Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

RE: OT: Opening for Security Researcher, Maryland USA
From: "Todd Towles" <toddtowles () brookshires com>
Date: Thu, 21 Oct 2004 16:58:21 -0500

You should post this to the security job mailing list at SecurityFocus. 

-----Original Message-----
From: full-disclosure-admin () lists netsys com 
[mailto:full-disclosure-admin () lists netsys com] On Behalf Of 
David Stein
Sent: Thursday, October 21, 2004 3:16 PM
To: full-disclosure () netsys com
Subject: [Full-disclosure] OT: Opening for Security 
Researcher, Maryland USA

OK, this is off-topic, but it can't be as bad as Bush vs. 
Kerry arguments.  Hopefully this at least will make some 
lucky subscriber to Full Disclosure some money!

--------------------------------------------------------------
----------------------------------

JOB DESCRIPTION
---------------------------------------------------
Position:       Security Researcher
Type:           Permanent F/T
Closing Date:   11/20/2004

I have a job opening for a computer scientist with an strong 
interest in computer security. The ideal applicant would be 
an intelligent person with a solid computing background (both 
theoretical and
practical) who would like to participate in and contribute to 
computer security research.

The job is in our Internal Research and Development 
organization and involves performing vulnerability 
assessments of applications and networks using both static 
(code review, configuration review) and dynamic (black-box) 
analysis.  It is expected that the researcher will develop 
proof-of-concept demonstrations of any vulnerabilities 
discovered.  It is also expected that the researcher will be 
able to set-up and configure applications and networks for analysis.

JOB REQUIREMENTS
---------------------------------------------------
Demonstrated expertise in software reverse engineering using 
common tools such as IDA Pro and OllyDbg.  Ability to perform 
protocol analysis using common tools such as Ethereal and 
tcpdump.  Ability to write software in Python and/or Perl.  
Sound understanding of common techniques for detection and 
exploitation of common software vulnerabilities such as 
buffer overflows, format strings and SQL injection.  
Familiarity with X86 or other assembly language. 
Experience with setup and configuration of Unix and/or Linux systems. 
Experience with hardware reverse engineering desirable.  
Experience with telecommunications systems helpful.  
Typically requires Masters or Bachelors degree in Computer 
Science or a related discipline with two years of experience 
or equivalent acquired knowledge through practical technical 
experience.  U.S. Citizenship required. 
Applicants selected will be subject to a background 
investigation and must meet eligibility requirements for 
access to classified information.

CONTACT
---------------------------------------------------
If interested, go to http://www.gd-ais.com, select 'Careers', 
then 'GDAIS Careers', search openings for Req. Number 7371, 
and apply online.  Or you can send your resume to me (ASCII 
only please).
--
David Stein
david.r.stein () gmail com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]