“Y’all are the first company I’ve actively thrown people at. Other places were -Eh, they pay you, just ignore the front office.” – Team Member

We pay $$$ for external referrals!
Submit your referral today!
DESCRIPTION:
The candidate will join a team of developers working on various Mobile-centric efforts.
REQUIREMENTS:
- Understanding of Mobile OS Internals (any major OS)
- Experience reading and writing assembly (x86/x64, ARM, MIPS, etc.)
- Extensive experience with debuggers (WinDBG, GDB, ADB, BDI, etc.)
- Strong C, Python, and ASM development experience
- Demonstrated ability to self-drive research tasking
- Motivated to learn complex systems
- Will work as part of a team of researchers and developers
Job Features
DESCRIPTION: The candidate will join a team of developers working on various Mobile-centric efforts. REQUIREMENTS:
DESCRIPTION:
The candidate will be working independently as a Software Researcher to identify flaws in software. Additionally, the candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. The candidate must be extremely detail oriented when documenting their research. Often, the candidate will be required to write code in C, Python, and Assembly to demonstrate ability to control the flaws.
REQUIREMENTS:
- Understanding of OS Internals (any major OS)
- Experience reading and writing assembly (x86/x64, ARM, MIPS, etc.)
- Extensive experience with debuggers (WinDBG, GDB, ADB, BDI, etc.)
- Experience with dynamic and static binary analysis, fuzzing techniques, and source code auditing
- Strong C, Python, and ASM development experience
- Demonstrated ability to self-drive research tasking
- Motivated to learn complex systems
- Working as a team with researchers and developers
Job Features
DESCRIPTION: The candidate will be working independently as a Software Researcher to identify flaws in software. Additionally, the candidate must be familiar with the latest techniques in vulnerabilit…
DESCRIPTION:
The candidate will join a team of developers developing a full-stack testing and packaging capability for a large-scale modular framework.
REQUIREMENTS:
- In-depth experience in Testing and Evaluation (T&E)
- In-depth understanding of Computer Network Operations (CNO) tradecraft
- Experience with Python (pytest and/or unittest modules preferred)
- Experience creating virtual environments
- Ability to perform system level testing, evaluation, and related activities
- Ability to create, update, and maintain technical documentation
- Ability to perform basic software installation and operation tasks
- Ability to document test results including successes, failures, and deficiencies
- Experience communicating both orally and written on testing status to technical leads and customers
Job Features
DESCRIPTION: The candidate will join a team of developers developing a full-stack testing and packaging capability for a large-scale modular framework. REQUIREMENTS:
DESCRIPTION:
The candidate will be responsible for performing reverse engineer research on highly complex software applications. This research will involve static and dynamic analysis including reverse engineering and kernel debugging. Research results will be encapsulated in written reports and or software tools. The candidate will be working alongside some of the world’s best reverse engineers, learning unique skills and exploring challenging problems every day.
REQUIREMENTS:
- Software development experience with C/C++ and Python
- Knowledge of common binary executable formats (PE, ELF, etc.)
- Experience with IDA Pro, Ghidra, or similar binary analysis tool
- Experience with analyzing user-mode binaries and kernel-mode drivers
- Experience with Wireshark and network protocols
Job Features
DESCRIPTION: The candidate will be responsible for performing reverse engineer research on highly complex software applications. This research will involve static and dynamic analysis including revers…
DESCRIPTION:
The candidate will join a seasoned team of fellow developers developing modular code that interfaces with a large-scale framework.
REQUIREMENTS:
- Strong proficiency in C++ and Python
- In-depth understanding of OS internals
- In-depth understanding of network protocols
- Familiarity with modern software engineering concepts
- Knowledge of common CNO techniques
Job Features
DESCRIPTION: The candidate will join a seasoned team of fellow developers developing modular code that interfaces with a large-scale framework. REQUIREMENTS:
DESCRIPTION:
The candidate will join a team of developers working on various Windows capabilities. They will support the group’s overall mission to design, develop, test, and maintain CNO capabilities.
REQUIREMENTS:
- Strong proficiency in C/C++, Python, and Assembly
- Experience with IDA Pro, Ghidra, or similar binary analysis tool a plus
- Expert-level experience with kernel and driver development
- In-depth understanding of network protocols
- In-depth understanding of OS internals (including runtime linker/loader, object file formats, file system internals, access control, data structures, etc.)
- Familiarity with modern software engineering concepts
- Knowledge of common CNO techniques
- Ability to gather requirements and design a solution with minimal oversight
- Ability to present a development plan and forecast deliverables
Job Features
DESCRIPTION: The candidate will join a team of developers working on various Windows capabilities. They will support the group’s overall mission to design, develop, test, and maintain CNO capabi…
DESCRIPTION:
The candidate will join a team of developers working on various mobile capabilities. They will work as part of a team designing, developing, testing, and maintaining mobile CNO capabilities.
REQUIREMENTS:
- Strong proficiency in C/C++ and Python
- In-depth understanding of Mobile OS internals and build environments (Xcode, etc.) or strong Unix background with willingness to learn new technologies
- In-depth understanding of network protocols
- Familiarity with modern software engineering concepts
- Knowledge of common CNO techniques
- Ability to gather requirements and design a solution with minimal oversight
- Ability to present a development plan and forecast deliverables
Job Features
DESCRIPTION: The candidate will join a team of developers working on various mobile capabilities. They will work as part of a team designing, developing, testing, and maintaining mobile CNO capabiliti…
DESCRIPTION:
Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
Characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and mission supported by those systems.
Compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the technologies being studied.
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security.
LEVEL 3:
Doctoral degree with 4 years, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms. Chara…
DESCRIPTION:
Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
REQUIREMENTS:
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
Information Assurance Certification may be required.
QUALIFICATIONS:
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security).
LEVEL 2:
Doctoral degree with 2 years, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years of experience.
LEVEL 3:
Doctoral degree with 4 years, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience.
Job Features
DESCRIPTION: Identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks…
REQUIREMENTS:
Relevant experience must be in an area directly related to an NSA mission (e.g. collection, cyber and intelligence analysis) and/or similar mission in the IC or DoD, and include strategic and/or operational level planning (e.g. joint operations).
External engagement/collaboration experience (e.g. participation in cross-Agency working groups, JDA, field experience, and external customer support.
QUALIFICATIONS:
Bachelor’s Degree in any field.
Level 1:
Bachelor’s Degree, Associates degree with 4 years of experience, HS diploma or GED with 6 years of experience.
Level 2:
Doctoral Degree with 2 years of relevant experience, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years of experience, HS diploma or GED with 9 years of experience.
Level 3:
Doctoral Degree with 4 years of relevant experience, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of experience, HS diploma or GED with 12 years of experience.
Job Features
REQUIREMENTS: Relevant experience must be in an area directly related to an NSA mission (e.g. collection, cyber and intelligence analysis) and/or similar mission in the IC or DoD, and include strategi…
DESCRIPTION:
Perform technical analysis or malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise.
Provide information and documentation that enables malware detection, signature creation, and mitigation.
REQUIREMENTS:
Relevant experience must be in malware reverse engineering.
CISSP, GIAC GREM or CREA Certification is required.
Information Assurance Certification may be required
QUALIFICATIONS:
Bachelor’s Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
LEVEL 2:
Doctoral degree with 2 years of relevant experience, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years may be considered for individuals with in-depth experience that is clearly related to the position.
Job Features
DESCRIPTION: Perform technical analysis or malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascer…
REQUIREMENTS:
Relevant experience must be in a computer science area (i.e. theoretical or applied), designing/developing/using/evaluating mathematic models, methods, and/or techniques (e.g. algorithm or development) to study issues and solve problems, engineering (electrical or computer), and/or high performance computing.
QUALIFICATIONS:
Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field with at least one programming and at least 4 upper-level math classes (Calculus and above)
Level 1:
Bachelor’s Degree with 2 years of relevant experience, Associates degree with 4 years of in-depth relevant experience that is clearly related to the position
Level 2:
Doctoral degree plus 2 years of relevant experience, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years of in-depth relevant experience that is clearly related to the position.
Level 3:
Doctoral degree plus 4 years of relevant experience, Master’s degree with 6 years of relevant experience, Bachelor’s Degree with 8 years of relevant experience, Associates degree with 10 years of in-depth relevant experience that is clearly related to the position.
Job Features
REQUIREMENTS: Relevant experience must be in a computer science area (i.e. theoretical or applied), designing/developing/using/evaluating mathematic models, methods, and/or techniques (e.g. algorithm …
DESCRIPTION:
Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework.
Solutions derived from forensics and attack attribution, protection or critical networks, active systems, knowledge discovery of passive and active systems, or other cryptologic computer science mission support.
Requisite computer science skills (operating systems, compiler theory, databased theory, algorithm analysis, computer architecture, discrete math, programming language theory, and data structure) are applied to each problem to problem to provide state-of -the-art techniques, tools and approaches.
REQUIREMENTS:
Relevant experience must be in a computer science area (i.e. theoretical or applied), simulation/model development, designing/developing/using/evaluating mathematic models, methods, and/or techniques (e.g. algorithm or development) computation science, algorithm analysis and design, reverse engineering, and/or designing/developing computer and information systems, including engineering hardware and/or software.
QUALIFICATIONS:
Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field with at least one programming and at least 4 upper-level math classes (Calculus and above)
Level 1:
Bachelor’s Degree with 2 years of relevant experience, Associates degree with 4 years of in-depth relevant experience that is clearly related to the position
Level 2:
Doctoral degree plus 2 years of relevant experience, Master’s degree with 3 years of relevant experience, Bachelor’s Degree with 5 years of relevant experience, Associates degree with 7 years of in-depth relevant experience that is clearly related to the position.
Level 3:
Bachelor’s Degree with 10 years of relevant experience, Associates degree with 12 years of experience may be considered for individuals with in-depth experience that is clearly related to the position.
Job Features
DESCRIPTION: Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. Solutions derived from forensics and attack attribution,…
DESCRIPTION:
Employ must have some combination (2 or more) of the following skill areas:
Foundations: Mathematical, Computational, Statistical
Data Processing: Data management and curation, data description and visualization, workflow and reproducibility
Modeling, Inference, and Prediction: Data modeling and assessment, domain-specific consideration.
Ability to make and communicate principal conclusions from data using elements of mathematics, statistics, computer science, and applications-specific knowledge.
Ability to use analytic modeling, statistical analysis, programming, and/or another appropriate scientific method, develop and implement qualitative and quantitative methods for characterizing, exploring, and assessing large datasets in various states of organization, cleanliness, and structure that account for the unique feature and limitations inherent in data holdings.
Translate practical mission needs and analytic questions related to large datasets into technical requirements and, conversely, assist others with drawing appropriate conclusions from the analysis of such data.
Effectively communicate complex technical information to non-technical audiences.
Make informed recommendations regarding competing technical solutions by maintaining awareness of the constantly shifting collection, processing, storage, and analytic capability and limitations.
REQUIREMENTS:
Relevant experience must be in designing/implementing machine learning, data science, advanced analytical algorithms, programming (skill in at least on high level language (e.g. Python), statistical analysis (e.g. variability, sampling error, inference, hypothesis testing, EDA, application of linear models), data management (e.g. data cleaning and transformation), data mining, data modeling and assessment, artificial intelligence, and/or software engineering.
Level 2:
Experience in more than one area is strongly preferred.
QUALIFICATIONS:
Bachelor’s Degree must be in Mathematics, Applied Mathematics Statistics, Applied Statistics, Machine learning, Data Science, Operations Research, or Computer Science or a degree in a related field (Computer Information Systems, Engineering), a degree in the physical/hard sciences (e.g. physics, chemistry, biology, astronomy), or other science disciplines with a substantial computational component (i.e. behavioral, social, or life) may be considered if it included a concentration of coursework (5 or more courses) in advanced Mathematics (typically 300 level or higher, such as linear algebra, probability and statistics, machine learning) and/or computer science (e.g. algorithms, programming, , data structures, data mining, artificial intelligence).
Broader range of degrees will be considered if accompanied by a Certificate in Data Science from an accredited college/university.
Level 2:
Bachelor’s Degree with 3 years of relevant experience, Associates degree with 5 years of experience may be considered for individuals with in-depth experience that is clearly related to the position.
Level 3:
Experience in more than three areas is strongly preferred.
QUALIFICATIONS:
Bachelor’s Degree must be in Mathematics, Applied Mathematics Statistics, Applied Statistics, Machine learning, Data Science, Operations Research, or Computer Science or a degree in a related field (Computer Information Systems, Engineering), a degree in the physical/hard sciences (e.g. physics, chemistry, biology, astronomy), or other science disciplines with a substantial computational component (i.e. behavioral, social, or life) may be considered if it included a concentration of coursework (5 or more courses) in advanced Mathematics (typically 300 level or higher, such as linear algebra, probability and statistics, machine learning) and/or computer science (e.g. algorithms, programming, , data structures, data mining, artificial intelligence).
Broader range of degrees will be considered if accompanied by a Certificate in Data Science from an accredited college/university.
Level 3:
Bachelor’s Degree with 10 years of relevant experience, Associates degree with 12 years of experience may be considered for individuals with in-depth experience that is clearly related to the position.
Job Features
DESCRIPTION: Employ must have some combination (2 or more) of the following skill areas: Foundations: Mathematical, Computational, Statistical Data Processing: Data management and cu…
DESCRIPTION:
The Target Digital Network Analyst conducts advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniques to gain more target information. The TDNA has an understanding the principles and methods of exploiting foreign communications and communication systems to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; analyzes data for reportable intelligence information and building target profiles; maintains appropriate databases for targeting, tasking, and analysis; performs sustained target analysis and enhancement through the use of analytic techniques; analyzes data to identify new access development opportunities for follow-on collection requirements; performs research using open source and classified sources to develop comprehensive baseline profiles of designated target sets; identifies intelligence gaps and evaluating the intelligence gathered in order to either tailor current collection or enable new collection to close the gaps.
REQUIREMENTS:
Relevant experience requires aspects of Intelligence Analysis (e.g. target development, social network analysis, and metadata analysis.
QUALIFICATIONS:
Liberal Arts field (e.g., English, History, Communications, Languages and Cultures, International Relations, and Political Science) are preferred, but a degree in any field is acceptable
NOTE: Information Technology or Information Systems degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major.
Job Features
DESCRIPTION: The Target Digital Network Analyst conducts advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniqu…