Cyber Analyst/Developer

Company Name:
Applied Communication Sciences
Applied Communication Sciences, a wholly owned subsidiary of The SI Organization, Inc., delivers research, consulting, and technology solutions that drive market innovation across the most demanding challenges in the Information and Communications Technologies sectors. Our Bell Labs heritage and unmatched experience have made us a leading developer of mission-critical communications systems. As an industry leader, we are committed to cultivating a staff of professionals who are passionate about developing innovative solutions to for the most difficult and complex information and communications challenges.
We are seeking a Cyber Analyst/Developer, who will perform vulnerability analysis and reverse engineering on computer network devices and protocols, operating systems, software applications, wireless and embedded systems, and process control systems. This includes designing, developing, programming, debugging, documenting and presenting findings, demonstrating and deploying applications and systems. Applicants must be self-motivated, team-oriented, possess excellent communications skills, and must be passionate about developing and deploying innovation solutions to technological and operational challenges.
Responsibilities include, but are not limited to:
Research, discover, analyze and document software and system vulnerabilities
Reverse engineer and analyze software, protocols, drivers and hardware interfaces, and embedded code to uncover faults and weaknesses
Design, develop, test, debug, document and deploy cyber software and systems
Write code in C, C++, Java, Assembly and other languages as needed
Provide user-level documentation
Ensure software standards and best practices are met
Advise customers on current and emerging industry standards and technologies
Applied Communication Sciences is an Equal Opportunity/Affirmative Action employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status, or other protected characteristic. Applied Communication Sciences is an E-Verify Employer. EEO/MF/DV/AA. Minimum Qualifications:
Advanced knowledge of OS fundamentals and internals - interrupts, threading, virtual memory, device drivers, memory management, code and resource optimization, kernel and device driver programming for UNIX, Linux, Windows, and embedded systems
Experience employing processes, tools/platforms, and techniques associated with vulnerability discovery, reverse engineering, and penetration testing
Experience analyzing code for faults using a combination of static, dynamic, and/or other techniques
Experience using software engineering tools for configuration management (e.g. Subversion) and developing in a Win32/Win64 virtual machine environment
Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering or a related field
Minimum 8+ years of experience as an analyst/developer in the computer network security industry
U.S. citizenship and a current TS/SCI clearance with a polygraph required
Willing to travel to customer locations
Preferred Qualifications:
Experience using Unix and Windows kernel debuggers and disassemblers such as Dbg, WinDbg, OllyDbg, ImmDbg, and IDA Pro
Experience programming in Assembly, C, C++, Java, Perl, Python, Unix Shell or other scripting languages
Experience programming System API calls and network sockets on Windows and/or Linux platforms
Familiarity with executable formats such as ELF and PE
Knowledge of analysis techniques for communication protocols and a solid understanding of how data moves within a network protocol stack
Job ID #: 4562
Location: Fort Meade, MD
Functional Area: Computer Software
Education Required: Bachelors Degree
Position Type: Full Time - Regular
Relocation Provided: Yes
Experience Required: 5 - 8 years
Clearance Level: TS/SCI w/ Poly

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.