Job Description
PENDING CONTRACT AWARD: Digital Forensic Examiner Forensic Software Developer CEM All Source Intelligence (PED) Analyst
BY APPLYING TO THIS OPENING, YOU WILL BE ADDED TO A TALENT BANK OF INTERESTED PARTIES FROM WHICH WE WILL SELECT CANDIDATES FOR INTERVIEW FOLLOWING CONTRACT AWARD. IF YOU WISH TO BE CONSIDERED FOR OTHER/IMMEDIATE OPENINGS PLEASE APPLY TO ONE OF OUR OTHER CAREER LISTINGS.
Location: Tampa, FL
Description:
Cipher Tech is seeking DoD cleared forward-deployable digital forensic examiners (MEDEX/CELLEX examiners), Digital Forensic Software/Web Developers, and CEM All Source (PED) Analysts, to join a team of experts who play a critical role in protecting national security.
All individuals will execute out of Tampa, FL. Some positions, on an as-needed basis, will serve 4 to 6-month long deployments outside the continental United States (OCONUS) in direct support of our US military customers.
All applicants to this job posting will be considered for hire pending additional screenings after a future contract award.
Benefits:
Other Compensation:
See our Perks & Benefits page for a general description of benefits and other potential compensation benefits: -benefits/ATTN All Military: You are highly encouraged to apply if you have an active DoD clearance and:
About Us:
At Cipher Tech Solutions, Inc. (Cipher Tech), we take great pride in supporting some of the most mission critical work in the Department of Defense and the Intelligence Community. The majority of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering.
Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other form of digital media. The results of our work are then used to support federal and military law enforcement, counterintelligence, and counter terrorist activities.
Malware reverse engineering is the practice of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as:
* How did it infect the victim's computer * What kind of information it is seeking to steal * How is it communicating with the author (actor) * Who that actor might be.
Vaccination Notice:Please be aware that you are applying for a position to work as a federal contractor. As such, Cipher Tech will require, and your employment will be subject to, such vaccinations as are required by federal, state, and local law requirements.
Important Security Clearance Information:
Be aware that you are applying for a job that requires a U.S. Government Security Clearance.
Cipher Tech is an Equal Opportunity Employer. All hiring and employment decisions are made on the basis of business requirements, performance, and merit with no regard to race, color, religion, sexual orientation, gender, gender identity, national origin, or other protected status.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or national origin.
Job Posted by ApplicantProWe are seeking a Physician Assistant or Nurse Practitioner for a Dermatology practice opportunity in the Mount Kisco and Jefferson Valley NY area. Reason For Opening: Backfill. To replace a PA that relocated. Location(s): Mount Kisco NY and Jefferson Valley NY area...
...youre a seasoned welder with a passion for teaching, this is your chance to transform your experience into impact. As a Welding Instructor, you wont just show students how to weldyoull shape the next generation of skilled tradespeople. Youll be part of a team that...
...Banquet Server (Part-Time / On-Call) Grasslands Club | Gallatin, TN Position Summary Grasslands Club is seeking professional, energetic, and service-driven Banquet Servers to support weddings, corporate events, private parties, and club functions across our beautiful club...
...Job Description \n \n POSITION SUMMARY AND RESPONSIBILITIES \nProvides computer project technical expertise, project management, technical guidance and direction in the implementation and operation of computer systems used for financial, clinical and administrative...
...Certification/Education: Required: 1. Masters Degree in Social Work. 2. Current Massachusetts Licensed Clinical Social Worker (LCSW) licensure. Experience/Skills: Required: 1. Demonstrated ability in psychosocial assessment, knowledge of community...