[Full-Disclosure] OT: Opening for Security Researcher, Maryland USA

From: David Stein (david.r.stein_at_gmail.com)
Date: 10/21/04

  • Next message: Kyle Maxwell: "Re: [Full-Disclosure] Possibly a stupid question RPC over HTTP"
    To: full-disclosure@netsys.com
    Date: Thu, 21 Oct 2004 16:15:45 -0400
    
    

    OK, this is off-topic, but it can't be as bad as Bush vs. Kerry
    arguments. Hopefully this at least will make some lucky subscriber to
    Full Disclosure some money!

    ------------------------------------------------------------------------------------------------

    JOB DESCRIPTION
    ---------------------------------------------------
    Position: Security Researcher
    Type: Permanent F/T
    Closing Date: 11/20/2004

    I have a job opening for a computer scientist with an strong interest
    in computer security. The ideal applicant would be an intelligent
    person with a solid computing background (both theoretical and
    practical) who would like to participate in and contribute to computer
    security research.

    The job is in our Internal Research and Development organization and
    involves performing vulnerability assessments of applications and
    networks using both static (code review, configuration review) and
    dynamic (black-box) analysis. It is expected that the researcher will
    develop proof-of-concept demonstrations of any vulnerabilities
    discovered. It is also expected that the researcher will be able to
    set-up and configure applications and networks for analysis.

    JOB REQUIREMENTS
    ---------------------------------------------------
    Demonstrated expertise in software reverse engineering using common
    tools such as IDA Pro and OllyDbg. Ability to perform protocol
    analysis using common tools such as Ethereal and tcpdump. Ability to
    write software in Python and/or Perl. Sound understanding of common
    techniques for detection and exploitation of common software
    vulnerabilities such as buffer overflows, format strings and SQL
    injection. Familiarity with X86 or other assembly language.
    Experience with setup and configuration of Unix and/or Linux systems.
    Experience with hardware reverse engineering desirable. Experience
    with telecommunications systems helpful. Typically requires Masters
    or Bachelors degree in Computer Science or a related discipline with
    two years of experience or equivalent acquired knowledge through
    practical technical experience. U.S. Citizenship required.
    Applicants selected will be subject to a background investigation and
    must meet eligibility requirements for access to classified
    information.

    CONTACT
    ---------------------------------------------------
    If interested, go to http://www.gd-ais.com, select 'Careers', then
    'GDAIS Careers', search openings for Req. Number 7371, and apply
    online. Or you can send your resume to me (ASCII only please).

    --
    David Stein
    david.r.stein@gmail.com
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    

  • Next message: Kyle Maxwell: "Re: [Full-Disclosure] Possibly a stupid question RPC over HTTP"

    Relevant Pages

    • [Full-Disclosure] OT: Opening for Security Researcher, Maryland USA
      ... Position: Security Researcher ... set-up and configure applications and networks for analysis. ... Demonstrated expertise in software reverse engineering using common ... vulnerabilities such as buffer overflows, ...
      (Full-Disclosure)
    • Re: How to create a shareable image on IA64 using Pascal
      ... All the examples I have seen in the documentation refer to shared memory ... {potential common storage module} ... If one is maintaining applications data, it is far, far easier ... DECnet logical links are also preferable to mailboxes, ...
      (comp.os.vms)
    • Re: Honestly Curious
      ... Given that the vast majority of Windows users today don't even know what "$PATH" means, ... Given that many Windows applications bury pathnames inside the registry, ... The potential usage is not very common, and it seems like it would just cause problems. ... DOS applications kept data files in the same directory that the app was installed in. ...
      (comp.sys.mac.advocacy)
    • Re: Honestly Curious
      ... Given that the vast majority of Windows users today don't even ... common, and it seems like it would just cause problems. ... to break scripts and applications that call on other applications. ... Then, when you wanted to move the app somewhere else, it was ...
      (comp.sys.mac.advocacy)
    • Re: Pros/Cons for Sharepoint as an Application Portal
      ... how does the fact that your web applications are "stand-alone" prevent you from using a common framework to develop them? ... You could still develop a common set of components that all of the applications can use without them being tied to a central portal. ... SharePoint provides a robust prototyping environment that gives you a tremendous head-start on capturing the essential elements of your solution. ...
      (microsoft.public.sharepoint.portalserver.development)