Android Developer |
Arlington, Virginia |
View Details |
TSE - Mobile Systems |
<p><span style="font-weight: 400;">Two Six Technologies is seeking an </span><strong>Android Developer</strong><span style="font-weight: 400;"> to join projects on our </span><strong>Mobile Systems </strong><span style="font-weight: 400;">teams. If you are passionate about Android application development and enjoy solving hard problems at the leading edge of technology, we are looking for you!</span></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop Android applications for interesting scenarios</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Build deployable and scalable systems that solve real-world problems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Breadth beyond Android is desired but not required - it will allow for additional interesting project opportunities</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">This work requires onsite presence in the Arlington location for 80% of work</span></li>
</ul>
<p><strong>Minimum Qualifications</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">5+ years of experience with Android application development </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Expertise in Java (or Kotlin), C/C++, and Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secret clearance (TS/SCI preferred)</span></li>
</ul>
<p><strong>Nice to Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Degree in CS, CPE, EE, Math, Statistics or a related field</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience writing programs in a variety of programming languages, such as C/C++, C#, or JavaScript</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Apple iOS software development experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong understanding of cyber security principles and secure development practices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in a challenging R&D environment</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Publications or patents of prior intellectual contributions</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active Secret Clearance</span></li>
</ul>
<p><strong>Clearance/Citizenship:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI preferred </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">US Citizenship is required</span></li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-Hybrid</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Associate Research Director - Artificial Intelligence & Machine Learning |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p><span style="font-weight: 400;">Two Six Technologies is seeking an </span><strong>Associate</strong><span style="font-weight: 400;"> </span><strong>Research Director - Artificial Intelligence & Machine Learning</strong></p>
<p><span style="font-weight: 400;">Researching and applying cutting-edge techniques for extracting Information from an ever-growing data environment is increasingly fundamental for new and emerging National Security capabilities being developed, tested, and deployed by the Department of Defense, the Intelligence Community, and other National Security organizations. Two Six Technologies is seeking an AI/ML/Data Science leader to grow our sponsored research portfolio with DARPA and other research organizations, cultivate our talented Data Scientists and AI/ML research team, and work with technical leaders to set the strategic direction for our AI/ML/Data Science portfolio to increase our impact for National Security. </span></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Working with technical leaders to set strategic direction for AI/ML/Data Science R&D project portfolio</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Cultivating relationships with DARPA Program Managers and other customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identifying new R&D opportunities and overseeing capture</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Cultivating our AI/ML/Data Science talent team, identifying/hiring new team members and line management of key contributors</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Technical marketing of Two Six Technologies’ AI/ML/Data Science services and capabilities to new and existing Government clients</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A four-year degree in Mathematics, Computer Science, or related technical domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ten or more years of professional experience in R&D Leadership</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Past performance as a Principal Investigator on fast-paced, innovation-driven, advanced technology R&D projects for Government clients</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proven track record of capturing Government R&D contracts/programs</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">DoD and/or IC domain experience and knowledge</span></li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">An advanced degree (Master’s or PhD) in Mathematics, Computer Science, or related technical domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience as a Principal Investigator for a DARPA program</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience serving as a line manager for a team of scientists and engineers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading and cultivating cohesion for geographically distributed teams</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Academic and/or industry publications in relevant fields</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with agile software development practices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing AI/ML solutions and products</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with the full research lifecycle (proposal to publication/transition) or the software development lifecycle (from concept to prototype and production)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proven experience leading rapidly growing teams</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active security clearance</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Associate Research Director - Cybersecurity |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p style="font-weight: 400;">Two Six Technologies is seeking an <strong>Associate Research Director-Cyber Security.</strong></p>
<p style="font-weight: 400;"><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;">Technical and programmatic oversight of Cyber Security R&D projects</li>
<li style="font-weight: 400;">Line management of team members and identifying/hiring new team members</li>
<li style="font-weight: 400;">Technical marketing of Two Six Technologies’ Cyber Security services and capabilities to new and existing Government R&D clients</li>
<li style="font-weight: 400;">Identifying and leading the capture of new R&D programs</li>
<li style="font-weight: 400;">Participating in and leading proposal generation and delivery</li>
</ul>
<p style="font-weight: 400;"><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;">A four-year degree in Computer Science, Computer/Electrical Engineering, or Mathematics with a concentration in cyber security, software engineering, or related technical domain</li>
<li style="font-weight: 400;">Ten or more years of professional experience in a similar role</li>
<li style="font-weight: 400;">Cybersecurity domain experience and knowledge</li>
<li style="font-weight: 400;">A strong foundational knowledge of offensive and defensive cyber security fundamentals, with emphasis on at least one of the following: vulnerability research, reverse engineering, program analysis, cyber capability development, or cyber systems engineering</li>
<li style="font-weight: 400;">Past performance as a Principal Investigator on fast-paced, innovation-driven, advanced technology R&D projects for Government clients</li>
<li style="font-weight: 400;">Experience serving as a line manager for a team of scientists and engineers</li>
<li style="font-weight: 400;">A proven track record of capturing Government R&D contracts/programs</li>
</ul>
<p style="font-weight: 400;"><strong>Nice to have:</strong></p>
<ul>
<li style="font-weight: 400;">An advanced degree (Master’s or PhD) in Computer Science, Computer/Electrical Engineering, or related technical domain</li>
<li style="font-weight: 400;">Experience with agile software development practices</li>
<li style="font-weight: 400;">Experience developing security solutions and products</li>
<li style="font-weight: 400;">Experience leading teams in a rapid prototype environment demonstrating scalable architectures</li>
<li style="font-weight: 400;">Proven experience leading a rapidly growing team</li>
<li style="font-weight: 400;">An active security clearance</li>
<li style="font-weight: 400;">Experience as a Principal Investigator for a DARPA program</li>
</ul>
<p style="font-weight: 400;"><strong>Clearance/Citizenship:</strong></p>
<ul>
<li style="font-weight: 400;">Ability to obtain and maintain a DoD security clearance</li>
<li style="font-weight: 400;">US Citizenship</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
AWS Cloud Engineer |
Chantilly, Virginia |
View Details |
TCI - O-Cyber |
<p>Trusted Concepts, a division of Two Six Technologies is seeking an AWS Cloud Engineer who will build, deploy, manage, and administer cloud infrastructure designed to deliver complex software products in a production environment. The ideal candidate is a hands-on Cloud engineering professional with significant experience in developing and deploying repeatable processes, tools, and cloud infrastructure that enable the delivery of software in an on-demand cadence. They must have strong, firsthand technical expertise in a variety of configuration automation, deployment, and continuous integration technologies and the proven ability to fashion robust solutions that can keep pace with software development. They must be at ease working in an agile environment with a cross-functional team. This person should embody a passion for continuous improvement and innovation.</p>
<p><strong>Clearance Required: Active TS/SCI with Polygraph</strong></p>
<p><strong><u>Key Responsibilities:</u></strong></p>
<ul>
<li>Work with a team to build, administer, and secure cloud environments in both the customer and company lab environment in a repeatable and reliable manner</li>
<li>Design, develop, test, debug, and deploy new cloud tooling and infrastructure that extend or replace existing capabilities</li>
<li>Collaborate with a cross-functional team of software engineers, data scientists, analysts, project managers and other engineering groups.</li>
<li>Provide ongoing maintenance, support, and enhancements in production systems and platforms.</li>
<li>Troubleshoots complex problems and provides customer support for software systems and application issues.</li>
<li>Provide recommendations for continuous improvement.</li>
<li>Write and update technical documentation such as system documentation, training materials, processes and procedures.</li>
<li>Work alongside other engineers on the team to sustain and advance our organization’s capabilities.</li>
</ul>
<p><strong><u>Required Qualifications:</u></strong></p>
<ul>
<li>Demonstrated hands-on experience configuring cloud VPCs, subnets, route tables, and gateways</li>
<li>Demonstrated experience scaling applications written in Java, Python or other programming languages with Cloud Native technologies.</li>
<li>Experience deploying code in AWS utilizing solutions such as Terraform, Ansible, and CloudFormation</li>
<li>Demonstrated experience using the AWS CDK</li>
<li>Demonstrated experience with AWS Route 53</li>
<li>Experience working with cloud native technologies, Infrastructure as Code (IAC), and/or Serverless cloud technologies</li>
<li>Experience securing cloud environments per NIST 800-53 security controls.</li>
</ul>
<p> </p>
<p><strong><u>Bonus Points:</u></strong></p>
<ul>
<li>
<ul>
<li>Demonstrated experience with cloud technologies used with ETL and big data pipelines such as Glue, EMR, HIVE, Spark, S3, SQS, and SNS</li>
<li>Demonstrated experience with Kubernetes or EKS</li>
<li>Demonstrated experience with Presto</li>
</ul>
</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
CNO Lead |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p><span style="font-weight: 400;">Job Responsibilities & Duties:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Serve as the primary CNO capability developer on a small, highly motivated team</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Apply knowledge of Linux/Unix based systems to help solve complex mission challenges</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide mentoring to more junior developers on CNO capability development</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Assist with reverse engineering and debugging of mission applications</span></li>
</ul>
<p><span style="font-weight: 400;">Minimum Qualifications:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years Unix kernel experience internals including mandatory/discretionary access controls, runtime linker/loader, object file formats, file systems, and process/thread APIs & data structures.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience as a developer on an Agile development style team. Comfortable with performing testing and releases in an environment using CI/CD methodologies.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">At least 2 years of experience in performing CNO tool and technique development.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">At least 2 years of experience with network sockets programming and expert packet-level understanding of IP, TCP, and other application level protocols.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated experience in developing applications in C/C++, and Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Knowledge of memory protection modules (ASLR/DEP, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in implementing secure communication techniques to transmit data across a network</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience tracing code execution in a debugger (WinDbg/gdb/IDAPro)</span></li>
</ul>
<p><span style="font-weight: 400;">Nice to haves:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading a team of junior/mid CNO developers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with identifying and analyzing vulnerabilities in complex applications</span></li>
</ul>
<p><span style="font-weight: 400;">Degree: Not required with demonstrated experience</span></p>
<p><span style="font-weight: 400;">Clearance: TS</span></p>
<p><span style="font-weight: 400;">On-site requirements: Expected on-site support 2-3 days a week for 3-4 hours each day. Remote/hybrid work model, per employee’s discretion, at other times</span></p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Cyber Threat Analyst |
Chantilly, Virginia |
View Details |
TCI - O-Cyber |
<p>Trusted Concepts, a division of Two Six Technologies is currently seeking a Cyber Threat Analyst. The ideal candidate will identify current and emerging threats and analyze adversarial tactics, techniques, and procedures (TTPs) in order to produce insights that mitigate risks to customer operations. This individual will work closely with Data Scientists to identify and take advantage of a broad range of open source, sensitive, commercial, and intelligence data to generate actionable reporting. In addition to protecting critical missions, analytic products may be used to guide engineering activities to develop the next generation of cyber tools that can operate effectively in the constantly evolving cyber battlefield. You will apply analytical rigor to all work while remaining open to non-traditional information or conclusions.</p>
<p> </p>
<p><strong>Clearance Required : Active TS/SCI with Polygraph</strong></p>
<p> </p>
<p><strong><u>Key Responsibilities:</u></strong></p>
<ul>
<li>Generate cogent reporting to be used by customer computer network experts to plan mission support.</li>
<li>Analyze all-source data to understand what threat hunters are doing and how other Advanced Persistent Threat (APT) actors are being detected.</li>
<li>Build country or AOR level reports to understand the cyber threat landscape specific to that area or target of interest.</li>
<li>Use predictive analysis to help guide long running engineering activities to evolve the customer’s cyber toolset.</li>
<li>Leverage insights from Strategic Industrial Partners (SIP) and guide the SIP program to grow the cadre of partners to fill critical intelligence gaps.</li>
<li>Work closely with technical and SETA personnel to identify additional data owned by internal customer elements and other IC partners that may improve the analytical products.</li>
</ul>
<p> </p>
<p><strong><u>Required Qualifications:</u></strong></p>
<ul>
<li>Demonstrated experience with researching and evaluating modern cyber threats.</li>
<li>Demonstrated knowledge of incident response, containment, and mitigation</li>
<li>Knowledge of common cyber-attack methods and known cyber threat actors.</li>
<li>Strong communication skills with a brisk writing style, able to build a compelling and effective narrative.</li>
<li>Ability to evaluate worldwide security events to assess system impact and/or risk (e.g., zero day exploits, hardware failures, and/or cyber-attacks)</li>
<li>Ability to working independently with minimal supervision.</li>
<li>Ability to sift through large amounts of unstructured data for key data points (i.e. Metadata and artifacts)</li>
<li>Identify and document information that can fill critical gaps.</li>
<li>Prepare a range of tailored products that embody and explain findings.</li>
<li>Experience with technical collection abilities.</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Database Administrator |
McLean, Virginia |
View Details |
TCI - CT |
<div class="col-xs-12 no-horiz-padding">
<div class="col-xs-12 no-horiz-padding">
<p><span style="color: #7e8c8d;">Job ID: 201</span></p>
<p>We are currently seeking an experienced Database Administrator who has a ‘hands-on’ approach to database engineering and administration of systems for complex and high volume data processing, using a variety ingest methods and data management techniques. Management techniques would include a variety of data types, database functionality, compliance standards and availability requirements. Mandatory current/hands-on experience with Exadata from Oracle.</p>
</div>
<div class="col-xs-12 no-horiz-padding">
<h3>Requirements</h3>
<ul>
<li>Demonstrated experience in directly performing all aspects in the lifecycle of database engineering and administration, including design to meet customer needs, install, deploy, data migration, maintenance, backup/recovery, patch and upgrade.</li>
<li>Experience with database security analysis and vulnerability remediation process.</li>
<li>Experience with Oracle engineered systems such as Exadata, Big Data, MiniCluster or SuperCluster.</li>
<li>Demonstrated experience in managing database systems in conjunction with datastore systems in high availability, system redundancy environments</li>
<li>Current and practical expertise using Oracle PL/SQL, SQL, SQL*Plus and SQL Developer</li>
</ul>
<p> Desired Knowledge/ Skills:</p>
<ul>
<li>Demonstrated extensive experience in database architecture, design, and processing models as well as extensive experience with data architecture, modeling, and management in a broad spectrum of data repository environments, such as data warehouse, on-line transaction processing and hybrid.</li>
<li>Experience with administration and configuration of database solutions for document and geospatial data/capabilities.</li>
<li>Prior experience supporting database systems for data collections unique to the Sponsor or the IC.</li>
<li>Experience delivering or integrating solutions using RDBMS technologies and NoSQL technologies.</li>
<li>Experience transitioning solutions from RDBMS technologies to NoSQL technologies</li>
<li>Competence writing, changing and understanding scripting in various languages such as Windows, Korn/Bash, perl, python</li>
<li>Experience transitioning into Cloud environment</li>
<li>Experience with Oracle Enterprise Manager (OEM)</li>
</ul>
<p>Key Responsibilities:</p>
<ul>
<li>Ensure database backups are performed and valid.</li>
<li>Perform necessary tasks required by data owners and users such as account management and data migrations.</li>
<li>Ensure various security requirements are met such as password changes and vulnerability scans.</li>
<li>Patch the engineered and OEM systems are required.</li>
<li>Monitor database performance and take corrective action if necessary.</li>
</ul>
<p><strong>Clearance Requirement: </strong></p>
<ul>
<li>Active Top Secret/SCI clearance with Active Polygraph</li>
</ul>
</div>
</div><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Database Administrator |
Chantilly, Virgina |
View Details |
TCI - CT |
<p><span style="font-weight: 400;">We are looking for a </span><strong>Full Stack Developer</strong><span style="font-weight: 400;"> with a <span style="text-decoration: underline;"><strong>TS/SCI with Polygraph</strong></span> that is excited about creating new code to handle big data. The work environment offers opportunities to innovate using advanced coding techniques and technologies, as well as various cyber tasks. </span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Exercise experience with the principles of large-scale (terabytes) database development,</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Large-scale file manipulation </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Data modeling, data mapping, data testing, data quality, </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Utilization of open source libraries to extract data, transformation, and load (ETL)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide a</span><span style="font-weight: 400;">nalytical support, operational support, database support, and maintenance support of data and associated systems</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience with Java, ElasticSearch and/or SOLR. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 1 year of experience with Data extraction, transformation and load (ETL), mapping, analytical and operational support. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 1 year of experience with Database support and maintenance. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI with Polygraph is REQUIRED</span></li>
</ul>
<p><strong>Nice If You Have: </strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Any experience with Linux, Tomcat, Hibernate, Jira/Confluence, Jenkins, GIT, RDBMS, Vue, Angular, messaging/queuing technologies, experience with consuming and creating web services, additional javascript frameworks. </span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Data Modeler |
Arlington, Virginia |
View Details |
TSC - Kolo |
<p><strong>Two Six Technologies</strong><span style="font-weight: 400;"> is at the forefront of developing the future data model that ties multiple DoD domains together into a unified system. To aid this effort, we are seeking a</span><strong> Principal Data Modeler</strong><span style="font-weight: 400;"> to lead this groundbreaking work.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<p><strong>Responsibilities include</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Understanding customer and business requirements to develop and optimize conceptual, logical, and physical data models</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Working with database engineers to guide the development and evolution of data models</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Supporting the development of exemplar use cases, guidelines, standards, and documentation for design, use, and maintenance of data models</span></li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<p><strong>Minimum Qualifications</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proficient in SQL</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">BS in Computer Science, Information Technology, or equivalent field</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">8+ years as a backend engineer or system architect</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">2+ years of data modeling experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active Secret security clearance with the ability to obtain TS</span></li>
</ul>
<p> </p>
<p><strong>Nice if you have</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with existing data model standards, particularly cyber-related models such as Structured Threat Information Expression (STIX), STIX Cyber-observable Objects (SCO), etc.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Knowledge of data serialization frameworks</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with government Command and Control systems and military doctrine</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Broad experience across various database types, including SQL, NoSQL, time-series, and graph databases</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience diagnosing and optimizing database performance</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active DoD clearance (Secret or above)</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Embedded Design Engineer (FPGA/ASIC) |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p><span style="font-weight: 400;">Two Six Technologies is looking for an <strong>Embedded Design Engineer (FPGA/ASIC)</strong> to join our team. If you have a desire to perform cutting-edge research and development on embedded devices for novel security applications, let’s talk!</span></p>
<p><strong>Minimum Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A minimum of 5 years of experience with RTL design and verification using VHDL, Verilog/System Verilog. Open to adopt SystemVerilog.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">A minimum of 5 years of experience with RTL Synthesis using a synthesis tool such as Xilinx ISE or Vivado, Intel Quartus or Microsemi Libero.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">At least 5 years of experience with RTL Verification using simulation tools such as Xilinx XSim, QuestaSim/ModelSim, Synopsys VCS, or Cadence NCsim.</span></li>
<li><span style="font-weight: 400;">Active Secret or Top Secret security clearance</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to work on site in Arlington, VA.</span></li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Expertise in FPGA or ASIC development using SystemVerilog.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with SoCs and design flow including place, route and timing analysis. Experience with bring-up, debug, and validation of designs in hardware.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with integration, test and debug tools (Oscilloscopes, spectrum analyzers, logic analyzers).</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with interface protocols such as UART, USB, SPI/I2C, Ethernet, PCI-Express.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with version control tool such as Git.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with Linux OS.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with C, C++.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Makefile and scripting languages such as Python, Bash, and TCL.</span></li>
</ul>
<p><strong>Security Clearance:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Candidate must be able to obtain and maintain a security clearance</span></li>
</ul>
<p><span style="font-weight: 400;">#LI-ZS1</span></p>
<p>#LI-Onsite</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Embedded System Developer |
Dayton, Ohio |
View Details |
TSE - Deployable Systems |
<p><span style="font-weight: 400;">Two Six Technologies is looking for an Embedded Systems Developer to join our team in Dayton, Ohio. If you have a desire to join a team of cutting-edge researchers and developers on embedded devices for security applications, let’s talk!</span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Maturing proof-of-concept R&D technology to operational fieldable solutions</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Build test automation using Gitlab to leverage range deployments and solution evaluation</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Developing APIs and other interfaces bridging the software/hardware technology overlap</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support of scalable and modular design methodology</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Engaging in technical exchanges with transition partners and key stakeholders</span></li>
</ul>
<p><strong>Minimum Qualifications</strong><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s degree in Computer Science, Computer/Electrical Engineering, or related Scientific Domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 2 years experience designing and/or prototyping applications using an agile software development process</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 2 years experience with Operating Systems internals (privilege and user groups, binary memory layout)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 2 years of experience with one or more of the following modern development languages: Python, C , C++, Embedded C</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secret clearance</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to work on-site at our Dayton, Ohio office</span></li>
</ul>
<p><strong>Nice to haves:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Top Secret Clearance (TS/SCI preferred)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Basic understanding of memory management concepts (Heap, Stack, Virtual Memory, MMU, Physical vs. Virtual)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with testing, CI/CD pipelines, and virtual machine test ranges</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with firmware/driver development across Linux and Windows OS’es</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with reverse engineering x86/ARM binaries, embedded systems, or malware</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Top Secret SCI and/or CI/FSP Poly</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Graduate degree in Computer Science, Computer/Electrical Engineering, or related Scientific Domain</span></li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-ONSITE</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Field Operations Engineer |
Arlington, Virginia |
View Details |
TSC - Kolo |
<p> </p>
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Field Operations Engineer </strong>to join our IKE team. </p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide customer support through the performance of on-site installation, as well as overseeing any necessary diagnoses, troubleshooting, service, and repair of systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Requires an understanding of the Cyber Mission Force (CMF) organizational construct, tools/capabilities utilized in cyberspace operations and experience in system/network administration, incident response and forensic analysis</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Participate in the establishment, measurement, and achievement of customer satisfaction metrics</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform project management function from client engagements to include identification, scheduling, tracking, and reporting</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide client feature request to project engineering teams and project support personnel</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop and write documentation as required</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Brief and demonstrate company projects to a variety of customers (government and non-government agencies)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Train and familiarize operators on equipment and systems developed by Two Six</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support an environment conducive to successful team interaction and customer satisfaction</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong results-oriented work ethic and customer service orientation</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">The ability for travel greater than 25%</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Current Secret Clearance with ability to obtain a TS/SCI clearance</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">5+ years’ experience working in Cyber Mission Force community</span></li>
</ul>
<p><strong>Nice to Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Programming and query language experience is a strong plus; Python, SQL</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with DevOps and/or Agile is a huge plus; Atlassian collaboration tools</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Possess strong project management skills, with attention to detail</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Government or military cyber experience </span></li>
</ul>
<p><span style="font-weight: 400;">#LI-KS1 </span></p>
<p>#LI-Onsite</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Field Operations Engineer |
Arlington, Virginia |
View Details |
TSC - Kolo |
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Field Operations Engineer </strong><span style="font-weight: 400;">to join our Cyber team in Arlington, Virginia. </span></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide customer support through the performance of on-site installation, as well as overseeing any necessary diagnoses, troubleshooting, service, and repair of systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Requires an understanding of the Cyber Mission Force (CMF) organizational construct, tools/capabilities utilized in cyberspace operations and experience in system/network administration, incident response and forensic analysis</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Participate in the establishment, measurement, and achievement of customer satisfaction metrics</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform project management function from client engagements to include identification, scheduling, tracking, and reporting</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide client feature request to project engineering teams and project support personnel</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop and write documentation as required</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Brief and demonstrate company projects to a variety of customers (government and non-government agencies)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Train and familiarize operators on equipment and systems developed by Two Six</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support an environment conducive to successful team interaction and customer satisfaction</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong results-oriented work ethic and customer service orientation</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">The ability for travel greater than 25%</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Current Secret Clearance with ability to obtain a TS/SCI clearance</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">5+ years’ experience working in Cyber Mission Force community in support of offensive cyberspace operations</span></li>
</ul>
<p><strong>Nice to Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Programming and query language experience is a strong plus; Python, SQL</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with DevOps and/or Agile is a huge plus; Atlassian collaboration tools</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Possess strong project management skills, with attention to detail</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Government or military cyber experience</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Firmware Reverse Engineer |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p><span style="color: #7e8c8d;">Job ID: 610</span></p>
<p><strong>Two Six Technologies</strong> is seeking a <strong>Firmware Reverse Engineer</strong>. You will work with a range of clients supporting both national security missions and commercial clients. You will become a trusted advisor while learning and performing valuable technical and industry skills. This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.</p>
<p>Since we are a small team, you will not be lost in the shuffle. You will be a key player in a small fast paced team, owning your own projects and developing client relationships. Working with our lead Reverse Engineer, you will have access to top experts in the field with experience across a range of domains. You will have numerous opportunities to define your work.</p>
<p><strong>Job Responsibilities & Duties</strong><br>Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.</p>
<p>You should be comfortable taking on complex technical problems for which there is often no known answer. You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for breaking unique complex systems.</p>
<p><strong>Qualifications & Skills- Required:</strong></p>
<ul>
<li>Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)</li>
<li>Minimum 3 years of experience firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line</li>
<li>Strong familiarity with cybersecurity principles and a strong interest in learning more</li>
<li>Minimum 3 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)</li>
<li>Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques</li>
<li>Active US Security clearance of Secret level and ability to obtain and maintain TS.</li>
</ul>
<p><strong>Nice to have, but not expected:</strong></p>
<ul>
<li>Familiarity with Binary Ninja API or Ghidra scripting</li>
<li>Familiarity building or securing embedded devices and other digital systems</li>
<li>Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</li>
<li>Familiarity with basic cryptography design and implementation concepts</li>
<li>Experience in a client-facing technical role</li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active Secret clearance </li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-ONSITE</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Firmware Reverse Engineer |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p><span style="color: #7e8c8d;">Job ID: 610</span></p>
<p><strong>Two Six Technologies</strong> is seeking a <strong>Vulnerability Research Engineer</strong>. You will work with a range of clients supporting both national security missions and commercial clients. You will become a trusted advisor while learning and performing valuable technical and industry skills. This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.</p>
<p>Since we are a small team, you will not be lost in the shuffle. You will be a key player in a small fast paced team, owning your own projects and developing client relationships. Working with our lead Reverse Engineer, you will have access to top experts in the field with experience across a range of domains. You will have numerous opportunities to define your work.</p>
<p><strong>Job Responsibilities & Duties</strong><br>Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.</p>
<p>You should be comfortable taking on complex technical problems for which there is often no known answer. You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for breaking unique complex systems.</p>
<p><strong>Qualifications & Skills- Required:</strong></p>
<ul>
<li>Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)</li>
<li>Minimum 3 years of experience firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line</li>
<li>Strong familiarity with cybersecurity principles and a strong interest in learning more</li>
<li>Minimum 3 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)</li>
<li>Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques</li>
<li>Active US Security clearance of Secret level and ability to obtain and maintain TS.</li>
</ul>
<p><strong>Nice to have, but not expected:</strong></p>
<ul>
<li>Familiarity with Binary Ninja API or Ghidra scripting</li>
<li>Familiarity building or securing embedded devices and other digital systems</li>
<li>Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</li>
<li>Familiarity with basic cryptography design and implementation concepts</li>
<li>Experience in a client-facing technical role</li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active Secret clearance </li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-Onsite</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Full Stack Developer |
Chantilly, Virginia |
View Details |
TCI - D-Cyber |
<p><span style="font-weight: 400; color: #7e8c8d;">Job ID: 785</span></p>
<p><span style="font-weight: 400;">We are looking for a </span><strong>Full Stack Developer</strong><span style="font-weight: 400;"> with a <span style="text-decoration: underline;"><strong>TS/SCI with Polygraph</strong></span> that is excited about creating new code to handle big data. The work environment offers opportunities to innovate using advanced coding techniques and technologies, as well as various cyber tasks. </span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Exercise experience with the principles of large-scale (terabytes) database development,</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Large-scale file manipulation </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Data modeling, data mapping, data testing, data quality, </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Utilization of open source libraries to extract data, transformation, and load (ETL)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide a</span><span style="font-weight: 400;">nalytical support, operational support, database support, and maintenance support of data and associated systems</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience with Java, ElasticSearch and/or SOLR. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 1 year of experience with Data extraction, transformation and load (ETL), mapping, analytical and operational support. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 1 year of experience with Database support and maintenance. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI with Polygraph is REQUIRED</span></li>
</ul>
<p><strong>Nice If You Have: </strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Any experience with Linux, Tomcat, Hibernate, Jira/Confluence, Jenkins, GIT, RDBMS, Vue, Angular, messaging/queuing technologies, experience with consuming and creating web services, additional javascript frameworks. </span></li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active TS/SCI - Poly</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Full Stack Developer |
Herndon, Virginia |
View Details |
TCI - D-Cyber |
<p><span style="font-weight: 400; color: #7e8c8d;">Job ID: 485</span></p>
<p><span style="font-weight: 400;">We are looking for a </span><strong>Full Stack Developer</strong><span style="font-weight: 400;"> with a <span style="text-decoration: underline;"><strong>TS/SCI with Polygraph</strong></span> that is excited about creating new code to handle big data. The work environment offers opportunities to innovate using advanced coding techniques and technologies, as well as various cyber tasks. </span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Exercise experience with the principles of large-scale (terabytes) database development,</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Large-scale file manipulation </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Data modeling, data mapping, data testing, data quality, </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Utilization of open source libraries to extract data, transformation, and load (ETL)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide a</span><span style="font-weight: 400;">nalytical support, operational support, database support, and maintenance support of data and associated systems</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience with Java, ElasticSearch and/or SOLR. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 1 year of experience with Data extraction, transformation and load (ETL), mapping, analytical and operational support. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 1 year of experience with Database support and maintenance. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI with Polygraph is REQUIRED</span></li>
</ul>
<p><strong>Nice If You Have: </strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Any experience with Linux, Tomcat, Hibernate, Jira/Confluence, Jenkins, GIT, RDBMS, Vue, Angular, messaging/queuing technologies, experience with consuming and creating web services, additional javascript frameworks. </span></li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active TS/SCI - Poly</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Hardware Designer |
Arlington, Virginia |
View Details |
TSE - Embedded Vulnerability Solutions |
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Hardware Designer</strong><strong> </strong><span style="font-weight: 400;">to develop board level hardware for embedded systems.</span><span style="font-weight: 400;"> If you have a desire to perform cutting-edge research, hardware design, and engineering on embedded technologies and architectures, apply today!</span></p>
<p><strong>Job Responsibilities: </strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Design quick-turn PCBs and breakout boards for hardware</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Apply knowledge of Linux/Unix-based systems to help solve complex mission challenges</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform simple scripting for automated testing</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 2 years in PCB design/development</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated experience in using GitLab or equivalent code version control software.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Exposure to scripting languages, Kicad, and board fabrication requirements</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Board assembly and soldering ability</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor's Degree in Electrical Engineering, Computer Engineering, or equivalent experience</span></li>
</ul>
<p><strong>Nice to haves</strong><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in the cybersecurity domain</span></li>
</ul>
<p><strong>Clearance</strong><span style="font-weight: 400;">: Ability to obtain and maintain a TS/SCI clearance</span><span style="font-weight: 400;"> </span></p>
<p> </p>
<p>#LI-ZS1</p>
<p>#LI-ONSITE</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Hardware Reverse Engineer |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p> </p>
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Hardware Reverse Engineer</strong><span style="font-weight: 400;">. If you have a desire to perform cutting-edge research and reverse engineering on embedded technologies and architectures, apply today!</span></p>
<p><span style="font-weight: 400;">In this role, you will work on 1-2 research and reverse engineering programs at a time. You’ll use your skillset to rapidly solve a large range of reverse engineering challenges.</span></p>
<p><span style="font-weight: 400;">If you have a passion for cyber-security and/or reverse engineering - or an interest in growing into these fields - this role will offer you extremely unique opportunities to do so.</span></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Create and develop novel security applications for embedded systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support a wide range of new research and development projects, focusing on embedded system security</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Quickly isolate areas of interest in large complex systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Rapidly prototype new technologies to exploit target systems </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform vulnerability research on hardened systems</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s degree in Computer Science, Computer/Electrical Engineering, or related Scientific Domain OR 5 years of experience in the embedded security industry.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience with Linux on embedded hardware platforms and embedded systems debugging (JTAG/UART/Oscilloscopes/Logic Analyzers)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience in C, C++ and Python programming languages</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with wired and wireless networking protocols and hardware as well as reverse engineering experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Deep problem solving abilities and willingness to dive deep in unknown territories</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active Top Secret or higher DoD or IC security clearance</span></li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">An advanced degree (Masters or Ph D.) in Computer Science, Computer/Electrical Engineering, or related Scientific Domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience working as part of small R&D teams composed of researchers, engineers, and scientists</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Firmware development experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">RF Expertise</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Layer 1 and 2 wired and wireless protocols such as USB, SPI/I2C/1-Wire, Ethernet, PCI-Express, 802.11, Bluetooth/ZigBee.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Hacking experience on IoT products</span></li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Eligibility for Security clearance</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Information System Security Officer (ISSO) |
Arlington, Virginia |
View Details |
TSE - Operations |
<p><span style="font-weight: 400;">Two Six Technologies is seeking an experienced Information System Security Officer (ISSO) within its Two Six Electronic Systems (TSE) business unit.</span></p>
<p><span style="font-weight: 400;">The ISSO will have responsibility for maintaining the appropriate operational security posture for all information systems on our programs – they will work closely with our operations, IT, and security teams to ensure compliant and secure deployment and maintenance of custom systems, networks, and systems-under-test. </span></p>
<p><span style="font-weight: 400;">This technical role requires broad experience across technical, compliance, and security domains. A successful candidate will have a structured yet flexible approach to problem solving and collaboration and a strong willingness to learn, adapt, and build processes within TSE.</span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Manage the security and compliance of multiple classified systems, ensuring compliance with standards and guidelines</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Conduct risk analyses from vulnerability/compliance scans, penetration testing results, or other audit activity</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform technical audit of systems for compliance with standards and suspicious activity</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop and coordinate Incident Response, Disaster Recovery, Contingency Planning and Testing</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop and update security authorization packages in accordance with DoD JSIG,DAAPM, and ICD 503 policies. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Coordinate with the client cybersecurity team to achieve and maintain information systems compliance and authorization to operate (ATO). </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Assist with developing corporate cyber security policies for SCI and SAP efforts.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Conduct STIG Compliance Reviews.</span></li>
</ul>
<p><strong>Minimum Qualifications</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active Top Secret security clearance or the ability to obtain SCI</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">2-3 years of experience in an ISSO/ISSM role</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">One or more DoD 8570 IAM Level III certifications such as CISSP, CISM, GSLC, and/or CCISO</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Administering, and Maintaining a variety of tools including hands-on experience in the following:</span></li>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identity and Access Management (IAM)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Security Information and Event Management (SIEM)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Network-based and host-based IDS/IPS</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Network-based and host-based firewalls</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Auditing and logging procedures (including server-based logging)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Basic system, network, and OS hardening techniques on Windows and Linux systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Cyber defense and vulnerability assessment tools and their capabilities. (e.g., ACAS, SCAP, Nessus, Qualys)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Developing, testing, and integrating security tools as well as configuring and installing the tools.</span></li>
</ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Willing to submit to a CI Poly</span></li>
</ul>
<p><strong>Nice to Haves:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor's Degree in Computer Science, Computer Information Systems, Electrical Engineering, Cyber Security or Equivalent Degree</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience on SAPs</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Intimate Knowledge of Security configuration baselines (DISA STIG) and best practices including NIST 800-53/171 and CMMC</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to work quickly, efficiently, and accurately in a dynamic and fluid environment</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Information Systems Security Engineer |
Herndon, Virginia |
View Details |
TCI - O-Cyber |
<p>Trusted Concepts, a division of Two Six Technologies is currently seeking an Information Systems Security Engineer whom will be responsible for supporting our information security systems and implementing security solutions to protect our organizations sensitive data. You will work closely with the senior ISSEs to ensure that our security systems are operating efficiently and that all security measures are being properly implemented.</p>
<p><strong>Clearance: TS/SCI with a Polygraph</strong></p>
<p><strong>Required Knowledge/Skills:</strong></p>
<ul>
<li>Demonstrated experience with speaking and collaborating with customers, vendors,<br>management, and Information Technology (IT) staff during the creation and maintenance<br>of cloud-based systems</li>
<li>Experience with the architecture, development, implementation, and administration of<br>cloud-based systems</li>
<li>Demonstrated experience with customer Information Security practices and accreditation<br>processes</li>
<li>Demonstrated experience conducting security audits to ensure that the systems comply<br>with industry standards and regulations.</li>
<li>Demonstrated experience with documenting business rules, technical capabilities and<br>developing quality metrics</li>
<li>Operational support role experience, triaging and troubleshooting issues experienced by<br>remote end users</li>
<li>Demonstrated experience monitoring security systems to detect and respond to security<br>vulnerabilities</li>
<li>Demonstrated experience with tracking and updating inventory of Commercial-Off-The-<br>Shelf (COTS) software, and hardware</li>
<li>Demonstrated experience with Visio and PowerPoint for system diagrams and senior<br>management presentations</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Java Developer |
Tysons, Virginia |
View Details |
TCI - D-Cyber |
<p> </p>
<p><span style="font-weight: 400;">Trusted Concepts, A Division of Two Six Technologies is currently seeking </span><strong>Java Developers. </strong><span style="font-weight: 400;"> An</span><strong> active TS/SCI with Polygraph </strong><span style="font-weight: 400;">is required for this role</span><strong>. </strong></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop, test, and implement new code</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide ongoing maintenance, support, and enhancements in existing systems and platforms.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Troubleshoots complex problems and provides customer support for software systems and application issues.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Participate in regularly scheduled agile meetings</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s Degree or equivalent in years of experience; Mathematics, Physics, Operations Research, Computer Science or a related discipline.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 2 years of java development experience</span></li>
</ul>
<p> </p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Junior Software Developer |
Fair Oaks, Virginia |
View Details |
TCI - Space |
<p>Trusted Concepts, a division of Two Six Technologies is looking for a junior-level developer who will work on the Automated Constellation Scheduler. This is a complex heuristics-based application that leverages a lot of data structures and algorithms most never get to use in normal application development. Must be comfortable thinking outside of the box, and willing to learn new things. Must also be willing to support customer changes in a Kanban environment.</p>
<p>Clearance: TS/SCI with Polygraph required</p>
<p><br>Primary Responsibilities:<br>● Willingness to code in Java, acceptable if the developer has no prior experience<br>● Building new features and capabilities on the Automated Constellation Scheduler.<br>● Working on taking user inputted data, and have the scheduler interpret it correctly and lay it down<br>on a timeline<br>● Ability to add unit tests to newly added code to the system</p>
<p>Keys for Success:<br>● 1 year of experience writing in Java/C/C++/Python/other<br>● 1 year of experience with various data structures and their intended usage<br>● 1 year of experience within agile methodologies</p>
<p>Bonus Points:<br>● Knowledge of multi-threaded data structures<br>● Knowledge of unit test, integration testing, and end-to-end testing<br>● Knowledge of web development (frameworks like Angular/React, etc)</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Junior Software Engineer |
Fair Oaks, Virginia |
View Details |
TCI - Space |
<p>Trusted Concepts, a division of Two Six Technologies is looking for a junior-level developer who will work on the Automated Constellation Scheduler. This is a complex heuristics-based application that leverages a lot of data structures and algorithms most never get to use in normal application development. Must be comfortable thinking outside of the box, and willing to learn new things. Must also be willing to support customer changes in a Kanban environment.</p>
<p>Clearance: TS/SCI with able to obtain a Polygraph</p>
<p>Primary Responsibilities:<br>● Willingness to code in Java, acceptable if the developer has no prior experience<br>● Building new features and capabilities on the Automated Constellation Scheduler.<br>● Working on taking user inputted data, and have the scheduler interpret it correctly and lay it down<br>on a timeline<br>● Ability to add unit tests to newly added code to the system</p>
<p>Keys for Success:<br>● 1 year of experience writing in Java/C/C++/Python/other<br>● 1 year of experience with various data structures and their intended usage<br>● 1 year of experience within agile methodologies</p>
<p>Bonus Points:<br>● Knowledge of multi-threaded data structures<br>● Knowledge of unit test, integration testing, and end-to-end testing<br>● Knowledge of web development (frameworks like Angular/React, etc)</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Junior Technical Project Manager |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p style="font-weight: 400;">As a <strong>Junior Technical Project Manager</strong>, you enable our R&D programs, for customers including DARPA and other government agencies, to achieve their greatest potential. Additionally, you will support relationships and collaboration with mission owners to facilitate the preparation, testing and deployment of R&D capabilities into operations. You will work with a multidisciplinary team of experts in cybersecurity, data science, software development, security, and computational social science. You thrive in a dynamic, flexible, and adaptable organization. Your responsibilities may include:</p>
<ul>
<li style="font-weight: 400;">Managing, revising, and balancing requirements across a technical project team </li>
<li style="font-weight: 400;">Supporting internal processes for our R&D and innovation pipeline for rapid transition capabilities from research teams to deployment and operations teams</li>
<li style="font-weight: 400;">Government customer interface and coordination</li>
<li style="font-weight: 400;">Preparation/submission/management of contract deliverables</li>
<li style="font-weight: 400;">Schedule and budget management</li>
<li style="font-weight: 400;">Process and risk management</li>
<li style="font-weight: 400;">Proposal support</li>
<li style="font-weight: 400;">Logistics coordination across multiple locations and teams</li>
</ul>
<p style="font-weight: 400;"><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;">3+ years of experience in project management, preferably in government R&D programs</li>
<li style="font-weight: 400;">Experience with distributed teams that span geographic locations, functional teams, and organizations</li>
<li style="font-weight: 400;">Mastery of these or similar technologies: Jira, Confluence, Google Workspace, and Microsoft Office Suite</li>
<li style="font-weight: 400;">Experience with the multiple aspects of the research lifecycle (proposal to publication/transition) or the software development lifecycle (from concept to prototype and production)</li>
<li style="font-weight: 400;">Active TS Clearance </li>
</ul>
<p style="font-weight: 400;"><strong>Nice to Haves:</strong></p>
<ul>
<li style="font-weight: 400;">Government contracts management experience</li>
<li style="font-weight: 400;">Proposal writing experience, to include technical and cost volumes</li>
<li style="font-weight: 400;">Project Management formal training or certifications (PMP, etc)</li>
<li style="font-weight: 400;">Educational background in computer science, math/stats, engineering, or related field</li>
<li style="font-weight: 400;">SCI Clearance</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Junior UI Developer |
Fair Oaks, Virginia |
View Details |
TCI - Space |
<p>Trusted Concepts, a division of Two Six Technologies is looking for a junior-level developer who will work on the Automated Constellation Scheduler. This is a complex heuristics-based application that leverages a lot of data structures and algorithms most never get to use in normal application development. Must be comfortable thinking outside of the box, and willing to learn new things. Must also be willing to support customer changes in a Kanban environment.</p>
<p>Clearance: TS/SCI with the ability to obtain a Polygraph</p>
<p>Primary Responsibilities:<br>● Willingness to code in Java, acceptable if the developer has no prior experience<br>● Building new features and capabilities on the Automated Constellation Scheduler.<br>● Working on taking user inputted data, and have the scheduler interpret it correctly and lay it down<br>on a timeline<br>● Ability to add unit tests to newly added code to the system</p>
<p>Keys for Success:<br>● 1 year of experience writing in Java/C/C++/Python/other<br>● 1 year of experience with various data structures and their intended usage<br>● 1 year of experience within agile methodologies</p>
<p>Bonus Points:<br>● Knowledge of multi-threaded data structures<br>● Knowledge of unit test, integration testing, and end-to-end testing<br>● Knowledge of web development (frameworks like Angular/React, etc)</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Lead Artificial Intelligence and Machine Learning Researcher |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p> </p>
<p><span style="font-weight: 400;">Two Six Technologies is seeking a</span><strong> Lead Artificial Intelligence and Machine Learning Engineer</strong></p>
<p><span style="font-weight: 400;">Researching and applying cutting edge techniques for extracting Information from an ever-growing data environment is increasingly fundamental for new and emerging National Security capabilities being developed, tested, and deployed by the Department of Defense, the Intelligence Community, and other National Security organizations. Two Six Technologies is seeking an AI/ML technical leader to continue to build and deploy our capabilities to a wide range of mission partners, grow our sponsored research portfolio with DARPA and other research organizations, and cultivate our talented Data Scientists and AI/ML research team. </span></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Guide the development and deployment of novel AI/ML/Data Science methodologies, frameworks, and systems across a variety of data types, applications, and computing environments</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Advise and mentor research staff who specialize in areas such as Computer Vision (CV), Natural Language Processing (NLP), and Signal Processing</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Set Technical Direction for AI/ML/Data Science R&D project portfolio</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Supporting relationships with DARPA Program Managers and other customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Communicate methods and results to a variety of stakeholders and customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identifying new R&D opportunities </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Cultivating our AI/ML/Data Science talent team, identifying/hiring new team members and line management of key contributors</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support technical inputs for marketing of Two Six Technologies’ AI/ML/Data Science services and capabilities to new and existing Government clients</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">An advanced-year degree (Master’s or PhD) in Mathematics, Computer Science, or related technical domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Past performance as a Principal Investigator or Technical Director on fast-paced, innovation-driven, advanced technology R&D projects for Government clients</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">10 years of experience developing innovative AI/ML solutions in relevant domains</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with common machine learning pipelines, model architectures, and metrics</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Academic and/or industry publications in relevant fields</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">DoD and/or IC domain experience and knowledge</span></li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience as a Principal Investigator for a DARPA program</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading and mentoring research teams and researchers </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with agile software development practices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading teams in a rapid prototype environment demonstrating scalable architectures</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proven experience overseeing a rapidly growing portfolio of research teams</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active security clearance</span></li>
</ul>
</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Lead Cybersecurity Researcher |
Arlington, Virginia |
View Details |
TSE - Embedded Vulnerability Solutions |
<p>Two Six Technologies is looking to add a Lead Cybersecurity Researcher to our team. This role is technical at its core – you will develop new capabilities in program analysis, binary patching, and finding security vulnerabilities in systems.</p>
<p>The ideal candidate should be comfortable with ambiguity and forging your own path; our small team setting will provide you the opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for our innovative research work.</p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li>Take on complex technical problems for which there is often no known answer.</li>
<li>Develop tools and techniques to assist with tasks that traditionally require significant manual reverse engineering effort to include Binary patching, Vulnerability research, and Binary fingerprinting</li>
<li>Provide technical leadership and direction on multiple ongoing projects, and interface directly with clients/key stakeholders to present findings and gather design constraints</li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li>Minimum of 5 years of experience with programming/scripting languages (e.g., Go, C, Rust, Python) and Linux</li>
<li>Minimum of 5 years experience executing cybersecurity principles and a strong interest in learning more</li>
<li>Experience with static analysis or software reverse engineering</li>
<li>Familiarity with tools and techniques for binary analysis</li>
<li>Experience with Binary Ninja or Ghidra API</li>
</ul>
<p><strong>Nice if you have:</strong></p>
<ul>
<li>Experience building or securing embedded devices and other digital systems</li>
<li>Experience with dynamic analysis, fuzzing techniques, and debugging</li>
<li>Experience in a client-facing technical role</li>
<li>Experience with embedded binary reverse engineering (ARM, RTOS, etc.)</li>
<li>Bachelor’s (or higher) degree in computer science, engineering, or a related field</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Lead Front End Engineer |
Arlington, Virginia |
View Details |
TSC - Kolo |
<p><span style="font-weight: 400;">Two Six Technologies is seeking an experienced </span><strong>Lead Front End Developer</strong><span style="font-weight: 400;"> to work on multi-domain platforms serving critical national security functions using cutting-edge modern frameworks. Join our team to solve hard problems in large-scale data investigation and analysis, real-time collaboration, task and resource planning and coordination, and high-dimensional data summarization and visualization allowing lay persons to easily answer complex questions.</span></p>
<p><strong>Responsibilities</strong><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Implement new front end UI/UX features in a modern web framework such as Vue or React with an eye towards responsive design, cross-browser and -platform compatibility, performance, and modularity</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Work alongside designers in thinking creatively about end users’ problems and how to solve them </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Follow provided UI/UX designs/mockups but also be comfortable suggesting improvements and designing/implementing detailed controls and handling of edge cases and error states given a broad intent</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Debug issues and help perform end-to-end testing to discover new ones</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Be comfortable designing and developing full sections of functionality given a broad requirement, including identifying and handling of edge cases and error states</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Help break down large, complex customer requests into actionable tasks for a team of developers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Help define architectural requirements for meeting customer needs</span></li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum 7 years practical experience in software engineering</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">A BS in Computer Science or equivalent work experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with the following technologies:</span></li>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">TypeScript, JavaScript, CSS, HTML5, and modern web frameworks such as Vue.js, React, and/or Angular.</span></li>
</ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A self-driven work ethic and a willingness to jump in and solve hard problems</span></li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<p><strong>Nice If you Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience using Git and Jira in a development workflow</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience working in an agile environment</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience managing a team of developers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience mentoring other developers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with WebGL and web visualization frameworks such as D3</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience creating features allowing for simultaneous editing of content</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience creating large-scale, real-time data visualizations</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with SQL and databases in general</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Vue 3 and Vite</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Ember.js</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with DevSecOps</span></li>
</ul>
<p> </p>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Eligibility for Security clearance</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Lead Linux Software Developer |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p><span style="font-weight: 400;">Two Six Technologies is looking to add a </span><strong>Lead Linux Software Developer</strong><span style="font-weight: 400;"> to our team. This role will be responsible for developing and deploying capabilities for our customers. You will also be responsible for productizing PoC’s that are handed off from a team of reverse-engineers </span></p>
<p><span style="font-weight: 400;">The ideal candidate should be comfortable with ambiguity and forging your own path; our small team setting will provide you the opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for our innovative research work.</span></p>
<p> </p>
<p><strong>Job Responsibilities & Duties:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Serve as the primary capability developer on a small, highly motivated team</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Apply knowledge of Linux/Unix based systems to help solve complex mission challenges</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide mentoring to more junior developers on capability development strategies, methodologies, and implementation </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Assist with reverse engineering and debugging of relevant linux applications applications</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Triage and scope ad-hoc tasks from the customer</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years Unix kernel experience internals including mandatory/discretionary access controls, runtime linker/loader, object file formats, file systems, and process/thread APIs & data structures.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated experience in developing applications in C/C++, and Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Hosted Version Control familiarity (specifically Git and Gitlab) and ability to customize pipelines. Comfortable with performing testing and releases in an environment using CI/CD methodologies.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience as a developer on an Agile development style team. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">At least 2 years of experience with network sockets programming and expert packet-level understanding of IP, TCP, and other application level protocols.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with at least one modern automation framework (preferably Ansible)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Knowledge of memory protection modules (ASLR/DEP, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience tracing code execution in a debugger (WinDbg/gdb/IDAPro)</span></li>
</ul>
<p><strong>Nice to haves:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading a team of junior/mid developers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with identifying and analyzing vulnerabilities in complex applications</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to rapidly find bearings in unfamiliar code bases</span></li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">This position requires a TS/SCI with the ability to obtain poly</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Lead Reverse Engineer & Vulnerability Researcher |
Arlington, Virginia |
View Details |
TSE - Embedded Vulnerability Solutions |
<p><span style="font-weight: 400;">Two Six Technologies is looking to add a Lead Reverse Engineer & Vulnerability Researcher to our team. This role is technical at its core – you will develop new capabilities whose enabling knowledge is found in program analysis, binary patching, and finding security vulnerabilities in systems.</span></p>
<p><span style="font-weight: 400;">The ideal candidate should be comfortable with ambiguity and forging your own path; our small team setting will provide you the opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for our innovative research work.</span></p>
<p><strong>Responsibilities Include</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Take on complex technical problems for which there is often no known answer.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop tools and techniques to assist/automate tasks that traditionally require significant manual reverse engineering effort to include Binary patching, Vulnerability research, and Binary fingerprinting</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform in depth reverse engineering on complex linux based applications</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Follow-on development to productize results/PoCs or handoff to developer for productization</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide technical leadership and direction on multiple ongoing projects, and interface directly with clients/key stakeholders to present findings and gather design constraints</span></li>
</ul>
<p><strong>Minimum Qualifications</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years of experience with programming/scripting languages (e.g., C, C++, Java, Python) and Linux</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years experience executing cybersecurity principles and a strong interest in learning more</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with static analysis or software reverse engineering</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with tools and techniques for binary analysis</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with dynamic analysis, fuzzing techniques, and debugging</span></li>
</ul>
<p><strong>Nice If You Have</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in a client-facing technical role</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with IDA or Ghidra reverse engineering toolsets</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s (or higher) degree in computer science, engineering, or a related field</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience reverse engineering binary payloads from multiple architectures (ARM, MIPS, TI, x86, x64)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience reverse engineering data payloads at rest (file formats etc) and in flight (tcp/ip and other bus captures)</span></li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">This position requires a TS/SCI with the ability to obtain poly</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Lead System Administrator - hybrid |
Arlington, Virginia |
View Details |
Corporate |
<p><span style="font-weight: 400;">Two Six Technologies is seeking a <strong>Lead System Administrator</strong> that can work in a fast paced, research driven organization to support application setup and administration, troubleshooting, security administration, access control, and integration between systems. Individuals best suited for this role should enjoy problem solving and be able to cope with sudden changes in tasking. </span></p>
<p><span style="font-weight: 400;">Ideally you would possess a wide range of experience with both cloud based and on premise systems installation, configuration, and administration.</span></p>
<p><strong>This is a hybrid role working from our Arlington, VA office.</strong></p>
<p><strong>What you will do:</strong></p>
<ul>
<li><span style="font-weight: 400;">Work with cross-functional IT Teams to ensure effective execution of SSO services</span></li>
<li><span style="font-weight: 400;">Provide tiered support for applications and services both cloud and on premise</span></li>
<li><span style="font-weight: 400;">Act as systems/security administrator for applications and services</span></li>
<li><span style="font-weight: 400;">Assist in pre-install tasking like scoping, sizing, planning, networking, etc. for potential new applications and services</span></li>
<li><span style="font-weight: 400;">Support integration efforts between applications and services (APIs, Data File Transfer, etc.)</span></li>
<li><span style="font-weight: 400;">Support activities to integrate new companies and employees into existing services to support company growth</span></li>
<li><span style="font-weight: 400;">Develop application/service training, as needed, for users</span></li>
<li>Maintain documentation for support, usage, and compliance for applications/services</li>
</ul>
<p><strong>What you will need:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">5+ years of related system administration and IT experience</span></li>
<li style="font-weight: 400;"><strong>US Citizenship with the ability to obtain and maintain a high level security clearance</strong></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Excellent collaboration, interpersonal, and communication skills</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated ability to troubleshoot, problem-solve, and implement technology solutions</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with administration of multiple applications: activities like setup, permission setting, troubleshooting, configuration, backups, etc. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Working knowledge of TCP/IP and services like DHCP and DNS</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with cloud service providers such as AWS, Azure, GCP</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with scripting languages and/or automation tools</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience supporting Google cloud services and Google Workspace</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with system migration and attribute mapping</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Mobile Device Management (Mosyle/JAMF/Intune/Jumpcloud)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience managing Gitlab/Github</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with IAM providers (Okta/OneLogin/Duo/Active Directory)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with project management tools (Jira/Asana/Smartsheets)</span></li>
</ul>
<p><strong>What we would like:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated integration (API) skills/experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiar with application security, privacy, and data protection best practices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with container technologies such as Docker and/or LXC</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with data/application backup methods and systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Operating Systems administration experience (Windows, MacOS, and/or Linux)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active Top Secret clearance</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Mobile Software Engineer - hybrid |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p><span style="font-weight: 400;">We are seeking a Software Engineer to research and develop next-generation technologies for mobile operating systems. The ideal candidate will have an interest in research as well as a commitment to developing solutions for the real world. You will join a small, supportive team that values cooperation and creative spirit. </span></p>
<p><span style="font-weight: 400;">This is a hybrid role, mostly working remote and going into our Arlington, VA office as needed.</span></p>
<p><strong>What you will do:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Actively participate in the design, build, test, and implementation phases of research programs focused on advancing technology in the areas of security, stealth, and privacy in mobile platforms</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Become intimately familiar with all aspects of what goes on inside of today's smartphones, including the hardware, kernel, drivers, firmware, framework, and apps</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop the ability to identify security and privacy risks of various apps, systems, and architectures</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Design and develop custom software solutions for both prototype and production-level systems on mobile phones and other resource-constrained platforms, e.g., single-board computers</span></li>
</ul>
<p><strong>What you will need:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A four-year degree in CS, EE, or related on the job experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">3+ years of professional or academic software development experience with Java</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with standard Linux Software engineering tools, e.g. git, gcc, make</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to obtain and maintain a government clearance</span></li>
</ul>
<p><strong>What we would like</strong><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience building or modifying Android or other mobile operating systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with network stack development</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Linux kernel namespaces</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with cloud architectures </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with wireless (NFC/Bluetooth/802.11/LTE) protocols and hardware</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing or modifying Internet-of-Things (IOT) devices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with ARM assembly language</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing security solutions and products</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience interfacing and managing an end user community </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active DoD clearance (Secret or above) </span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Operations Analyst |
Stuttgart, Germany |
View Details |
TSI - DoD |
<p><span style="font-weight: 400;">*This position will start in the National Capital Region and relocate to Stuttgart, Germany upon SOFA*</span></p>
<p> </p>
<p><span style="font-weight: 400;">Are you experienced at assessing, planning, and conducting Operations in the Information Environment (OIE)? </span></p>
<p><span style="font-weight: 400;">Are you passionate about leveraging cutting edge technology and techniques to advance U.S. interests in the global information space?</span></p>
<p><span style="font-weight: 400;">Can you conceptualize and communicate solutions to customer requirements and guide them from ideation to implementation?</span></p>
<p><span style="font-weight: 400;">Do you enjoy solving complex problems by linking capabilities and resources?</span></p>
<p> </p>
<p><span style="font-weight: 400;">Then we’d like to talk to you.</span></p>
<p> </p>
<p><span style="font-weight: 400;">About Two Six Technologies</span></p>
<p><span style="font-weight: 400;">Two Six Technologies leverages cutting edge methodologies and technical solutions to deliver real results to customers. We built the Pulse Platform to address some of the most urgent human security issues faced by the world’s most vulnerable populations. Our Pulse platform is used to interact with populations around the world to provide insight into their thinking and engage them in two-way conversations. Pulse also provides access to publicly available information across the surface, deep, and dark web and social media to provide a robust view of the Information Environment from baseline through assessment.</span></p>
<p> </p>
<p><span style="font-weight: 400;">Position Details</span></p>
<p><span style="font-weight: 400;">The Pulse Operations Analyst provides expert advice on the employment of the Pulse platform in support of analysis and operations. Pulse Operations Analysts act as liaisons between Two Six Technologies and our customers.Pulse Operations Analysts should be intimately familiar with data analysis and data visualizations. Familiarity with Information Operations, PSYOP, MISO, and Military Planning is a plus. Additionally, familiarity with TST's Pulse platform is a plus, but it's not a requirement as training will be provided. This position requires less than 20% CONUS and OCONUS travel. These positions will be onsite in Stuttgart, Germany & Ft. Meade, Maryland.</span></p>
<p> </p>
<p><span style="font-weight: 400;">Responsibilities Include:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Using Pulse’s PAI monitoring capability to answer information requirements within the online information environment and train the customer to do the same</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Working side-by-side with the customer to understand mission requirements and drive data collection, analysis, and visualization to gain a better understanding of the information environment</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Creating responsive visualizations in Pulse that provide insight to difficult problems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Utilize data visualization in a way that tells a story and helps analysts, planners, and leaders make decisions</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Integrating Pulse into the planning and execution of Information Operations (IO), from tactical to strategic level</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Designing and executing Population Engagement campaigns in support of customer requirements</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Assisting the customer in defining and assessing Measures of Effectiveness (MOE)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Working as part of a distributed team to improve Pulse utilization in support of Marine Corps customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Responding to customer requirements in a timely manner, particularly during crisis operations</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Promoting Two Six Technologies’ products and services to the customer </span></li>
</ul>
<p> </p>
<p><span style="font-weight: 400;">Minimum Qualifications:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">5 years of experience in data analysis or intelligence analysis </span></li>
<li style="font-weight: 400;">At least one year experience with the tools and techniques employed in the fields listed above (examples: Kibana, R, Gephi, etc.)</li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor's Degree or equivalent work experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Superior oral and written communication skills</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience presenting information and assessments to senior military officers and/or their civilian equivalents </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Willingness to learn and utilize new technology and tools</span></li>
</ul>
<p> </p>
<p><span style="font-weight: 400;">Nice If You Have: </span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience supporting Information Operations, Psychological Operations, MISO, Civil Affairs, or other Information-Related Capabilities </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience providing training in both remote and in-person settings</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience conducting task management for cross-functional teams. Examples include task tracking systems for teams, structuring internal and customer facing meetings, defining internal and customer facing meeting inputs and outputs </span></li>
</ul>
<p> </p>
<p><span style="font-weight: 400;">Clearance Requirements:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active TS/SCI Clearance</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Principal Design Verification Engineer |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p><span style="color: #7e8c8d;">Job ID: 163</span></p>
<p><strong>Two Six Technologies</strong> is looking for a <strong>Principal Design Verification Engineer</strong> to join our team. If you have a desire to perform cutting-edge research and development on embedded devices for novel security applications, let’s talk!</p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li>Maturing proof-of-concept R&D technology to operational fieldable solutions</li>
<li>Simulating complex RTL designs using advanced verification techniques</li>
<li>Build test automation using Gitlab to leverage range deployments and solution evaluation</li>
<li>Working hand-in-hand with the hardware and software development teams to identify testing needs</li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li>Active Secret security clearance at a minimum</li>
<li>A bachelor’s degree in Computer/Electrical Engineering, Computer Science, or related technical field.</li>
<li>Minimum 5 years’ experience simulating RTL designs using advanced verification techniques such as UVM/OVM.</li>
<li>Minimum 5 years’ experience using industry standard EDA development tools</li>
<li>Minimum 5 years’ experience scripting languages such as Python, Bash, and TCL.</li>
<li>Ability to work on-site at Arlington, VA headquarters</li>
</ul>
<p><strong>Nice to haves:</strong></p>
<ul>
<li>Graduate degree in Computer/Electrical Engineering, Computer Science, or related technical field.</li>
<li>RTL development experience with VHDL/Systemverilog/Verilog</li>
<li>Driver development experience</li>
<li>Experience with CI/CD pipelines and virtual machine test ranges</li>
</ul>
<p><strong>Clearance/Citizenship:</strong></p>
<ul>
<li>Eligibility for a Top Secret clearance required</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Principal Mobile Software Engineer - Java |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p><span style="font-weight: 400;">We are seeking a <strong>Principal</strong> <strong>Software Engineer with Java</strong> experience to research and develop next-generation technologies for mobile operating systems. The ideal candidate will have an interest in research as well as a commitment to developing solutions for the real world. You will join a small, supportive team that values cooperation and creative spirit. </span></p>
<p><span style="font-weight: 400;">This is a hybrid role, mostly working remote and going into our Arlington, VA office as needed.</span></p>
<p><strong>What you will do:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Actively participate in the design, build, test, and implementation phases of research programs focused on advancing technology in the areas of security, stealth, and privacy in mobile platforms</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Become intimately familiar with all aspects of what goes on inside of today's smartphones, including the hardware, kernel, drivers, firmware, framework, and apps</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop the ability to identify security and privacy risks of various apps, systems, and architectures</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Design and develop custom software solutions for both prototype and production-level systems on mobile phones and other resource-constrained platforms, e.g., single-board computers</span></li>
</ul>
<p><strong>What you will need:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A four-year degree in CS, EE, or related on the job experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">10+ years of professional or academic software development experience with Java</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with standard Linux Software engineering tools, e.g. git, gcc, make</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to obtain and maintain a government clearance</span></li>
</ul>
<p><strong>What we would like</strong><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience building or modifying Android or other mobile operating systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with network stack development</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Linux kernel namespaces</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with cloud architectures </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with wireless (NFC/Bluetooth/802.11/LTE) protocols and hardware</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing or modifying Internet-of-Things (IOT) devices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with ARM assembly language</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing security solutions and products</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience interfacing and managing an end user community </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active DoD clearance (Secret or above) </span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Principal Vulnerability Researcher |
Dayton, Ohio |
View Details |
TSE - Embedded Vulnerability Solutions |
<p><strong>Two Six Technologies</strong><span style="font-weight: 400;"> is seeking a </span><strong>Principal Vulnerability Researcher </strong><span style="font-weight: 400;">to support our programs at our Dayton, Ohio facility</span><strong>. </strong><span style="font-weight: 400;">This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.</span></p>
<p><span style="font-weight: 400;">You will be the key player in a small fast paced team, owning your own projects and developing client relationships. Leading the technical/functional planning and execution of highly visible project(s)including staffing, scheduling, and deliverables. You will have numerous opportunities to define your work.</span></p>
<p><strong>Job Responsibilities & Duties:</strong></p>
<p><span style="font-weight: 400;">Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.</span></p>
<p><span style="font-weight: 400;">You should be comfortable taking on complex technical problems for which there is often no known answer. You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact. You will possess a demonstrated track record of success in inspiring creativity and resourcefulness to a wide range of difficult problems with thorough solutions. Provides technical/functional mentorship, guidance and expertise to project, program and functional staff.</span></p>
<p><strong>Qualifications & Skills- Required:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum 9 years of experience firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong familiarity with cybersecurity principles and a strong interest in providing guidance to program staff</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum 5 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja) </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active US Security clearance of Secret level and ability to obtain and maintain TS. </span></li>
</ul>
<p><strong>Nice to have, but not expected:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience creating intellectual capital, white papers, blogs, etc. to maintain existing and expand new business.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with Binary Ninja API or Ghidra scripting</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity building or securing embedded devices and other digital systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with basic cryptography design and implementation concepts</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Previous experience in a client-facing technical role</span></li>
</ul>
<p> </p>
<p>#LI-ZS1</p>
<p>#LI-ONSITE</p>
<p> </p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Principal Vulnerability Researcher |
Arlington, Virginia |
View Details |
TSE - Embedded Vulnerability Solutions |
<p><strong>Two Six Technologies</strong><span style="font-weight: 400;"> is seeking a </span><strong>Principal Vulnerability Researcher </strong><span style="font-weight: 400;">to support our programs at our Arlington, Virginia headquarters</span><strong>. </strong><span style="font-weight: 400;">This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.</span></p>
<p><span style="font-weight: 400;">You will be the key player in a small fast paced team, owning your own projects and developing client relationships. Leading the technical/functional planning and execution of highly visible project(s)including staffing, scheduling, and deliverables. You will have numerous opportunities to define your work.</span></p>
<p><strong>Job Responsibilities & Duties:</strong></p>
<p><span style="font-weight: 400;">Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.</span></p>
<p><span style="font-weight: 400;">You should be comfortable taking on complex technical problems for which there is often no known answer. You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact. You will possess a demonstrated track record of success in inspiring creativity and resourcefulness to a wide range of difficult problems with thorough solutions. Provides technical/functional mentorship, guidance and expertise to project, program and functional staff.</span></p>
<p><strong>Qualifications & Skills- Required:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum 9 years of experience firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong familiarity with cybersecurity principles and a strong interest in providing guidance to program staff</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum 5 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja) </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Active US Security clearance of Secret level and ability to obtain and maintain TS. </span></li>
</ul>
<p><strong>Nice to have, but not expected:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience creating intellectual capital, white papers, blogs, etc. to maintain existing and expand new business.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with Binary Ninja API or Ghidra scripting</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity building or securing embedded devices and other digital systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with basic cryptography design and implementation concepts</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Previous experience in a client-facing technical role</span></li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-ONSITE</p>
<p> </p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Project Coordinator |
Arlington, Virginia |
View Details |
TSI - DoS |
<p><span style="font-weight: 400;">We are seeking a Project Coordinator to support a U.S. Department of State office in the Bureau of Diplomatic Security. You will facilitate information flow and undertake a variety of communication and administrative support tasks. Ideally, you will come with new and effective ways to achieve results for a dynamic and high-visibility Diplomatic Security mission.</span></p>
<p><strong>What you will do:</strong></p>
<ul>
<li><span style="font-weight: 400;">Innovate and optimize intra and inter-office communications</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identify “the right person” or “the right office” to assist in moving the mission forward, and execute</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Respond to the requirements of the office director</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Maintain the schedule of the office director</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Assist in all aspects of keeping the office running efficiently</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Assist in coordinating meetings with the front office</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Coordinate onboarding of new staff</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform purchasing requests</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li><strong>Active Top Secret level clearance</strong></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated experience improving communication and processes in an administrative role</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proven experience in an administrative role</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong attention to detail</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong communication skills, both verbal and written</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Local to the DC metro area or willing to relocate</span></li>
</ul>
<p><strong>What we would like:</strong></p>
<ul>
<li><span style="font-weight: 400;">Knowledge of Department of State information systems</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Project Integrator ( Scrum Master) |
Chantilly, Virginia |
View Details |
TCI |
<p>Trusted Concepts, a division of Two Six Technologies is seeking a <strong>Project Integrator (Scrum Master).</strong> This position is responsible for leading and managing the delivery of mission critical software products. The individual will work closely with a versatile software engineering team within an Agile Development environment to prioritize customer requirements, define Sprint goals, and refine the software backlog. This role also coordinates with DevOps, Security, and Program Management to ensure team alignment on key initiatives and manage dependencies between groups. The Scrum Master will need to be experienced in briefing and conveying technical information to Customer leadership and stakeholders. An ideal candidate will also have experience interfacing directly with end users to elicit new ideas and innovations that can be built into future software deliveries. The ideal candidate should have a strong understanding of the critical role a Scrum Master plays in delivering value to end users and be well versed in the Agile principles, including being a leader for the Agile team.</p>
<p> </p>
<p>Clearance: Active TS/SCI with Polygraph</p>
<p> </p>
<p>Key Responsibilities:</p>
<ul>
<li>Defines Sprint goals based on customer priorities, team input, and security requirements.</li>
<li>Develops product roadmap to plan major feature deliveries and releases.</li>
<li>Maintains Sprint cadence and ensures the ability to Release on Demand</li>
<li>Effectively facilitate Daily Standups, Sprint Planning, Backlog Refinement, Sprint Demos/Reviews and retrospectives</li>
<li>Generate and monitor team metrics (burndown, burnup, velocity, lead time, predictability) and assess the information to improve bottlenecks and remove impediments.</li>
<li>Provides technical guidance to enable team members to move past roadblocks and issues.</li>
<li>Collaborates regularly with a variety of customers and teammates, which may include meeting coordination and preparation, support of project plans, and status (e.g., PMR) briefings</li>
<li>Attends customer meetings and may serve as primary liaison.</li>
</ul>
<p> </p>
<p>Required Qualifications:</p>
<ul>
<li>Agile Certification (e.g., Certified Scrum Master)</li>
<li>Demonstrated experience working within a technical environment orchestrating software development projects.</li>
<li>Ability to drive Code Coverage, Code Quality, Git Versioning, Code Reviews, and other Development best practices.</li>
<li>Demonstrated on-the-job experience with Jira Software and Confluence for planning and tracking projects.</li>
<li>Demonstrated on-the-job experience effectively communicating across programs and with customers, stakeholders, and other contractors.</li>
<li>Demonstrated on-the-job experience sharing knowledge and learning from others to ensure the team’s success.</li>
<li>Demonstrated on-the-job experience managing priorities across multiple projects (time management)</li>
<li>3+ Years of experience applying Agile/Scrum/SAFe/Kanban methodologies and leading teams as a<br>full-time Scrum Master (Required)</li>
</ul>
<p> </p>
<p>Bonus Points:</p>
<ul>
<li>Technical background in software development (Java, Python, Git, Kubernetes, Microservice Architecture, Cloud Environments)</li>
<li>Experience with applying test automation, continuous integration, and continuous deployment to achieve built-in quality and release on demand</li>
<li>Experience with developing software solutions that adhere to security controls such as NIST 800-53</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Research Engineer – Data and Systems Privacy |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p><strong>Two Six Technologies </strong>is seeking a <strong> Research Engineer– Data and Systems Privacy </strong>to research and develop advanced mobile privacy systems and solutions. We are seeking candidates with an interest in research as well as a commitment to developing solutions for the real world.</p>
<p><strong>Responsibilities</strong></p>
<ul>
<li>Join a small supportive team that values cooperation and creative spirit</li>
<li>Design and develop methods to enhance and preserve the privacy of smartphone users</li>
<li>Collaborate with partners and customers to understand, tailor, and deliver software that meets their requirements</li>
<li>Develop the ability to identify and remedy privacy and security risks of various apps, systems, and architectures</li>
</ul>
<p><strong>Qualifications</strong></p>
<ul>
<li>A bachelor’s or advanced degree (Masters or PhD) in Computer Science, Computer/Electrical Engineering, or related scientific domain</li>
<li>Strong oral and written communication skills</li>
<li>1+ years of professional experience as a researcher, engineer, or scientist</li>
<li>A foundational knowledge of object-oriented programming and software/systems engineering</li>
<li>Proficiency in Java and experience with C++, and/or Kotlin</li>
<li>Excellent analytical and problem-solving skills</li>
<li>Self-driven work ethic</li>
<li>Ability to obtain and maintain a DoD security clearance</li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li>Practical experience developing Android applications</li>
<li>Experience building and modifying the AOSP or creating Android based custom ROMs</li>
<li>Experience with Node.js, Angular</li>
<li>Familiarity with standard software engineering processes and tools (e.g., git and JIRA)</li>
<li>Familiarity with Linux shell environments and command line tools</li>
</ul>
<p><strong>Security Clearance:</strong></p>
<ul>
<li>Active TS clearance is preferred</li>
</ul>
<p> </p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Research Intern - Electronic Systems |
Arlington, Virginia |
View Details |
TSE |
<p><span style="font-weight: 400;">Our Electronic Systems team, which focuses on Forward & Reverse engineering, FPGA development, Vulnerability & Malware Research, Applied Mathematics, Formal Methods and Cryptographic Protocols, is </span><span style="font-weight: 400;">seeking </span><strong>Research Interns</strong><span style="font-weight: 400;"> to join us for Summer 2023! </span></p>
<p> </p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Participate in cutting-edge research, and be encouraged to publish results</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Build deployable and scalable systems that solve real-world problems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Be paired with a “lab buddy”, who will encourage and support your professional growth</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Present an end-of-internship project </span></li>
</ul>
<p><span style="font-weight: 400;"> </span><strong>Must have passion for or familiarity with at least ONE of the following:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Mobile and embedded system development or architecture (Android, ARM, wireless, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Large scale data processing, such as Hadoop, Spark, or Cassandra</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Program analysis, reverse engineering, vulnerability research, cryptographic protocols</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with an assembly language (x86, ARM, MIPS, PowerPC)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Fundamental understanding of networking protocols, operating systems, or kernels</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Hacking skills (memory corruption, rootkits, MetaSploit, nmap, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;"> Printed Circuit Board design principles (component selection, layout, schematic, stackup.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Dynamic signal capture of protocols such as SPI, UART, CAN, I2C, etc</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">FPGA design, verification, and synthesis. Hands-on troubleshooting and debugging with logic analyzers and other lab equipment. </span></li>
</ul>
<p><strong>Minimum Qualifications</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Pursuing a degree in CS, CPE, EE, Math, Statistics or a related field; Rising Junior or Rising Seniors highly preferred</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">US Citizenship is required due to the nature of our work</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to work onsite at our Arlington office 3-5 days a week</span></li>
</ul>
<p><span style="font-weight: 400;">This is a 10 week program, which will kick off June 5, 2023</span></p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Research Technical Director- Artificial Intelligence and Machine Learning |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p> </p>
<p><span style="font-weight: 400;">Two Six Technologies is seeking a</span><strong> Research Technical Director- Artificial Intelligence and Machine Learning</strong></p>
<p><span style="font-weight: 400;">Researching and applying cutting edge techniques for extracting Information from an ever-growing data environment is increasingly fundamental for new and emerging National Security capabilities being developed, tested, and deployed by the Department of Defense, the Intelligence Community, and other National Security organizations. Two Six Technologies is seeking an AI/ML technical leader to continue to build and deploy our capabilities to a wide range of mission partners, grow our sponsored research portfolio with DARPA and other research organizations, and cultivate our talented Data Scientists and AI/ML research team. </span></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Guide the development and deployment of novel AI/ML/Data Science methodologies, frameworks, and systems across a variety of data types, applications, and computing environments</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Advise and mentor research staff who specialize in areas such as Computer Vision (CV), Natural Language Processing (NLP), and Signal Processing</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Set Technical Direction for AI/ML/Data Science R&D project portfolio</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Supporting relationships with DARPA Program Managers and other customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Communicate methods and results to a variety of stakeholders and customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identifying new R&D opportunities </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Cultivating our AI/ML/Data Science talent team, identifying/hiring new team members and line management of key contributors</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support technical inputs for marketing of Two Six Technologies’ AI/ML/Data Science services and capabilities to new and existing Government clients</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">An advanced-year degree (Master’s or PhD) in Mathematics, Computer Science, or related technical domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Past performance as a Principal Investigator or Technical Director on fast-paced, innovation-driven, advanced technology R&D projects for Government clients</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">10 years of experience developing innovative AI/ML solutions in relevant domains</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with common machine learning pipelines, model architectures, and metrics</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Academic and/or industry publications in relevant fields</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">DoD and/or IC domain experience and knowledge</span></li>
</ul>
<p><strong>Nice to have:</strong></p>
<ul>
<li>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience as a Principal Investigator for a DARPA program</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading and mentoring research teams and researchers </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with agile software development practices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience leading teams in a rapid prototype environment demonstrating scalable architectures</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proven experience overseeing a rapidly growing portfolio of research teams</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active security clearance</span></li>
</ul>
</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Reverse Engineer & Vulnerability Researcher |
Dayton, Ohio |
View Details |
TSE - Deployable Systems |
<p><span style="color: #7e8c8d;">Job ID: 612</span></p>
<p>Two Six Technologies is seeking a Reverse Engineer & Vulnerability Researcher to support our growing team in Dayton, Ohio. You will work with a range of clients supporting both national security missions and commercial clients. You will become a trusted advisor while learning and performing valuable technical and industry skills. This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.</p>
<p>Since we are a small team, you will not be lost in the shuffle. You will be a key player in a small fast paced team, owning your own projects and developing client relationships. Working with our lead Reverse Engineers & Vulnerability Researchers, you will have access to top experts in the field with experience across a range of domains. You will have numerous opportunities to define your work.</p>
<p><strong>Job Responsibilities & Duties</strong></p>
<ul>
<li>Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.</li>
<li>You should be comfortable taking on complex technical problems for which there is often no known answer.</li>
<li>You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact.</li>
<li>While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for breaking unique complex systems.</li>
</ul>
<p><strong>Qualifications & Skills- Required:</strong></p>
<ul>
<li>Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)</li>
<li>Minimum 3 years of experience with software/firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line</li>
<li>Strong familiarity with cybersecurity principles and a strong interest in learning more</li>
<li>Minimum 3 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)</li>
<li>Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques</li>
<li>Active US Security clearance of Secret level and ability to obtain and maintain TS. </li>
</ul>
<p><br><strong>Nice to have, but not expected:</strong></p>
<ul>
<li>Familiarity with Binary Ninja API or Ghidra scripting</li>
<li>Familiarity building or securing embedded devices and other digital systems</li>
<li>Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</li>
<li>Familiarity with basic cryptography design and implementation concepts</li>
<li>Familiarity with Hardware and embedded devices</li>
<li>Experience in a client-facing technical role</li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active Secret clearance </li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-ONSITE</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Reverse Engineer & Vulnerability Researcher |
Dayton, Ohio |
View Details |
TSE - Deployable Systems |
<p><span style="color: #7e8c8d;">Job ID: 325</span></p>
<p><strong>Two Six Technologies</strong> is seeking a <strong>Vulnerability Research Engineer</strong>. You will work with a range of clients supporting both national security missions and commercial clients. You will become a trusted advisor while learning and performing valuable technical and industry skills. This role is technical at its core – along with in-depth reverse engineering and exploit development you will transition those findings into capabilities.</p>
<p>Since we are a small team, you will not be lost in the shuffle. You will be a key player in a small fast paced team, owning your own projects and developing client relationships. Working with our lead Reverse Engineer, you will have access to top experts in the field with experience across a range of domains. You will have numerous opportunities to define your work.</p>
<p><strong>Job Responsibilities & Duties</strong><br>Given the technical nature of this role, experience in computer science, computer engineering, or a similar field is required. Significant proven experience in reverse engineering (RE) or vulnerability research (VR) can show your fit even if your background is outside of one of these fields.</p>
<p>You should be comfortable taking on complex technical problems for which there is often no known answer. You should be comfortable with ambiguity and forging your own path; our small team setting will provide you opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against goals independently since there’s no playbook for breaking unique complex systems.</p>
<p><strong>Qualifications & Skills- Required:</strong></p>
<ul>
<li>Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in RE or VR may substitute for a specific degree)</li>
<li>Minimum 3 years of experience firmware development using low-level programming languages (C and at least one assembly language), scripting languages (e.g., Python), and the *nix command line</li>
<li>Strong familiarity with cybersecurity principles and a strong interest in learning more</li>
<li>Minimum 3 years of experience with common disassemblers/decompilers and reverse engineering tools (IDA, Ghidra, Binary Ninja)</li>
<li>Experience with software reverse engineering concepts: static analysis, dynamic analysis, fuzzing techniques</li>
<li>Active US Security clearance of Secret level and ability to obtain and maintain TS.</li>
</ul>
<p><strong>Nice to have, but not expected:</strong></p>
<ul>
<li>Familiarity with Binary Ninja API or Ghidra scripting</li>
<li>Familiarity building or securing embedded devices and other digital systems</li>
<li>Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</li>
<li>Familiarity with basic cryptography design and implementation concepts</li>
<li>Experience in a client-facing technical role</li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active Secret clearance </li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Security Researcher |
Arlington, Virginia |
View Details |
TSE - Embedded Vulnerability Solutions |
<p><span style="color: #7e8c8d;">Job ID: 611</span></p>
<p>Two Six Technologies is looking for a <strong>Security Researcher</strong> to join our Electronic Systems team. You will work with a range of clients from the US Defense Advanced Research Projects Agency (DARPA) to the country’s largest ISPs to innovative tech startups. You will become a trusted advisor while learning and performing valuable technical and industry skills.</p>
<p><strong>Job Responsibilities & Duties</strong></p>
<ul>
<li>Take on complex technical problems for which there is often no known answer.</li>
<li>Deconstruct and understand complex technical systems; perform in-depth reverse engineering to find vulnerabilities and understand their impact.</li>
<li>Comfort with ambiguity and forging your own path; our small team setting will provide you the opportunity for outsized impact. While you will receive extensive training, mentorship, and coaching, you must be comfortable executing against challenging technical goals since there’s no playbook for our innovative work.</li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li>Bachelor’s (or higher) degree in computer science, engineering, or a related field (solid knowledge in data structures and algorithms may substitute for a specific degree)</li>
<li>Minimum of 3 years of programming/scripting languages (e.g., Go, C, Rust, Python, or similar) and the *nix command line</li>
<li>Familiarity with reverse engineering principles and disassemblers (e.g., Binary Ninja, Ghidra, IDA)</li>
<li>Minimum of 1 year of experience utilizing cybersecurity principles and a strong interest in learning more</li>
<li>Ability to obtain and maintain a government security clearance</li>
</ul>
<p><br><strong>Nice if you have:</strong></p>
<ul>
<li>Familiarity with Binary Ninja API, Ghidra scripting, or IDA Python</li>
<li>Familiarity building or securing embedded devices and other hardware or digital systems</li>
<li>Exposure to static analysis, software reverse engineering, dynamic analysis, fuzzing techniques</li>
<li>Familiarity with embedded binary reverse engineering (ARM, RTOS, etc.)</li>
<li>Familiar with a soldering iron</li>
<li>Experience in a client-facing technical role</li>
<li>Government Security Clearance</li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Eligibility for Security clearance</li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-Onsite</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Embedded Software Engineer |
Arlington, Virginia |
View Details |
TSE - Deployable Systems |
<p><span style="font-weight: 400;">Two Six Technologies is looking for an Embedded Software Engineer to join our team. If you have a desire to join a team of cutting-edge researchers and developers on embedded devices for security applications, let’s talk!</span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Maturing proof-of-concept R&D technology to operational fieldable solutions</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Build test automation using Gitlab to leverage range deployments and solution evaluation</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Developing APIs and other interfaces bridging the software/hardware technology overlap</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Support of scalable and modular design methodology</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Engaging in technical exchanges with transition partners and key stakeholders</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s degree in Computer Science, Computer/Electrical Engineering, or related Scientific Domain</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience with one or more of the following modern development languages: Python, C , C++, Embedded C,</span><span style="font-weight: 400;"> using an agile software development process</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 2 years experience with Operating Systems internals (privilege and user groups, binary memory layout)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Secret clearance</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to work on-site at Arlington, VA headquarters</span></li>
</ul>
<p><strong>Nice to haves:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Basic understanding of memory management concepts (Heap, Stack, Virtual Memory, MMU, Physical vs. Virtual)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with testing, CI/CD pipelines, and virtual machine test ranges</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with firmware/driver development across Linux and Windows OS’es</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with reverse engineering x86/ARM binaries, embedded systems, or malware</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Top Secret SCI and/or CI/FSP Poly</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Graduate degree in Computer Science, Computer/Electrical Engineering, or related Scientific Domain</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Human Resources Business Partner |
Arlington, Virginia |
View Details |
Human Resources |
<p><span style="font-weight: 400;">At Two Six Technologies, we are hiring a </span><strong>Senior Human Resource Business Partner</strong><span style="font-weight: 400;"> to join our growing team. You will support one of our larger teams and various corporate initiates using a consultative and proactive approach. </span></p>
<p><span style="font-weight: 400;">This is a hybrid role working out of our Northern Virginia offices. </span></p>
<p><strong>What you will do: </strong></p>
<ul>
<li><span style="font-weight: 400;"> Collaborate with the Human Resources Director and leadership team to make certain all HR programs support the business initiatives. </span><span style="font-weight: 400;">Some of the upcoming HR initiatives include: </span></li>
</ul>
<p style="padding-left: 40px;"><span style="font-weight: 400;">○ Compensation and salary bands to align with our new career tracks </span></p>
<p style="padding-left: 40px;"><span style="font-weight: 400;">○ Manager training </span></p>
<p style="padding-left: 40px;"><span style="font-weight: 400;">○ Creating and updating policies and procedures </span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identify and monitor legal requirements and government reporting regulations to ensure appropriate guidance of the policies, procedures, and actions needed </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide Human Resource expertise in the areas of: </span></li>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Benefits Administration </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Coaching </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Training and development </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Performance Management and Employee Relations </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Company policy </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Compliance (i.e. annual report filings of EEO-1, VETS 4212 and ACA) </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Compensation </span></li>
</ul>
</ul>
<p><strong>What you will need: </strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor’s degree in Human Resources, Business Administration, or a related field or equivalent work experience </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">10+ years of Human Resource Business Partner experience with an emphasis on consultative HR service delivery</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years of experience with MS Office and/or Google suite </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong formal presentation/facilitation skills </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in leading, mentoring, and training </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">US Citizenship is required, due to security requirements</span></li>
</ul>
<p><strong>Nice if you have:</strong></p>
<ul>
<li>Experience with Paycom</li>
<li>Government Security Clearance</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Manager, Global Operations & Resources |
Arlington, Virginia |
View Details |
TSI |
<p>Are you experienced in managing a global network of human and technology resources?</p>
<p>Are you passionate about using vetted methodologies and operational best practices to create information advantage for the U.S. and its allies in the global information environment?</p>
<p>Do you enjoy solving complex problems by combining excellent people with best-in-class technology?</p>
<p>Then we’d like to talk to you.</p>
<p><strong>About Two Six Technologies</strong></p>
<p>Two Six Technologies uses vetted methodologies and cutting-edge technology to deliver real results to customers. We are operational, not aspirational. We built the Pulse Platform to address some of the most urgent human security issues faced by the world’s most vulnerable populations. Our Pulse platform is used to interact with populations around the world to provide insight into their thinking and engage them in two-way conversations. Pulse also provides access to publicly available information across the surface, deep and dark web, and social media to provide a robust view of the Information Environment, including measuring attempts to manipulate the environment. Our product suite enables our customers to move from data to insight to action to assessment.</p>
<p><strong>Position Details</strong></p>
<p>The Senior Manager, Global Operations and Resources will manage a global network of consultants. This position is a hybrid position requiring both onsite and remote work. Additionally, this position requires approximately 20% CONUS and OCONUS travel. </p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li>Managing and growing a global network of consultants in a remote environment.</li>
<li>Establishing, managing, and using a secure task tracking system for consultant operations and management.</li>
<li>Gaining access to and securely purchasing technology in challenging or difficult to access environments.</li>
<li>Establishing and using operational security tradecraft, techniques, and procedures in all facets of execution, to include communications and financial transactions to reduce risk and protect employees, high-value assets and programs operating in tactical environments</li>
<li>Developing, documenting, and implementing a system for vetting overseas consultants and assessing associated risks.</li>
<li>Developing, documenting, and implementing Standard Operating Procedures as well as contingency and crisis plans.</li>
<li>Advising operations and program leadership with clear security guidance and recommended modifications to operations policies or procedures, as necessary, to reduce risk and protect employees, high-valued assets and programs operating in tactical environments.</li>
<li>Developing, documenting, and implementing training procedures and curriculum for TST personnel and global consultants.</li>
<li>Working side-by-side with customer-facing teammates to understand and support customer requirements.</li>
<li>Provide CI technical expertise to support vulnerability mitigation efforts.</li>
<li>Managing budgets within an established target and forecast requirements.</li>
<li>Assisting in the generation, review, and management of vendor agreements, MOUs, and contracts for both consultants and overseas procurements.</li>
<li>Conduct in-depth analysis of intelligence, identify technical and/or operational gaps, and develop solutions to complex problems.</li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li>Four years’ experience in managing a network of personnel in a distributed and remote environment.</li>
<li>Four years of operational experience in the Department of Defense and/or Intelligence Community to include conducting assessments of personnel and risks.</li>
<li>Bachelor's Degree or equivalent work experience.</li>
<li>Superior oral and written communication skills.</li>
<li>Experience presenting information and assessments to senior personnel.</li>
<li>Sensitivity to working in a culturally diverse organization and regions.</li>
<li>Willingness to learn and utilize new technology and tools.</li>
</ul>
<p><strong>Nice If You Have: </strong></p>
<ul>
<li>Experience using crypto currencies or other mis-attributable payment mechanisms</li>
</ul>
<p><strong>Clearance/Citizenship:</strong></p>
<ul>
<li>Active TS/SCI Clearance with CI Poly</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Mobile Exploit Developer |
Lorton, Virginia |
View Details |
TSE - Mobile Systems |
<p>Two Six Technologies is seeking a <strong>Senior Mobile Exploit Developer. </strong>The role is focused on managing the software development lifecycle of exploits for operating systems, applications, and firmware on Android and iOS mobile devices. You will join an experienced team of vulnerability researchers, reverse engineers, and exploit developers working together to solve challenging problems.</p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li>Serve as a CNE capability developer on a small, highly motivated team</li>
<li>Perform software development in an agile environment.</li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li>BS Degree in Computer Science or related technical areas</li>
<li>Experience in CNO/CNE capability development on mobile platforms (iOS, Android) or their desktop analogs (macOS, Linux)</li>
<li>Minimum of 5 years of programming experience in a variety of programming languages, such as Python, C, C++, Java, Kotlin, and Objective-C</li>
<li>Experience in understanding at least one Assembly language, such as x86/64 or ARM/64</li>
<li>Comfortable with performing testing and releases in an environment using CI/CD methodologies.</li>
<li>Familiarity writing or modifying exploit payloads such as shellcode and ROP</li>
<li>Experience tracing code execution in a debugger (lldb/gdb)</li>
<li>Top Secret Clearance</li>
</ul>
<p><strong>Nice to haves:</strong></p>
<ul>
<li>Familiarity with scripting reverse engineering tasks with reverse engineering tools, such as IDA Pro</li>
<li>Experience in a client-facing technical role</li>
</ul>
<p><span style="font-weight: 400;"><strong>Clearance: </strong>Top Secret </span></p>
<p>#LI-ZS1</p>
<p>#LI-Hybrid</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Mobile Reverse Engineer |
Arlington, Virginia |
View Details |
TSE - Mobile Systems |
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Senior</strong><span style="font-weight: 400;"> </span><strong>Mobile Reverse Engineer</strong><span style="font-weight: 400;"> to join projects on our </span><strong>Mobile Systems</strong><span style="font-weight: 400;"> team.</span><strong> </strong><span style="font-weight: 400;">The role is focused on the reverse engineering iOS and Android applications on mobile devices within a team of developers, research scientists, and reverse engineers.</span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Developing, debugging, and reverse engineering code mobile Applications implemented in popular mobile programming languages (i.e., Java, Objective-C, Swift, C, C++, etc.)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Using open source and commercial software reverse engineering tools to determine how an application works and processes data</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Leveraging dynamic analysis tooling to instrument mobile applications</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Documenting and presenting research findings in useful and accessible ways for team members and customers</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Interested in cybersecurity and passionate about learning new things, taking things apart, and getting stuck into new problems and challenges.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience conducting application or network security assessments, security research, reverse engineering, or mobile development.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience using disassemblers/decompilers and reverse engineering tools, such as IDA Pro, JEB, Ghidra, Hopper, or Binary Ninja</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in modern scripting languages such as Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years of experience writing programs in a variety of programming languages, such as Java, Objective-C, Swift, C, C++</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in understanding at least one Assembly language, such as x86/64, ARM/64, and MIPS</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Solid understanding of TCP/UDP ports and protocols and web requests including POST, GET, HTTP headers, user agents, request parameters, cookies, etc.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">BS Degree in Computer Science or related technical areas</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to hold or obtain a Top Secret clearance</span></li>
</ul>
<p><strong>Nice If You Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with rooting or jailbreaking mobile devices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience using Frida or other hooking frameworks to trace and modify code execution</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with scripting reverse engineering tasks with reverse engineering tools, such as IDA Pro</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity or experience in vulnerability research and exploit development on mobile platforms (iOS, Android) or their desktop analogs (macOS, Linux)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with methods to bypass anti-tampering, exploit mitigations, and exploit detection techniques</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with basic cryptography design and implementation concepts</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in using intercepting proxies to interrogate or modify application traffic</span></li>
</ul>
<p><strong>Clearance/Citizenship:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI preferred </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">US Citizenship is required</span></li>
</ul>
<p>#LI-ZS1</p>
<p>#LI-HYBRID</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Software Developer |
Fair Oaks, Virginia |
View Details |
TCI - Space |
<p>Trusted Concepts, a division of Two Six Technologies is looking for a Senior level Developer who will partner with our Program Manager and Technical Lead to outline technical design and delivery of a key custom application capability vital to our customer’s mission set. Together you will work to ensure sound technical approaches are considered and make strategic recommendations on technical architecture decision points. You will also help ensure the program is successfully delivering using sound DevOps, AGILE, and Agency-specific practices.</p>
<p><strong> </strong></p>
<p><strong>Clearance : Active TS/SCI willing to obtain a Polygraph</strong></p>
<p> </p>
<p>Day In & Day Out Duties:</p>
<ul>
<li>Handle software modeling of existing hardware interfaces</li>
<li>Ability to build libraries for third parties to interact with and leverage.</li>
<li>Ability to run to ground end to end issues, especially with multiple integrations.</li>
<li>Assist in the development of new capabilities.</li>
</ul>
<p>Keys for Success:</p>
<ul>
<li>5+ years of Java development experience</li>
<li>3+ years of Spring Boot experience</li>
<li>5+ years of unit testing experience</li>
<li>2+ years of leveraging Java Streams</li>
</ul>
<p> </p>
<p>Bonus Points:</p>
<ul>
<li>Knowledge of atomic usage within multi-threaded systems</li>
<li>Experience with Apache Ignite/Ehcache, or similar data grid technologies or atomic key-value based caching</li>
<li>Knowledge of AWS EC2/Lambda and other various technologies </li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Software Engineer |
Fair Oaks, Virginia |
View Details |
TCI - Space |
<p>Trusted Concepts, a division of Two Six Technologies is looking for a junior-level developer who will work on the Automated Constellation Scheduler. This is a complex heuristics-based application that leverages a lot of data structures and algorithms most never get to use in normal application development. Must be comfortable thinking outside of the box, and willing to learn new things. Must also be willing to support customer changes in a Kanban environment.</p>
<p>Clearance: TS/SCI with the ability to obtain a Polygraph</p>
<p>Primary Responsibilities:<br>● Willingness to code in Java, acceptable if the developer has no prior experience<br>● Building new features and capabilities on the Automated Constellation Scheduler.<br>● Working on taking user inputted data, and have the scheduler interpret it correctly and lay it down<br>on a timeline<br>● Ability to add unit tests to newly added code to the system</p>
<p>Keys for Success:<br>● 1 year of experience writing in Java/C/C++/Python/other<br>● 1 year of experience with various data structures and their intended usage<br>● 1 year of experience within agile methodologies</p>
<p>Bonus Points:<br>● Knowledge of multi-threaded data structures<br>● Knowledge of unit test, integration testing, and end-to-end testing<br>● Knowledge of web development (frameworks like Angular/React, etc)</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Software Reverse Engineer & Vulnerability Researcher |
Lorton, Virginia |
View Details |
TSE - Mobile Systems |
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Senior</strong><span style="font-weight: 400;"> </span><strong>Software Reverse Engineer and Vulnerability Researcher. </strong><span style="font-weight: 400;">The role is focused on the exploitation of firmware, applications, and hardware on mobile devices within a team of developers, reverse engineers, and exploitation specialists</span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identifying vulnerabilities using both static and dynamic analysis techniques.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Developing proof of concept exploits for identified vulnerabilities.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Documenting and presenting research findings in useful and accessible ways for team members and customers.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Leveraging software and hardware exploitation to enable access to protected information.</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">BS Degree in Computer Science or related technical areas</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in the fields of offensive security, exploit development, reverse engineering, or vulnerability research</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Interested in cybersecurity and passionate about learning new things, taking things apart, and getting stuck into new problems and challenges.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Understanding of how operating systems function, such as the separation between kernel and userspace.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in modern scripting languages such as Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years of experience writing programs in a variety of programming languages, such as C, C++, and Objective C</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in understanding at least one Assembly language, such as x86/64, ARM/64, and MIPS</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience using disassemblers/decompilers and reverse engineering tools, such as IDA Pro, Ghidra, Hopper, or Binary Ninja</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Top Secret Clearance </span></li>
</ul>
<p><strong>Nice If You Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with scripting reverse engineering tasks with reverse engineering tools, such as IDA Pro</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in vulnerability research and exploit development on mobile platforms (iOS, Android) or their desktop analogs (macOS, Linux)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with methods to bypass exploit mitigations and detection techniques</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with basic cryptography design and implementation concepts</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with creating and maintaining automated fuzzing solutions.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Expertise in analyzing crash reports for debugging or identifying vulnerabilities.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in a client-facing technical role</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Subcontracts Administrator - hybrid |
Arlington, Virginia |
View Details |
Corporate |
<p><strong>Two Six Technologies</strong> is seeking an experienced <strong>Subcontracts Administrator</strong> who will thrive in a dynamic, agile organization. We are a high-growth organization with unique expertise and innovative products that support missions critical to U.S. national security. You will work closely with Management, Project Leadership, and Finance. This role will provide on-site support to our team 3 days per week in Arlington, Virginia.</p>
<p><strong>What you will do:</strong></p>
<ul>
<li>Cradle to grave contract and subcontract management associated with the business unit’s portfolio of contracts</li>
<li>Identifying and mitigating risk, successfully negotiating favorable terms and pricing, and making recommendations to management</li>
<li>Utilizing your thorough knowledge of government and commercial contracting and procurement regulations to ensure the flow down of appropriate clauses and compliance with contract specifications and applicable laws</li>
<li>Tracking and reporting on the status of contract requirements and deliverables, as well as compliance reporting</li>
<li>Communication between internal and external stakeholders</li>
<li>Negotiate and maintain subcontracts to include receiving subcontractor projections and providing incremental funding per policies and procedures</li>
<li>Prepare and submit monthly reports to the Government as required</li>
<li>Participate in the preparation of solicitation documentation, proposal review, and negotiation</li>
</ul>
<p><strong>What you will need:</strong></p>
<ul>
<li>Bachelor's degree or equal relevant experience and professional training</li>
<li>5+ years of professional experience in a subcontracts/procurement management role</li>
<li>Thorough knowledge of FAR, DFARS, relevant contract laws and regulations, and DCAA/DCMA compliance</li>
<li>Advanced experience level ability with MS Office (particularly Excel)</li>
<li><strong>Active Top Secret clearance with ability to obtain SCI</strong></li>
</ul>
<p><strong>Nice If You Have: </strong></p>
<ul>
<li>Experience supporting R&D programs</li>
<li>CFCM Certification</li>
<li>Experience with CAS</li>
<li>Experience with Unanet</li>
<li>TS/SCI</li>
</ul>
<p><span style="font-weight: 400;">#LI-KS1</span></p>
<p>#LI-Hybrid</p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Senior Technical Writer - hybrid |
Arlington, Virginia |
View Details |
Corporate |
<p><span style="font-weight: 400;">Do you possess a TS/SCI and have a passion for working on highly technical research and development writing projects? If so, Two Six Technologies would love to speak with you! </span></p>
<p><span style="font-weight: 400;">Our team is growing and looking for a Technical Writer with an understanding on how to create compelling proposal content for cutting-edge research and mission systems integration, ideally for defense and intelligence community opportunities. In this role, you can expect to stretch your writing and editing skills as you broaden your knowledge of multiple technologies critical to domestic and international security.</span></p>
<p><strong>What you will do:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Produce easily-digestible technical documentation by gathering information from several stakeholders including analysts, engineers, scientists, and program managers.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Understand the technical specifications, proposed technical solution, and articulate the solution components via development of a comprehensive technical documentation that meets organizational standards.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform complex tasks involving the gathering, analyzing and compiling of data and information into well-written reports and presentations.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Manage numerous projects with tight deadlines and be a creative self-starter.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Proven ability to translate complex technical requirements and concepts into plain English reports and presentations.</span></li>
</ul>
<p><strong>What you will need:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Bachelor's degree in Computer Science, Information Systems, Engineering, Business, or a related discipline</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">5+ years of technical writing experience preparing documents, reports, responses, Contract Data Requirements Lists (CDRLs), and briefings targeted to a wide range of audiences</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">3+ years of proposal writing experience with emphasis on technical products and services related to software engineering, embedded systems, cybersecurity, and hardware reverse engineering or other complex systems/services for US Government and international customers</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">3+ years experience using Microsoft Office (including Project and Visio) or Google Suite</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to work on-site at our Arlington, VA Headquarters</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI with the ability to obtain Poly</span></li>
</ul>
<p><strong>Nice if you have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Capability Maturity Model Integration (CMMI) Maturity Level 3 best practices experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">TS/SCI with Polygraph</span></li>
</ul>
<p> </p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Skillbridge Internship |
Fort Bragg, North Carolina |
View Details |
TSI |
<div class="p-rich_text_section"><span style="color: #7e8c8d;">Job ID: 312</span></div>
<div class="p-rich_text_section">As a SkillBridge fellow at Two Six Technologies we give an opportunity to transitioning members of the US Military to utilize skills developed in active-duty service. We offer a wide range of projects and would love to speak further to see if we'd be the right fit to help with your transition! </div>
<div class="p-rich_text_section"> </div>
<div class="p-rich_text_section">Under the framework of the Department of Defense SkillBridge Program, Two Six Technologies hosts active duty US military members for skilled employment training for up to the final 6 months of active duty obligated service. Any rank, enlisted or officer, may apply for SkillBridge. SkillBridge participants are not eligible for compensation from Two Six Technologies, as they continue to receive military compensation and benefits as active-duty service members. Your unit Commander must authorize participation prior to start of internship.</div>
<div class="p-rich_text_section"> </div>
<p><strong data-stringify-type="bold">Career tracks available:</strong></p>
<ul>
<li>Technology integration in support of information operations, psychological operations, civil affairs, intelligence, special operations, and cyber</li>
<li>Cyber Mission Force</li>
<li>Space Operations </li>
<li>Technical Development: Data Science, Machine Learning, Programming</li>
</ul>
<p><strong data-stringify-type="bold">Eligibility:</strong> </p>
<ul class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="false" data-border-radius-top-cap="false" data-border-radius-bottom-cap="false">
<li data-stringify-indent="0" data-stringify-border="0">Has served at least 180 days on active duty</li>
<li data-stringify-indent="0" data-stringify-border="0">Is within 180 days of separation or retirement</li>
<li data-stringify-indent="0" data-stringify-border="0">Will receive an honorable discharge</li>
<li data-stringify-indent="0" data-stringify-border="0">Has taken any service TAPS/TGPS</li>
<li data-stringify-indent="0" data-stringify-border="0">Has attended or participated in an ethics brief within the last 12 months</li>
<li data-stringify-indent="0" data-stringify-border="0">Received Unit Commander approval to participate in DoD</li>
</ul>
<p><strong>Clearance Requirements:</strong></p>
<ul>
<li>Active Secret clearance </li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Software Developer |
Herndon, Virginia |
View Details |
TCI - O-Cyber |
<p>Trusted Concepts, A Division of Two Six Technologies is looking for Software Developers interested in working on our Cyber programs. These programs consist of mission driven development with direct feedback from stakeholders. Each task order is affiliated with a specific mission need, not contributing to shelfware. New opportunities are always coming available and each applicant will be considered on a continuing basis. Positions are available in Chantilly, VA, Herndon, VA, and Arlington, VA. </p>
<p><strong>Clearance Required: Active TS/SCI, willingness to obtain a Polygraph</strong></p>
<p>Keys for Success:</p>
<ul>
<li>Programming Languages – C/C++ and/or Python </li>
<li>Operating Systems – Windows and Linux user and/or kernel space development</li>
<li>Software Version Control - Experience using Git </li>
</ul>
<p>Bonus points if you have experience in:</p>
<ul>
<li>Software reverse engineering – IDA Pro, Ghidra, disassembly tools</li>
<li>Networking – networking stack, TCP and UDP protocols</li>
<li>Cryptography – TLS, PKCS</li>
<li>Debugging – GDB, WinDbg, OllyDbg, Valgrind, Visual Studio</li>
<li>Embedded - familiarity with any RTOS and embedded systems</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Software Engineer |
Arlington, Virginia |
View Details |
TSC - Kolo |
<p><span style="font-weight: 400;">Two Six Technologies is looking to add an experienced Software Engineer to support IKE, a cyber command and control platform. The ideal candidate is someone who is enthusiastic and interested in Artificial Intelligence/Machine Learning. </span></p>
<p><strong>Job Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop & maintain custom software solutions</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Migrate legacy python code to a modern framework</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Work alongside senior developers to enhance and implement new features</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Participate in code reviews and internal agile scrums </span></li>
</ul>
<p><strong>Minimum Qualifications: </strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience coding in Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 3 years of experience with version control tools, ideally Git</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">US Citizenship</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Local to Arlington, VA and willing to be onsite 2-4 days a week</span></li>
</ul>
<p><strong>Nice if you have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with Agile methodologies</span></li>
</ul>
<p><strong>Citizen/Clearance:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">US citizenship and the ability to obtain and maintain a government security clearance are required. </span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Software Engineer - Mobile & Embedded Systems - Hybrid |
Arlington, Virginia |
View Details |
TSC - Cyber & Data Science |
<p>We are seeking a Software Engineer to research and develop next-generation technologies for mobile operating systems that have an interest in research as well as a commitment to developing solutions for the real world. You will join a small, supportive team that values cooperation and creative spirit. </p>
<p>This is a hybrid role, mostly working remote and going into our Arlington, VA office as needed.</p>
<p><strong>What you will do:</strong></p>
<ul>
<li class="c-mrkdwn__pre" data-stringify-type="pre">Actively participate in the design, build, test, and implementation phases of research programs focused on advancing security and privacy in mobile platforms</li>
<li class="c-mrkdwn__pre" data-stringify-type="pre">Become intimately familiar with all aspects of what goes on inside of today's smartphones, including the hardware, kernel, drivers, firmware, framework, and apps</li>
<li class="c-mrkdwn__pre" data-stringify-type="pre">Develop the ability to identify privacy and security risks of various apps, systems, and architectures</li>
<li class="c-mrkdwn__pre" data-stringify-type="pre">Design and develop custom software solutions for both prototype and production-level systems on mobile phones and other resource-constrained platforms, e.g., single-board computers</li>
</ul>
<p><strong>What you will need:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A four-year degree in CS, EE, or Mathematics, or related on the job experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">3+ years of professional or academic software development experience </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">1+ year working or academic experience in either C/C++ or Java programming languages</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with standard Linux Software engineering tools, e.g. git, gcc, make</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to obtain and maintain a government clearance</span></li>
</ul>
<p><span style="font-weight: 400;"><strong>What we would like</strong>:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience building or modifying Android or other mobile operating systems</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with network stack development</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Linux kernel namespaces</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with content-based, data-oriented, or named data networking architectures</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with wireless (NFC/Bluetooth/802.11/LTE) protocols and hardware</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing or modifying Internet-of-Things (IOT) devices</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with ARM assembly language</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience developing security solutions and products</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">An active DoD clearance (Secret or above)</span></li>
</ul>
<p> </p><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Software Reverse Engineer & Vulnerability Researcher |
Lorton, Virginia |
View Details |
TSE - Mobile Systems |
<p><span style="font-weight: 400;">Two Six Technologies is seeking a </span><strong>Mid-Level </strong><span style="font-weight: 400;"> </span><strong>Software Reverse Engineer and Vulnerability Researcher. </strong><span style="font-weight: 400;">The role is focused on the exploitation of firmware, applications, and hardware on mobile devices within a team of developers, reverse engineers, and exploitation specialists</span></p>
<p><strong>Responsibilities Include:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identifying vulnerabilities using both static and dynamic analysis techniques.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Developing proof of concept exploits for identified vulnerabilities.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Documenting and presenting research findings in useful and accessible ways for team members and customers.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Leveraging software and hardware exploitation to enable access to protected information.</span></li>
</ul>
<p><strong>Minimum Qualifications:</strong></p>
<ul>
<li>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">BS Degree in Computer Science or related technical areas</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in the fields of offensive security, exploit development, reverse engineering, or vulnerability research</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Interested in cybersecurity and passionate about learning new things, taking things apart, and getting stuck into new problems and challenges.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Understanding of how operating systems function, such as the separation between kernel and userspace.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in modern scripting languages such as Python</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">3+ years of experience writing programs in a variety of programming languages, such as C, C++, and Objective C</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in understanding at least one Assembly language, such as x86/64, ARM/64, and MIPS</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience using disassemblers/decompilers and reverse engineering tools, such as IDA Pro, Ghidra, Hopper, or Binary Ninja</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Top Secret Clearance </span></li>
</ul>
</li>
</ul>
<p><strong>Nice If You Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with scripting reverse engineering tasks with reverse engineering tools, such as IDA Pro</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in vulnerability research and exploit development on mobile platforms (iOS, Android) or their desktop analogs (macOS, Linux)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with methods to bypass exploit mitigations and detection techniques</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Familiarity with basic cryptography design and implementation concepts</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with creating and maintaining automated fuzzing solutions.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Expertise in analyzing crash reports for debugging or identifying vulnerabilities.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience in a client-facing technical role</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Sub-Saharan Africa SME |
Arlington, Virginia |
View Details |
TSI - M3 |
<p><strong>Sub-Saharan Africa SME</strong></p>
<p> </p>
<p><span style="font-weight: 400;">We're looking for someone to join the Media Manipulation Monitor (M3) team as we </span><strong>decipher complex information operations</strong><span style="font-weight: 400;"> (IO) for discerning US government and Fortune 50 clients. M3 decodes the Chinese government’s manipulation of the global information space, and we need a language- and data-enabled Subject Matter Expert to help our clients make sense of the Chinese government’s IO in Sub-Saharan Africa.</span></p>
<p> </p>
<p><span style="font-weight: 400;">As a Subject Matter Expert at M3, </span><strong>you will be responsible for curating and analyzing signal-rich data to extract actionable insights about Chinese IO in Sub-Saharan Africa</strong><span style="font-weight: 400;">. You’ll bring your world-class expertise in local language, the social media landscape, and data analytics to help solve some of the most important foreign policy questions facing the US Government today. You'll work with M3’s team of Subject Matter Experts to deliver valuable analysis in written and spoken formats to our list of elite clients.</span></p>
<p> </p>
<p><span style="font-weight: 400;">You'll also work with members of our Data Science, Engineering, and Product teams to constantly iterate on and improve our collection, data analytics, and content production processes. At Two Six, we strive to solve problems collaboratively, innovate and respond to feedback, and include, thank, celebrate, and be kind to our team members. In this role, you will embody these values, working on your own and with your team to find creative solutions and tackle challenging problems with cutting-edge technology.</span></p>
<p> </p>
<p><span style="font-weight: 400;">That said, </span><strong>we do not expect our SMEs to be expert coders</strong><span style="font-weight: 400;">. We train all SMEs in quantitative methods and AI/ML tools, and create space for them to hone their ability to work with complex technical systems. </span><strong>If you are a curious and motivated regional expert who is not intimidated by big data—we want you to work with us</strong><span style="font-weight: 400;">.</span></p>
<p> </p>
<p><strong>This position is fully remote</strong><span style="font-weight: 400;">, just like the rest of the M3 team. Our normal business hours tend to align with the East Coast, but we are flexible and we work with teammates and clients around the world.</span></p>
<p> </p>
<p><strong>In this position, you’ll:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Identify and analyze how narratives and propaganda campaigns spread on social media platforms in target regions and languages.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Use our internal data platform and proprietary data science tools to identify IO trends and anomalous events, then interpret these findings for clients.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Write reports, ranging from time sensitive alerts to in-depth analysis on current events.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Communicate your analysis to our customer base and act as a customer success advocate to continuously improve the quality of our product.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Research and explore new data sources in English and relevant regional languages, such as French.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Work with our data scientists and engineers to develop novel technology that improves M3’s capacity to turn data into actionable insights.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Deliver insights on existing initiatives and come up with innovative product growth opportunities.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Represent analytic excellence and consistently challenge our team’s assumptions.</span></li>
</ul>
<p> </p>
<p><strong>Here are some of the skills you’ll need to dive into the role:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong experience writing clear and concise reports.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Professional fluency in reading French (and ideally another regionally relevant language), as well as significant in-region experience.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Strong understanding of Sub-Saharan Africa’s traditional and social media environment.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Knowledge of Sub-Saharan African countries’ relations with foreign powers, especially China and the US.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Ability to communicate about complicated topics with a variety of audiences with differing levels of expertise.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Demonstrated initiative and problem solving skills.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Being well organized and efficient, great with deadlines.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Basic technical proficiency (e.g., adept in Microsoft Office, Google Docs suite).</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">You do not need to have data analytics or engineering experience for this job, but you should show interest and capacity to learn new skills, as you will be working closely with technical teams.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Eligibility to obtain and maintain a security clearance.</span></li>
</ul>
<p> </p>
<p><strong>Other nice-to-haves. </strong><span style="font-weight: 400;">Our Subject Matter Experts come from a wide range of backgrounds and expertise. We’d love to hear what makes you uniquely able to serve our customers. Some of the qualities that might help you stand out include:</span></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">A passion for communicating findings visually with charts, graphics, and visually pleasing templates.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Love of solving problems with data, easily turning to Python or R to scrape, clean, and visualize data. Pride in forming complex boolean queries to isolate answers.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">A “futurist” in analysis, with exposure to elasticsearch/ELK Stack, machine learning, or natural language processing.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Broad exposure to the US government and a passion for mission.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience helping large organizations navigate a complex information environment.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Collaboration with teams of diverse, cross-functional specialities and a love for integrating the best that each brings to the table.</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Systems Administrator |
Chantilly, Virginia |
View Details |
TCI - O-Cyber |
<p>Trusted Concepts, a division of Two Six Technologies is currently seeking a Systems Administrator who will apply expertise in the installation, configuration, operations, and maintenance of both Windows- and Linux-based architectures. The candidate will focus on improving the stability and performance of the platform, maintaining and improving the security posture of the domain, continuous monitoring of system health, and troubleshooting issues that arise. This individual is accountable for Windows, Linux, and application systems that support the infrastructure. Responsibilities on these systems include SA engineering, operations and maintenance, and research and development to ensure continual operation. The individual must be proficient inbuilding, documenting, and providing tier 3 engineering support. The position requires deep technical knowledge of systems, networks, and application security as well as a solid understanding of enterprise-level security frameworks, policies, processes, and standards. The candidate must have strong analytical skills for troubleshooting complex issues, attention to detail, and the ability to multitask in a fast-paced environment. Key duties include maintaining operating systems, application support, integration, design, and assistance with additional duties as needed to support the team.</p>
<p> </p>
<p>Clearance Required: Active TS/SCI with Polygraph</p>
<p> </p>
<p><strong><u>Key Responsibilities:</u></strong></p>
<ul>
<li>Provide daily operational support for Linux and Microsoft Windows operating systems and applications</li>
<li>Support virtual and physical infrastructure of servers running CentOS in a dev, test, and production configuration, and support an infrastructure of different applications comprising of end user applications, developer tools and infrastructure support applications.</li>
<li>Develop and maintain environments running in Amazon Web Services (AWS).</li>
<li>Maintain the integrity and security of systems by monitoring security feeds and dashboards in support of Continuous Monitoring activities</li>
<li>Develop and maintain standards and procedures for applications across a complex computing infrastructure</li>
<li>Develop and maintain comprehensive documentation</li>
<li>Monitor application and operating system performance; analyze, document and remediate incidents</li>
<li>Develop and oversee implementation of testing strategies and document the results</li>
<li>Leverage scripting and system automation tools</li>
<li>Maintain current knowledge of relevant technologies</li>
<li>Research and recommend hardware and software, coordinate installation, and provide backup recovery</li>
<li>Interact with users and evaluate vendor products</li>
<li>Review incidents to understand the root causes and ensure implementation of proper fixes</li>
<li>Collaborate with system administrators, engineers, and the client to ensure proper integration of applications</li>
</ul>
<p><strong><u>Required Qualifications:</u></strong></p>
<ul>
<li>Extensive experience with Redhat and/or Centos</li>
<li>Demonstrated experience with VMWare ESXi infrastructure 6.x + vCenter server, host clustering with HA, DRS, replication.</li>
<li>Demonstrated experience in server builds using automated mechanism</li>
<li>Demonstrated experience with Ansible and/or Puppet</li>
<li>Experience with Ansible playbooks for virtual and physical instance provisioning, configuration management and patching and software development</li>
<li>Demonstrated experience with building, upgrading and maintaining applications and services in an AWS account</li>
<li>Experience with code maintenance using Git, Gitlab, and/or Github</li>
<li>Demonstrated experience with Atlassian Jira and Confluence</li>
<li>Demonstrated experience with managing Elasticsearch on CentOS</li>
</ul>
<p><strong><u>Bonus Points :</u></strong></p>
<ul>
<li>Certified Linux System Administrator</li>
<li>Knowledge of network engineering fundamentals and network design</li>
<li>Demonstrated experience with Microsoft Window Server versions 2008, 2016\</li>
<li>Demonstrated experience with SCCM, WDS, MS SQL server, Powershell, batch scripting</li>
<li>Experience working with syslog applications such as Splunk</li>
<li>Demonstrated experience with NetApp NAS systems a plus</li>
<li>Experience with Hadoop infrastructure and applications (HDFS, Hue, Impala, Oozie, Solr, Spark, Yarn, Zookeeper)</li>
<li>Demonstrated experience with Cisco Nexus switches and Cisco Firepower Security Appliances</li>
<li>AWS and/or ITIL Foundations Certifications</li>
<li>Certifications relating to IT Security (CISSP, GIAC, Security+) a plus</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
Systems Engineer |
Herndon, Virginia |
View Details |
TCI |
<p>Trusted Concepts , a division of Two Six Technologies is seeking a Senior Systems Engineer that will be responsible for the assessment of systems, along with determining problems, providing solutions to issues that arise, designing systems, upgrading systems, maintaining systems and brainstorming possible improvements that can be made to a system in failure.</p>
<p><strong>Clearance: TS/SCI with a Polygraph</strong></p>
<p><br>Required Knowledge/Skills:</p>
<ul>
<li>Demonstrated experience with speaking and collaborating with customers, vendors, management, and Information Technology (IT) staff during the creation and maintenance of cloud-based systems</li>
<li>Experience with the architecture, development, implementation, and administration of cloud-based systems</li>
<li>Demonstrated experience with customer Information Security practices and accreditation processes</li>
<li>Demonstrated experience developing a cost-effective system for projects by performing a cost benefit analysis</li>
<li>Demonstrated experience with documenting business rules, technical capabilities and developing quality metrics</li>
<li>Operational support role experience, triaging and troubleshooting issues experienced by remote end users</li>
<li>Developing requirements for testing and assessing applications along with software life cycle and creating builds for customers</li>
<li>Experience preparing task planning, task documentation, configuration management, and overall activities reporting</li>
<li>Demonstrated experience with tracking and updating inventory of Commercial-Off-The- Shelf (COTS) software, and hardware</li>
<li>Demonstrated experience with Visio and PowerPoint for system diagrams and senior management presentations</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
TechOps Engineer |
Arlington, Virginia |
View Details |
TSC - Kolo |
<p><span style="font-weight: 400;">Two Six Technologies is searching for a </span><strong>Technical Operations Engineer </strong><span style="font-weight: 400;">to support in</span><strong> Arlington, Virginia.</strong></p>
<p><strong>Responsibilities:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Utilize SQL to develop custom data visualizations to support mission requirements.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Receives analyzes, preprocesses, and ingests data into the product data model leveraging python.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Deploy, configure, and administer product servers on unclassified and classified networks in support of the customer.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide customer support through the performance of on-site installation, as well as overseeing any necessary diagnoses, troubleshooting, service, and repair of systems.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide tactical level APP and deployment support to U.S. Government agencies and Military community utilizing defensive tools (e.g. Splunk, Security Onion, GRR, Elastic, Carbonblack, etc.).</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Participate in the establishment, measurement, and achievement of customer satisfaction metrics</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Perform project management function from client engagements to include identification, scheduling, tracking, and reporting</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Provide client feature requests to project engineering teams and project support personnel</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Develop and write documentation as required</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Brief and demonstrate company projects to a variety of customers (government and non-government agencies)</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Train and familiarize operators on equipment and systems developed by Two Six Technologies</span></li>
</ul>
<p><strong>Requirements:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Minimum of 5 years of Query language experience; SQL</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">The ability to travel greater than 15%</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Current Top Secret Clearance with SCI</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">A minimum of 2 years of experience working in Cyber Mission Force (CMF) community; Cybersecurity domain experience and knowledge</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">LINUX experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Virtualization experience</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Willing to work with Python and Docker</span></li>
</ul>
<p><strong>Nice to Have:</strong></p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">Scripting using Ansible, Python, or similar dynamic languages.</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with DevOps and/or Agile is a huge plus; Atlassian collaboration tools</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Experience with Kubernetes, AWS, Docker</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">DoDD 8140 (former 8570) IAM/IAT level II or higher certification</span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Government or military cyber experience</span></li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |
UI Developer |
Fair Oaks, Virginia |
View Details |
TCI - Space |
<p>Trusted Concepts, A Division of Two Six Technologies is currently seeking a UI Engineer for our Fair Oaks VA location. This candidate is responsible for the development of innovative, engaging and effective UI/UX features that help commercial users easily solve complex problems. The ideal candidate should possess the ability to think critically and have knowledge of current visual and interaction design principles.</p>
<p>Our team values creativity, initiative, and collaboration. We strive for a collegial atmosphere that encourages intellectual cross-pollination and professional growth. In short, we’re passionate about empowering our customer’s missions and enjoy working together at the leading edge of technology!</p>
<p>Clearance: Active TS/SCI with the ability to obtain a Polygraph</p>
<p>Requirements:</p>
<ul>
<li>Work closely with the product team to chart our roadmap forward and enhance usability</li>
<li>Be a part of the development team to support and maintain existing production code and develop new and exciting products to our client base</li>
<li>Evaluate user stories and acceptance criteria to validate UI/UX design work and influence story or acceptance criteria to get stronger development solutions</li>
<li>Stay current on new technologies as they relate to web-based application development and user interface design</li>
<li>Participate in code reviews and internal team scrums</li>
<li>Node, Angular and RxJS experience is a must.</li>
<li>Added bonus if you have experience with D3.js</li>
</ul><div class="content-conclusion"><div class="iCIMS_PageFooter">
<div class="gmail_default">
<p>Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. </p>
<p><span style="font-weight: 400;">If you are an individual with a disability and would like to request reasonable workplace <span class="il">accommodation</span> for any part of our employment process, please send an email to <a href="mailto:[email protected]" target="_blank">[email protected]</a>. Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.</span></p>
<p><span style="font-weight: 400;">Additionally, please be advised that this business uses E-Verify in its hiring practices.</span></p>
<p>EOE, including disability/vets. </p>
<p> </p>
</div>
</div></div> |
jobclearancerequired |