Software Developer - Penetration Tester

Aberdeen Proving Ground, MD
Oct 26, 2021
Oct 28, 2021
Full Time
Job Description: Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers. Responsibilities Create applications from beginning to deployment. Use expertise for application management to include research, testing / debugging, permissions, quality, and deployment. Research new languages, frameworks, and technologies. Experience with defensive cybersecurity application development along with other SW/application development. Develop defensive cybersecurity applications and open-source application for Government data. Research, develop, and implement containerized applications. Develop multiple auditing tools for Linux. Assist in development of multiple file and system monitoring tools for specific use cases. Ability to conduct research of data auditing solutions. Qualifications Required:5 to 8 years with BS/BA or 3 to 5 years with MS/MA or 0 to 2 years with PhD.Active Secret security clearance with ability to obtain a TS/SCI security clearance.Mobile Application Management.OS Deployment & Management.Web Development (Server, Client).SQL and Non-SQL Databases.Microsoft Office. Desired:Experience with Unmanned Aerial Systems/Remote Piloted Vehicles.Experience with electronics, computer architecture (on a processor level (assembly language) memory allocation/addressing)), IT security, protocol analysis, System on a Chip (SoC), Artificial Intelligence and Neural Networks.Experience with tools/skill sets to include: Kali Linux, Ettercap, Man-in-the-Middle attacks, IDA/IDA Pro, Ollydbg, Ghidra, Protocol Analyzers (Beagle), Aircrack-NG and Recon-NG, Software Defined Radios (RTL-SDR, HackRF or the like), Wifite, Metasploit Framework, Harvester, Google. #LI-

Similar jobs