This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a computer network operations (CNO) specialist, you know that embedded and application developers, reverse engineers, and vulnerability analysts all play key roles in the CNO capability development lifecycle. We’re looking for someone like you to flex your problem-solving prowess in a rapidly evolving systems security research and development environment. As a lead CNO capability development specialist on our team, you’ll oversee full project lifecycles. Leading an agile team of professionals, you’ll guide reverse engineering and vulnerability analyses on a range of software problems. You’ll inform operational parameters for complex systems, as well as leverage artificial intelligence and machine learning to influence the delivery of your work. Using your network operations expertise, you’ll determine what the art of the possible is and what can be done—and then you’ll bring it to life for your clients. Help us combat the most advanced adversaries and defend national security.
Job Responsibility:
Oversee full project lifecycles
Lead an agile team of professionals
Guide reverse engineering and vulnerability analyses on a range of software problems
Inform operational parameters for complex systems
Leverage artificial intelligence and machine learning to influence the delivery of your work
Determine what the art of the possible is and what can be done—and then bring it to life for your clients
Requirements:
8+ years of experience with computer network operations capability development and engineering services, including defense and exploitation to gain strategic advantages
Experience with leading-edge principles, theories, and concepts
Experience with advanced software development, analytic development, and DevOps techniques for malware variants, advancing crypt capabilities, and emerging unknown protocols
Experience gathering requirements and designing and developing approaches for product security and resilience cryptographic solutions and anti-forensic measures
Experience with indigenous and vendor proprietary protocols
Experience using automation and virtualization to deploy, maintain, and sustain capabilities, developing and executing strategies for countering or mitigating environmental challenges, security and policy constraints, and system or architecture limitations
TS/SCI clearance with a polygraph
Bachelor’s degree
Nice to have:
5+ years of experience in telecommunications operations, computer network operations, SIGINT collection operations, information security (INFOSEC) or information assurance, or research and development
5+ years of experience with computer programming in C, C++, Python, Assembly, or PerlScript
2+ years of experience in computer engineering, computer science, electronic and electrical engineering, or applied mathematics
2+ years of experience in big data platforms, black box testing, cloud computing, disassembly, or Global Telecommunications System Architectures & Protocols, Protocol Analysis, SCADA Design and systems, software debugging, streaming analytics, vulnerability management, or mitigation
Experience in embedded systems programming, exploit development, and malware reverse engineering
Experience with Unix, Linux, RTOS, or Wind River VxWorks
What we offer:
Health, life, disability, financial, and retirement benefits