• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Cyber Security Research Engineer

Cyber Security Research Engineer

2021-04-01 by Geo

Cyber Security Research Engineer – Perspecta Basking Ridge, NJ

Note: We may earn a commission from products or services when you click on a link and make a purchase.

Business Group Highlights

Perspecta Labs

Perspecta Labs generates transformative applied research to fuel solutions for our customers’ unique challenges. We are a self-sustaining research center within Perspecta that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.



Responsibilities


Perspecta Labs generates transformative applied research to fuel solutions for our customers’ unique challenges. We are a self-sustaining research center within Perspecta that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.

We are looking for candidates with a strong interest in cyber security research and development for full-time positions in our Cyber Security research group.

READ Highest Paying Cyber Security Jobs


Our Projects Span Several Areas Of Interest, Including (but Not Limited To)


Candidates will work with teams to research, conceive, and develop prototypes, and should be adept at identifying successful approaches to complex problems.

  • Full-spectrum cyber operations, including CND, CNE, CNA, and CNO.
  • Program analysis, including program understanding, vulnerability identification, and remediation
  • Malware analysis and reverse engineering
  • Resilient networking in support of cyber mission goals
  • Autonomous agent development
  • Software-defined networking for cyber defense and deception
  • Cryptographic techniques for assured computation
  • Symbolic logic and theorem proving for automating network configuration
  • Application of formal methods for secure and resilient systems
  • Application of mathematic, statistics, and linguistics to large data sets to uncover patterns, extract information and gain understanding
  • Artificial intelligence (reasoning, probabilistic inference, machine learning)

Research Engineers work as part of a team to design, implement, and test components of research prototypes and software systems aimed at solving cutting-edge cyber security research problems in the above areas. Research Engineers are expected to work independently in a collaborative technical environment; creativity and initiative are a plus.

READ 5 Reasons Why Cyber Security Certification Is Worth It

Qualifications


Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.

  • Ability and desire to quickly acquire knowledge of new subject matter areas
  • Expertise in one or more of: C, C++, Java, Python, Go, or similar languages
  • Working knowledge of Linux, MacOS, Windows, and mobile operating systems, platforms and internals
  • Working knowledge of modern computer networking technologies
  • Working knowledge of modern development practices and toolsets (Git, subversion, CI/CD toolchains)
  • U.S. Citizens strongly preferred – permanent residents may be considered if highly qualified
  • Ability to obtain a Top Secret security clearance

Other Relevant Skills (not required, but any are a plus)


Experience In One Or More Of The Following Areas


Program Analysis

  • Computer networking protocol design and/or analysis
  • Compute and network emulation, containerization, and virtualization
  • Reverse Engineering
  • Real-Time Operating Systems (RTOS)
  • Field Programmable Gate Array (FPGA)

Experience with one or more of the following classes of tools and frameworks:

  • Binary Analysis Tools, such as GHIDRA, Hex-Rays IDA, Binary Ninja, Angr,
  • Debugging and Sandboxing tools, such as Cuckoo sandbox, OllyDBG, WinDbg
  • CNO toolsets, including Metasploit, Cobalt Strike
  • Network emulation frameworks including CORE, EMANE, MiniNet
  • Container and Orchestration solutions, including: Docker, Docker Swarm, Kubernetes, Terraform
  • Cloud services experience (AWS, Azure, OpenStack)
  • Experience with DevOps and Agile development methodologies
  • Experience in the U.S. DoD/IC research community
  • CNO operational experience
  • Active security clearance a plus
  • Experience/interest in business development including idea generation, whitepapers, and proposals

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sector—from investigative services and IT strategy to systems work and next-generation engineering.


Our promise is simple: never stop solving our nation’s most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.


Perspecta is an AA/EEO Employer – All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

As a government contractor, Perspecta abides by the following provision

Cyber Security Training



Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native


Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c).

LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version