Sort by
Refine Your Search
-
tools (e.g., Numpy, Pytorch, Tensorflow, ART). You have knowledge or familiarity with reverse engineering tools (e.g. NSA Ghidra, IDA Pro) You have experience with Python, C/C++, or low-level programming
-
applying scientific methods. Mastery of C/C++, Python, Verilog/VHDL, and/or other pertinent languages and software tools and frameworks. Experience participating in research projects and collaborating across
-
Python using modern ML libraries (e.g., PyTorch / TensorFlow) and common scientific tooling. Demonstrated ability to communicate technical results clearly in written deliverables and presentations. Ability
-
of computer vision applications (Python or Matlab preferred) Linux development experience Knowledge of basic software engineering principles Technical communication skill Demonstrated success collaborating
-
modern programming languages including Python, C/C++, and Java. You will build and work with data pipelines, ETL processes, and backend systems. You will work with, extend, and implement state-of-the-art
-
engineer. You understand the Department of War Systems Engineering lifecycle. You’re proficient in one or more of the following: C and C++, Python, MATLAB, C#, or JAVA. You’ve worked with modern RTOSes
-
++). High-level programming languages (e.g. Java, Python, GoLang, etc.) Software engineering and design concepts Firmware and device driver development Malware tradecraft and threat actor tactics, techniques
-
administration. Experience with network switching and routing. Experience with scripting languages (e.g. Python, BASH) Desire to teach, learn and lead for continuing team development. A combination of education
-
, NSA Ghidra, Binary Ninja) User-level and kernel-level debuggers (e.g. x32dbg, x64dbg, gdb, WinDbg) Native programming languages (e.g. C/C++). High-level programming languages (e.g. Java, Python, GoLang
-
/configuration language (Ansible, Bash, Python, etc.). Familiarity with network storage solutions like NFS, ZFS, and Lustre. Exposure to centralized authentication systems (e.g., Kerberos). Strong troubleshooting