Software Developer - Penetration Tester
- Employer
- Peraton Labs
- Location
- Aberdeen Proving Ground, MD
- Closing date
- Oct 26, 2021
View more
- Industry
- Technology and Software
- Function
- IT
- Hours
- Full Time
- Career Level
- Experienced (Non-Manager)
You need to sign in or create an account to save a job.
Peraton OverviewPeraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.ResponsibilitiesCreate applications from beginning to deployment. Use expertise for application management to include research, testing / debugging, permissions, quality, and deployment. Research new languages, frameworks, and technologies. Experience with defensive cybersecurity application development along with other SW/application development. Develop defensive cybersecurity applications and open-source application for Government data.Research, develop, and implement containerized applications. Develop multiple auditing tools for Linux. Assist in development of multiple file and system monitoring tools for specific use cases. Ability to conduct research of data auditing solutions.QualificationsRequired:5 to 8 years with BS/BA or 3 to 5 years with MS/MA or 0 to 2 years with PhD.Active Secret security clearance with ability to obtain a TS/SCI security clearance.Mobile Application Management.OS Deployment & Management.Web Development (Server, Client).SQL and Non-SQL Databases.Microsoft Office.Desired:Experience with Unmanned Aerial Systems/Remote Piloted Vehicles.Experience with electronics, computer architecture (on a processor level (assembly language) memory allocation/addressing)), IT security, protocol analysis, System on a Chip (SoC), Artificial Intelligence and Neural Networks.Experience with tools/skill sets to include: Kali Linux, Ettercap, Man-in-the-Middle attacks, IDA/IDA Pro, Ollydbg, Ghidra, Protocol Analyzers (Beagle), Aircrack-NG and Recon-NG, Software Defined Radios (RTL-SDR, HackRF or the like), Wifite, Metasploit Framework, Harvester, Google.#LI-
You need to sign in or create an account to save a job.
Get job alerts
Create a job alert and receive personalized job recommendations straight to your inbox.
Create alert