of experience with …
DESCRIPTION: The candidate will be working independently as a Software Researcher to identify flaws in *NIX based software. Additionally, the candidate must be familiar with the latest techniques in v…
DESCRIPTION: The candidate will join a team of developers working on various Mobile-centric efforts. REQUIREMENTS:
DESCRIPTION: The candidate will be working independently as a Software Researcher to identify flaws in software. Additionally, the candidate must be familiar with the latest techniques in vulnerabilit…
DESCRIPTION: The candidate will be working independently as a Software Researcher to identify flaws in software. Additionally, the candidate must be familiar with the latest techniques in vulnerabilit…
DESCRIPTION: The candidate will be working independently as a Software Researcher to identify flaws in software. Additionally, the candidate must be familiar with the latest techniques in vulnerabilit…