Cyber Vulnerability Researcher - C or C++, Python, RUBY Cyber Vulnerability Researcher - C or C++, Python, RUBY - Skills Required - C or C++...
Cyber Vulnerability Researcher - C or C++, Python, RUBY Cyber Vulnerability Researcher - C or C++, Python, RUBY - Skills Required - C or C++, Python, RUBY, Perl, cyber vulnerability researcher, Active Security Clearance, Active Clearance, Security Clearance, Active Top Secret Clearance
If you are a Cyber Vulnerability Researcher with experience, please read on!
**Top Reasons to Work with Us**
Our team is casual. We usually wear t-shirts and jeans. We are a close-knit group and enjoy participating in social activities outside of work. Whether it is visiting local restaurants, bowling, Korean BBQ, or paintball we always have a good time.
**What You Will Be Doing**
JOB RESPONSIBILITIES AND EXPECTATIONS
Collaborate with the Cyber Innovations Team to develop software systems that aid in data analytics, network-based applications, reverse engineering tasks, embedded system development, and integration of hardware.
Provides direction and coaching to lower level staff around strengths and weaknesses of solutions, conclusions and problem approach.
Utilizes understanding of project plan to ensure identified tasking aligns with deliverable and guides staff to meet deliverables. Works independently to create a finished product. Acts as principal investigator on medium programs/ tasks consisting of a multi-staff team. Identifies staffing needs and issues.
Works with internal and external clients and partners. Communicates with client regarding schedule and project performance, manages partner relationships, and facilitates client and partner meetings. Authors and conducts briefings for clients, regulators, and stakeholders and in public forums as necessary. Demonstrates advanced knowledge of the information being presented and can be relied on to respond to client questions as they arise, engaging SMEs where appropriate.
Conceptualizes, leads and supports multiple Internal Research and Development (IRAD) projects.
Leads collaboration efforts including brainstorming on complex technical issues. Provides mentoring and technical guidance to lower level staff and encourages development through collaboration and the open exchange of ideas.
Draws from understanding of business' product offerings and strategic growth vision to contribute to the development of a strategic plan and support successful, ongoing business development efforts involving Cyber programs. Coordinates and participates in company-sponsored marketing events or conferences and plays an active role in identifying, cultivating, and capturing major business opportunities. May participate in industry conferences and increases company visibility through publications or online presence.
Manages small scale proposals or major sections of large proposals, and serves as a key contributor during win theme meetings and red team reviews. Evaluates RFPs and derives requirements for deliverables, independently forms technical approach from differentiators and oversees support by lower level staff. May serve as proposal manager or Technical Volume lead on medium proposals.
**What You Need for this Position**
THE FOLLOWING REQUIREMENTS MUST BE MET TO BE CONSIDERED FOR THIS POSITION:
Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, or related field of study, or equivalent experience
10+ years' experience in Vulnerability Researcher, Reverse Engineer, or related technical area
Develop software to run in user-mode or kernel-mode
Ability to code in C or C+Ability to use a scripting language (Python, Perl, Ruby, etc.)
Experience with all of the following:
PC and embedded systems architecture to include boot processes and OS internals
Assembly-level code on multiple platforms (x86, x64, ARM, MIPS, PowerPC, etc.)
Knowledge of common mitigation techniques (DEP, ASLR, etc.)
Successful experiences working with teams
THE FOLLOWING IS DESIRED, BUT NOT REQUIRED TO BE CONSIDERED FOR THIS POSITION:
Ability to analyze network protocols throughout all layers of the network stack
Background in software engineering and architecture
Previous exposure to malware reverse engineering
Active Secret or Top Secret Clearance
**What's In It for You**
You will be a part of a team that's grounded in the belief that science, technology and a passion for excellence can make industries more competitive and the world a better place.
So, if you are a Cyber Vulnerability Researcher with experience, please apply today!
Applicants must be authorized to work in the U.S.
**CyberCoders, Inc is proud to be an Equal Opportunity Employer**
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.
**Your Right to Work** ? In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
*Cyber Vulnerability Researcher - C or C++, Python, RUBY*