Job Description
FUTURE NEED - not a current vacancy. If you apply, this could be a multi-year process.
Location: Tampa, FL
Description:
The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must be familiar with the latest techniques in vulnerability research and demonstrate their ability to follow best practices. Individual must be extremely detail oriented when documenting their research.
If your application is approved, we will test you on both software development and reverse engineering skills as part of our hiring process. At this time, the majority of our open positions require an aptitude in both domains.
Requirements:
Desired Skills:
Remote work is not an option. We do offer relocation assistance. Please see our careers page or inquire with your recruiter about the terms and conditions.
Salary and other Compensation:
The hourly wage range is: $43.27 - $96.15
The salary range for this position is subject not only to the hire's skills, education, expertise, and years of experience, but also to features of the final position offered to the hire: including, but not limited to the location of the position, clearance required for the position, and the contract associated with the position. See our Perks & Benefits page for a general description of benefits and other potential compensation benefits: -benefits/
About Us:
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
* How did it infect the victim's computer * What kind of information it is seeking to steal * How is it communicating with the author (actor) * Who that actor might be.
Vaccination Notice:
Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.
Important Security Clearance Information:
Be aware that you are applying for a job that requires a U.S. Government Security Clearance. If you do not already hold a US government security clearance, we do have the ability to sponsor, however be advised that this can be a multi-year process.
The U.S. government will not issue security clearances to recent users of illegal drugs. On your application to us, you must acknowledge that you have not engaged in any illegal drug use within the past twelve months (illegal drug use includes, but is not limited to, the use of illegal substances, the misuse of prescriptions, the misuse of over-the-counter substances, and the use of medical or recreational marijuana that may be deemed legal at the state level but is still considered illegal by the federal government). NOTE: CIPHER TECH WILL NOT DISCRIMINATE AGAINST ANY QUALIFIED APPLICANTS WITH A DISABILITY, INCLUDING ILLEGAL DRUG USERS WHO HAVE RECENTLY SOUGHT PROFESSIONAL TREATMENT FOR A DRUG PROBLEM.
Commitment to Diversity & Inclusion:
Cipher Tech is an Equal Opportunity and Affirmative Action Employer. We value diversity and inclusion, not only for the sake of compliance, but also because diversity of thought drives progress and improves performance. All hiring and employment decisions are made on the basis of business requirements, performance, and merit-with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
Job Posted by ApplicantPro...About the role: We are seeking a Head of Strategic Finance, Go-to-Market at Anthropic. As we continue to commercialize our AI systems... ...degree in Finance, Economics, or Business Administration and an MBA or relevant advanced degree preferred Prior experience in AI/...
...which means you come with: ~4+ years of React Native Engineering experience ~ Well-... ...an impact by: As a Senior React Native developer, you will design and implement software solutions... ...specific feature development and mentor junior software engineers What We Offer ~...
...Maintain positive atmosphere, spirit and morale within the department Support and execute division concepts and programs Ensure bakery systems and processes are utilized consistently and correctly Ensure recipes and procedures are followed using approved...
...companys success. As a Solution Architect within PNC's Solution Architecture & Strategy organization, you will be based in one of our... ...seasoned Intelligence Engineering Solution Architect to lead the design of robust intelligence engineering and automation infrastructure...
...company is currently seeking a Bilingual (English/Spanish) Bookkeeper/Payroll Processor to join our team! Our company is located in... ...daily and keeping main traffic areas clean frequently. Every weekend we have a deep cleaning done in our offices as well. Application...