website statistics

Job posting trends show that the US defense contractors are out for hiring black hat hackers.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

Earlier today, I wrote about Mikko Hypponen’s, chief research officer of F-Secure, hypothesis of government spies infiltrating Microsoft. But he has something more to say. Lately, Mr. Hypponen has spent a lot of time looking at job openings of US defense contractors’ websites and online job listings to find out actual candidates with secret clearances who has been searched job to use specific keyword like “exploit”, “offensive”, and “vulnerability”. What he has seen over the last couple of months is pretty interesting. Job posting trends show that the US defense contractors are out for hiring offensive hackers, and they don’t only intend to protect US cyberspace but also intend to exploit the loopholes of cyber security.


Pentagon Contractors Post Openings For Black-Hat Hackers, Image Credit: forbes.com

Mr. Hypponen has drawn our attention to job descriptions at multiple openings. One job listing for “Cyber Software Engineer” at defense firm Northrop Grumman reads, “this exciting and fast-paced Research and Development project will plan, execute, and assess an Offensive Cyberspace Operation (OCO) mission.” Another firm Booz Allen Hamilton seeks a “Target Digital Network Analyst” capable of “exploit development for personal computer and mobile device operating systems, including Android, Blackberry, iPhone and iPad.”

Defense contractor giant Raytheon is seeking for a “Unix Attack developer.” TeleCommunications Systems wants a “Windows Attack/Exploit Developer.” NSA contractor SAIC seeks a “Red Team Developer.” All three of those companies’ job descriptions include the phrase: “analyzing software for vulnerabilities as well as development of exploit code.”

Hypponen said “I think this is new, the arms race has started, and this proves it. It’s a clear sign of the demand to stockpile cyber weapons and expand the operations underway.” Recent reports also suggests that Hypponen could be right.

Source: Forbes

Buy Cheapest Related Product From Amazon.com


Facebook Concedes To Privacy Violation Charges, Agrees To Pay $10 Million

Carat – Battery Management App For iOS [Free]
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 17, 2012(1 year, 10 months ago.)

Recent Search

Recent Tutorials

Adobe CS products are not free, but the good news is you can now download Photoshop CS2 & all other CS2 product completely free and it's absolutely legal.
At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook