box testing, cloud computing, disassembly, global telecommunications system architectures and protocols, protocol analysis...
architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis... and recommendations to optimize customer workflows. Requires a strong background in networking principles and analysis. Experience...
packet capture software, TCP/IP protocol stack, routing/switching protocols, stateful firewalls, and L3/L4 access controls... of our customers. Our pride and dedication shows in everything we do-from intelligence analysis, cyber operations and IT expertise...
of telecommunications networks, next-generation networking concepts, and protocol analysis to aid in vulnerability and security analysis...5G Vulnerability Research Analyst Key Role: Develop your penetration testing and vulnerability analysis skillset...
architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis... and recommendations to optimize customer workflows. Requires a strong background in networking principles and analysis. Experience...
cost/benefit analysis and provides specific detailed information for hardware and software selection, implementation... communications equipment Proven experience in VMware environments Proven experience in virtual and physical Internet Protocol...
Teleconference Communications (CVTC), desktop Voice Over Internet Protocol (DVOIP), Voicemail, and Enterprise Content Delivery. The... analysis and problem solving Attention to detail and accuracy Customer Service oriented Preferred Qualifications: ITIL...
collection and parsing; network & protocol analysis; tools development/analysis; vulnerability/intrusion detection; evaluation... Threat Assessment, Protocol Analysis, Vulnerability Analysis, Signals Analysis. Degree Requirements: A B.S./B...
, demodulators, protocol processors). Reviews and tests software components for adherence to the design requirements and documents...) in place of new development, and requirements analysis and synthesis from system level to individual software components...
, and automated unit testing in Python to develop capabilities, research existing functionality, perform protocol analysis, and learn.... Perform embedded development, vulnerability analysis, reverse engineering, software development, and operational support...
security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis..., network analysis, software analysis, debugging, and/or using network security intrusion or computer network diagnostic...
security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis..., network analysis, software analysis, debugging, and/or using network security intrusion or computer network diagnostic...
, risk analysis, risk management, certification and awareness activities for various system and networking operations... of our customers. Our pride and dedication shows in everything we do-from intelligence analysis, cyber operations and IT expertise...
architecture; Propose and analyze potential solutions. Conducting audits, risk assessment, threat analysis, contingency planning...), Internet Protocol Version 4 (IPV4), Internet Protocol Version 6 (IPV6/6VPE), Ethernet VPN (EVPN), Quality of Service (QoS...
architecture; Propose and analyze potential solutions. Conducting audits, risk assessment, threat analysis, contingency planning...), Internet Protocol Version 4 (IPV4), Internet Protocol Version 6 (IPV6/6VPE), Ethernet VPN (EVPN), Quality of Service (QoS...
, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using network... systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis...
Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) Network Protocol Analysis (Wireshark, Tcpdump) Emulator... will include cyber tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated...
Provisioning/Orchestration Systems (Ansible, Kubernetes, Docker) Network Protocol Analysis (Wireshark, Tcpdump) Emulator... will include cyber tool prototyping and technical analysis of offensive or defensive cyber tools and systems, automated...
analysis Protocol analysis Network analysis Software analysis Debugging and/or using network security intrusion or computer... assurance, and computer security) Programming Systems architecture Vulnerability analysis Reverse engineering Malware...
architecture. Conducts cost/benefit analysis and provides specific detailed information for hardware and software selection... experience in VMware environments Proven experience in virtual and physical Internet Protocol and Fiber Channel networks...