[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA27172098@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: OT: Opening for Security Researcher, Maryland USA
You should post this to the security job mailing list at SecurityFocus.
> -----Original Message-----
> From: full-disclosure-admin@...ts.netsys.com
> [mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of
> David Stein
> Sent: Thursday, October 21, 2004 3:16 PM
> To: full-disclosure@...sys.com
> Subject: [Full-Disclosure] OT: Opening for Security
> Researcher, Maryland USA
>
> OK, this is off-topic, but it can't be as bad as Bush vs.
> Kerry arguments. Hopefully this at least will make some
> lucky subscriber to Full Disclosure some money!
>
> --------------------------------------------------------------
> ----------------------------------
>
> JOB DESCRIPTION
> ---------------------------------------------------
> Position: Security Researcher
> Type: Permanent F/T
> Closing Date: 11/20/2004
>
> I have a job opening for a computer scientist with an strong
> interest in computer security. The ideal applicant would be
> an intelligent person with a solid computing background (both
> theoretical and
> practical) who would like to participate in and contribute to
> computer security research.
>
> The job is in our Internal Research and Development
> organization and involves performing vulnerability
> assessments of applications and networks using both static
> (code review, configuration review) and dynamic (black-box)
> analysis. It is expected that the researcher will develop
> proof-of-concept demonstrations of any vulnerabilities
> discovered. It is also expected that the researcher will be
> able to set-up and configure applications and networks for analysis.
>
> JOB REQUIREMENTS
> ---------------------------------------------------
> Demonstrated expertise in software reverse engineering using
> common tools such as IDA Pro and OllyDbg. Ability to perform
> protocol analysis using common tools such as Ethereal and
> tcpdump. Ability to write software in Python and/or Perl.
> Sound understanding of common techniques for detection and
> exploitation of common software vulnerabilities such as
> buffer overflows, format strings and SQL injection.
> Familiarity with X86 or other assembly language.
> Experience with setup and configuration of Unix and/or Linux systems.
> Experience with hardware reverse engineering desirable.
> Experience with telecommunications systems helpful.
> Typically requires Masters or Bachelors degree in Computer
> Science or a related discipline with two years of experience
> or equivalent acquired knowledge through practical technical
> experience. U.S. Citizenship required.
> Applicants selected will be subject to a background
> investigation and must meet eligibility requirements for
> access to classified information.
>
> CONTACT
> ---------------------------------------------------
> If interested, go to http://www.gd-ais.com, select 'Careers',
> then 'GDAIS Careers', search openings for Req. Number 7371,
> and apply online. Or you can send your resume to me (ASCII
> only please).
> --
> David Stein
> david.r.stein@...il.com
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists