Click column header to sort
Peraton Labs delivers world-class cybersecurity, machine learning, and networking research and engineering to government agencies, telecom carriers, utilities and commercial enterprises. Drawing on its Bell Labs heritage, Peraton Labs excels at creating innovative technologies and services to solve challenging and complex problems.
As a hands-on Cybersecurity Software Engineer with Peraton Labs, you will be at the forefront of developing, testing, and fielding novel network cybersecurity appliances for the Department of Defense. Working with systems engineers and researchers, you will be responsible for writing fast and efficient code for processing packets in high-throughput networks, developing and managing a pipeline that integrates machine learning models with existing intrusion detection capabilities, and enabling the transition of research prototypes to new environments. You will develop tools for facilitating management and operations of Peraton Labs' cyber range product and for enhancing its capabilities by participating in the planning, setup, and conduct of cyber exercises using this cyber range, including red-teaming.
Who we’re looking for:
· Cyber: We are looking for staff with a strong interest (and ideally a track record) in cyber security research and development.
· Generalists: You should have a breadth of knowledge across multiple domains. You’ll typically focus your work on the domain(s) of your specialty or preference, but a strong multi-domain awareness and ability is required. You should have a curiosity to learn new technology.
· Tangible: You’ll work on applied research programs to conceive and develop prototypes to solve cutting-edge, complex problems.
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, we are a self-sustaining research center within Peraton that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security. Peraton Labs’ cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, cyber operations, secure-by-design techniques, and experimentation platforms.
Role and responsibility for this position:
The Cyber Research Engineer will work on full-lifecycle advanced cyber capability development, starting with research prototype all the way through to eventual deployment of operational capabilities over a three-year period. You will be part of a large team of highly skilled engineers collaborating to develop, test, and field novel operational capabilities for the Department of Defense. Past experience with DARPA or the DoD/IC research community is a strong plus. You will perform one or more of the following tasks:
- Designing, developing, and testing software modules related to emerging embedded cyber capabilities, high-availability network protocols, cyber mission planning and reasoning systems, data analytics, processing and analysis of high-volume network data.
- Hardware and software reverse engineering activities against bespoke targets.
- Development of CI/CD-based testing strategies for developed software modules.
- Analysis and assessment of multi-dimensional network data to inform software development.
We are hiring multiple engineers in this role. Individual job responsibilities will be tailored to each candidate’s background and experience drawing from the overall the scope listed above.
The ML/Data Science Research Engineer with Peraton Labs will participate in an end-to-end design and implementation of deep learning solutions for application in network/graph representation learning (NRL) and graph construction/generation/completion.
The ideal candidate will be able to start from the end users' needs and understand how they drive performance and infrastructure requirements. The ideal candidate has experience converting customers' needs into user interface requirements and baselining and scaling ML solutions using CI/CD best practices.
Roles and Responsibilities:
- Frame the problem, research current state-of-the-art ML solutions, and assess their suitability to the problem at hand.
- Leverage deep learning frameworks (e.g., PyTorch, Tensorflow) to develop deep learning solutions, tailoring them to the application area.
- Develop extract-transform-load (ETL) pipelines to curate large-scale ML datasets.
- Leverage graph neural networks (GNN) to construct embedded/latent representations for downstream tasks.
- Train ML models using automated hyper-parameter tuning frameworks.
- Design data model to capture real-world phenomena using graph data structures in a space/computationally efficient
The ML/Data Science Research Engineer with Peraton Labs will participate in an end-to-end design and implementation of deep learning solutions for application in network/graph representation learning (NRL) and graph construction/generation/completion.
The ideal candidate will be able to start from the end users' needs and understand how they drive performance and infrastructure requirements. The ideal candidate has experience converting customers' needs into user interface requirements and baselining and scaling ML solutions using CI/CD best practices.
Roles and Responsibilities:
- Frame the problem, research current state-of-the-art ML solutions, and assess their suitability to the problem at hand.
- Leverage deep learning frameworks (e.g., PyTorch, Tensorflow) to develop deep learning solutions, tailoring them to the application area.
- Develop extract-transform-load (ETL) pipelines to curate large-scale ML datasets.
- Leverage graph neural networks (GNN) to construct embedded/latent representations for downstream tasks.
- Train ML models using automated hyper-parameter tuning frameworks.
- Design data model to capture real-world phenomena using graph data structures in a space/computationally efficient design.
The Cyber Network Planner Engineer will develop innovative solutions to solve hard, real-world networking problems. You’ll take responsibility to accomplish specific deliverables within a small team setting of fellow engineers. You’ll communicate and collaborate with fellow team members and help guide junior staff.
Peraton Labs generates transformative applied research to fuel solutions for our customers unique challenges. We are a self-sustaining research center within Peraton that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.
Who we’re looking for:
- Cyber: We are looking for staff with a strong interest (and ideally a track record) in cyber security research and development.
- Generalists: You should have a breadth of knowledge across multiple domains. You’ll typically focus your work on the domain(s) of your specialty or preference, but a strong multi-domain awareness and ability is required. You should have a curiousity to learn new technology.
- Tangible: You’ll work on applied research program to conceive and develop prototypes to solve cutting-edge, complex problems.
Peraton Labs is seeking a Test Automation Engineer to work on a QA Team Member to assist in developing a state-of-the-art network monitoring tool. In keeping with Peraton Labs’ role as a research organization, we are taking the project from laboratory quality to beta test quality and the QA Team needs to deal with changing requirements and priorities. Additionally, the QA Team will need work with developers to determine what needs to be tested in the absence of formal requirements and to build test infrastructure.
Our work:
We span several areas of interest, including (but not limited to):
- Full-spectrum cyber operations, including CND, CNE, CNA, and CNO.
- Program analysis, including program understanding, vulnerability identification, and remediation
- Malware analysis and reverse engineering
- Resilient networking in support of cyber mission goals
- Autonomous agent development
- Software-defined networking for cyber defense and deception
- Cryptographic techniques for assured computation
- Symbolic logic and theorem proving for automating network configuration
- Application of formal methods for secure and resilient systems
- Application of mathematic, statistics, and linguistics to large data sets to uncover patterns, extract information and gain understanding
- Artificial intelligence (reasoning, probabilistic inference, machine learning)
Peraton Labs is seeking a Network Test Engineer to work on a QA Team to assist in developing a state-of-the-art network monitoring tool. In keeping with Peraton Labs’ role as a research organization, we are taking the project from laboratory quality to beta test quality and the QA Team needs to deal with changing requirements and priorities. Additionally, the QA Team will need work with developers to determine what needs to be tested in the absence of formal requirements and to build test infrastructure.
Our work:
We span several areas of interest, including (but not limited to):
- Full-spectrum cyber operations, including CND, CNE, CNA, and CNO.
- Program analysis, including program understanding, vulnerability identification, and remediation
- Malware analysis and reverse engineering
- Resilient networking in support of cyber mission goals
- Autonomous agent development
- Software-defined networking for cyber defense and deception
- Cryptographic techniques for assured computation
- Symbolic logic and theorem proving for automating network configuration
- Application of formal methods for secure and resilient systems
- Application of mathematic, statistics, and linguistics to large data sets to uncover patterns, extract information and gain understanding
- Artificial intelligence (reasoning, probabilistic inference, machine learning)
Role and responsibility for this position:
As a hands-on Cybersecurity Software Engineer with Peraton Labs, you will be at the forefront of developing, testing, and fielding novel network cybersecurity appliances for the Department of Defense. Working with systems engineers and researchers, you will be responsible for writing fast and efficient code for processing packets in high-throughput networks, developing new heuristic and signature-based detection capabilities for finding advanced threat actors in critical networks, and writing tests to provide system performance metrics.
Peraton Labs generates transformative applied research to fuel solutions for our customers' unique challenges. We are a self-sustaining research center within Peraton that provides applied research and engineering to enable government agencies, utilities and commercial enterprises to fully exploit the future of communications, analytics and cyber security.
Peraton Labs delivers world-class cybersecurity, machine learning, and networking research and engineering to government agencies, telecom carriers, utilities and commercial enterprises. Drawing on its Bell Labs heritage, Peraton Labs excels at creating innovative technologies and services to solve challenging and complex problems.
As a hands-on Cybersecurity Software Engineer with Peraton Labs, you will be at the forefront of developing, testing, and fielding novel network cybersecurity appliances for the Department of Defense. Working with systems engineers and researchers, you will be responsible for writing fast and efficient code for processing packets in high-throughput networks, developing and managing a pipeline that integrates machine learning models with existing intrusion detection capabilities, and enabling the transition of research prototypes to new environments. You will develop tools for facilitating management and operations of Peraton Labs' cyber range product and for enhancing its capabilities by participating in the planning, setup, and conduct of cyber exercises using this cyber range, including red-teaming.
Who we’re looking for:
· Cyber: We are looking for staff with a strong interest (and ideally a track record) in cyber security research and development.
· Generalists: You should have a breadth of knowledge across multiple domains. You’ll typically focus your work on the domain(s) of your specialty or preference, but a strong multi-domain awareness and ability is required. You should have a curiosity to learn new technology.
· Tangible: You’ll work on applied research programs to conceive and develop prototypes to solve cutting-edge, complex problems.
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, our experts pave the way. Peraton Labs’ cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques, cyber operations, and experimentation platforms.
- Responsible for IT laboratory support, including design and building systems and services, writing scripts, testing, and deployment
- Maintain multiple containerized frameworks
- Maintain existing computing, network, laboratory infrastructure
- Software installation, configuration and configuration management
- Engineer and implement virtualization, database, security, storage, and Docker systems
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, our experts pave the way. Peraton Labs’ cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques, cyber operations, and experimentation platforms.
- Responsible for IT laboratory support, including design and building systems and services, writing scripts, testing, and deployment
- Maintain multiple containerized frameworks
- Maintain existing computing, network, laboratory infrastructure
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, our experts pave the way. Peraton Labs’ cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques, cyber operations, and experimentation platforms.
- Responsible for IT laboratory support, including design and building systems and services, writing scripts, testing, and deployment
- Maintain multiple containerized frameworks
- Maintain existing computing, network, laboratory infrastructure
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, DHPC, and Telcordia, our experts pave the way. Peraton Labs’ cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques, cyber operations, and experimentation platforms.
- Responsible for IT laboratory support, including design and building systems and services, writing scripts, testing, and deployment.
- Maintain existing computing, network, laboratory infrastructure
- Software installation, configuration and configuration management
- Engineer and implement virtualization, database, security, storage, and Docker systems
- Proficient in scripting languages: shell and Python, Linux, VMware, Windows, Orchestration tools, networking protocols, Cisco IOS and large scale enterprise systems
- Demonstrated experience with designing and constructing experimental systems, and debugging/validating the prototype
- Able to perform initial analysis of data produced by test configuration
- Self-directed, able to work effectively with minimal requirements and supervision
Peraton Labs delivers innovative solutions and revolutionary new capabilities to solve the most difficult and complex challenges for government agencies, utilities, and commercial customers. With a distinguished heritage tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. Peraton Lab’s cybersecurity research protects mission-critical systems and national cyber infrastructure through a broad range of initiatives in computer network defense, secure-by-design techniques and cyber operations and experimentation platforms.
- The Electronics Exploitation Engineer (ELEX) shall provide digital forensics and electronics exploitation support for the C5ISR Center.
- The individual will be available and willing to deploy to OCONUS locations to include the CENTCOM and AFRICOM AORs for up to 6-month rotations.
- The EE will serve in relation to the collection and handling of recovered electronics devices, ensuring that triage and technical exploitation (TECHEX) occurs in accordance with organizational intelligence requirements. As the Subject Matter Expert, the EE must be able to work independently in isolated work environments.
- The EE will execute reach-back and coordination with CONUS-based engineering staff, as needed.
- The EE will be expected to generate forensics reporting from TECHEX generated products and will respond to any associated analytical requirements.
- Once requisite mission and technical orientation and training requirements have been satisfied, this position may require OCONUS deployment, to the CENTCOM or AFRICOM AORs. While deployed, responsibilities include installing, debugging, maintaining, upgrading of all assigned equipment as well as provide broad mission support, training, briefings, employing and fielding of the TECHEX capability to include the following: electrical forensics applications, tools, and systems.
What You'll Get to Do:
- Provide hands-on technical forensic exploitation support for electronics exploitation (EE), media exploitation (MEDEX), cell phone exploitation (CELLEX), electronic exploitation (ELEX), document exploitation (DOMEX), technical intelligence (TECHINT), and other unique exploitation missions.
- Conduct electronic analyses of target devices, including functional analyses of the target devices, understand and describe how the target functions from an electronic perspective – basic signaling characteristics; voltage levels; electrical connections; electrical modifications to commercial-off-the-shelf (COTS) hardware; logic states; operating frequencies; component configuration identification; operating profiles/modes; operation in noisy electromagnetic environments; and susceptibility.
- Serve as subject matter expert in RF characterization.
- Publish reports and briefings in order to present characterization information, electronics vulnerabilities, and exploitation findings along with recommendations.
- Work with a team to respond to RFI’s and determine best consolidated solutions to problems.
- Design and implement characterization standard operating procedures (SOPs) and implement SOPs in daily functions.