Icon hamburger
Briefcase

Create Job Alert.

Enter your email below to save this search and receive job recommendations for similar positions.
Thank you. We'll send jobs matching these to
No Thanks
US
What job do you want?

Create Job Alert.

Get similar jobs sent to your email

Apply to this job.
Think you're the perfect candidate?
Apply on company site

You’re being taken to an external site to apply.

Create an account to get recommended jobs that match your resume and apply to multiple jobs in seconds!
On the next page, you'll build a resume in 3 steps thanks to our AI technology
8-15 characters
Contains Number
Contains Lowercase
Contains Uppercase
Contains Special Character
Thumsup

You’re being taken to an external site to apply.

Enter your email below to receive job recommendations for similar positions.

You can apply faster when you're registered.

Research Scientist-Cyber Security at Perspecta

Research Scientist-Cyber Security

Perspecta Basking Ridge, NJ Full-Time
Apply on company site

Create Job Alert.

Get similar jobs sent to your email

Business Group Highlights

Perspecta Labs

Perspecta Labs generates transformative applied research to fuel solutions for our customers’ unique challenges. We are a self-sustaining research center within Perspecta that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.


Responsibilities

Perspecta Labs delivers world class cyber research and engineering to government agencies, telecom carriers, utilities, and commercial enterprises. Drawing on its Bell Labs heritage, Perspecta Labs excels at creating innovative technologies and services to solve the most difficult and complex problems, shaping the state of the art in government and commercial cyber security. We are looking for candidates with a strong background in software research and development for full-time positions in our Cyber Security research group.
Candidates will work with teams to research, conceive, and develop prototypes, and should be adept at identifying successful approaches to complex problems. Research areas of interest include, but are not limited to:


• Full-spectrum cyber operations, including CND, CNE, CNA, and CNO.
• Program analysis, including understanding, vulnerability identification, and remediation
• Malware analysis and reverse engineering
• Software-defined networking for cyber defense and deception
• Cryptographic techniques for assured computation
• Symbolic logic and theorem proving for automating network configuration
• Application of formal methods for secure and resilient systems
• Application of mathematic, statistics, and linguistics to large data sets to uncover patterns, extract information and gain understanding
• Artificial intelligence (reasoning, probabilistic inference, machine learning


Qualifications

Requires 10 to 12 years with BS/BA or 8 to 10 years with MS/MA or 5 to 7 years with PhD.

  • Master’s degree or higher in Computer Science/Engineering, Electrical Engineering, or related field with 5+ years relevant experience OR BS/BA with 8+ years relevant experience.
  • Ability and desire to quickly acquire knowledge of new subject matter areas
  • Expertise in one or more of the following languages
    • C, C++, Java, Python
  • Working knowledge of Linux, Mac, Windows, and mobile operating systems, platforms and internals
  • S. Citizens strongly preferred - permanent residents may be considered if highly qualified

Preferred:

  • Expertise in one or more of the following areas:
    • Program Analysis
    • Compute and network emulation, containerization, and virtualization
    • Reverse Engineering
    • Real-Time Operating Systems (RTOS)
    • Field Programmable Gate Array (FPGA)
  • Expertise with one or more of the following classes of tools and frameworks:
    • Binary Analysis Tools including
      • HexRays IDA, Binary Ninja, Angr,
    • Debugging and Sandboxing Tools including
      • OllyDBG, WinDbg, Cuckoo Sandbox
    • CNO toolsets including
      • Metasploit, CobaltStrike
    • Network emulation frameworks including
      • CORE, MiniNet
    • Container and Orchestration solutions including
      • Docker, Docker Swarm, Kubernetes
  • Experience/interest in business development including idea generation, whitepapers, and proposals


About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds.  Our company was formed to bring a broad array of capabilities to all parts of the public sector—from investigative services and IT strategy to systems work and next-generation engineering.
 
Our promise is simple: never stop solving our nation’s most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.
 
Perspecta is an [ Link removed ] - Click here to apply to Research Scientist-Cyber Security Employer - Minorities/Women/Veterans/Disabled and other protected categories.

As a government contractor, Perspecta abides by the following provision

Pay Transparency Nondiscrimination Provision

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.  However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c).

 

Recommended skills

Computer Network Operations
C++ (Programming Language)
Java (Programming Language)
C (Programming Language)
Platforming
Operating Systems
Apply to this job.
Think you're the perfect candidate?
Apply on company site

Help us improve CareerBuilder by providing feedback about this job: Report this job

Report this Job

Once a job has been reported, we will investigate it further. If you require a response, submit your question or concern to our Trust and Site Security Team

Job ID: 3wqlz1e

CAREERBUILDER TIP

For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.

By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.