Responsibilities Peraton is currently looking for Malware Reverse Engineer to support one of our longstanding... to determine functionality and capability. The Malware Reverse Engineer will analyze samples and provide a written technical report...
fields of technology. Currently we have an immediate need to add an experienced: Reverse Engineer Location: Chantilly... Only applicants with the active required security clearance and are U.S. Citizens will be reviewed. As a Reverse Engineer...
Responsibilities The Cyber Security Engineer monitors, analyzes, and detects cyber events and incidents... teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation; 1+ years...
Responsibilities The Cyber Security Engineer monitors, analyzes, and detects cyber events and incidents... teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation; 3+ years...
Job Description: Operational Systems Engineer Time Type: Full time Minimum Clearance Required to Start: TS/SCI... with Polygraph As a skilled Operational Systems Engineer, you will design, develop, enhance, and maintain software capabilities...
network You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations... recommendations You will analyze, disassemble, and reverse-engineer malicious code; documenting and transitioning results in reports...
You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out... You will analyze, disassemble, and reverse-engineer malicious code, documenting and transitioning results in reports, presentations...
engineering, software reverse engineering, and computer exploitation. Proven proficiency with at least three (3) or more of the... reverse engineering, computer forensics, network analysis, vulnerability assessment, or REQ malware forensics. 3+ years...
client's global network You will reverse engineer network layouts using data collected from the network itself to identify... recommendations You will analyze, disassemble, and reverse-engineer malicious code; documenting and transitioning results in reports...